Individual typing style gives key to user authentication

May 16, 2012 By Niki Widdowson
Eesa Al Solami

Your typing style is as individual as your fingerprints. Being able to use typing style to identify a change in users could be a vital security and forensic support for organisations such as banks, the military and universities, says QUT PhD researcher Eesa Al Solami.

Mr. Al Solami, from QUT's School of and has developed an algorithmic system to capture and analyse the keystroke dynamics of keyboard users in a single session to enable user authentication throughout a typing session.

"Researchers have known for decades that people have unique typing styles but until now authentication has relied on the typing of the username and password and comparing it with current data.

"So while current computer systems can authorise the user at the start of a session they do not detect whether the current user is still the initial authorised user, a substitute user, or an pretending to be a valid user.

"This makes a system that can continuously check the identity of the user throughout a session necessary. My research has developed such a system called a continuous (CAS)."

Mr. Al Solami said his system had the ability to define a new global threshold for any user and so would not be affected by improvements or changes in a user's typing skill.

"It can detect significant changes in typing style for example, differences in the timing between characters," he said.

"The system does not need any predefining models from the username and password to authenticate authorized users. It would be of value in highly sensitive environments such as , government organizations and defence.

"Organizations could either terminate session or generate an alert when a change in user is detected."

Mr. Al Solami said the system could be extended to the typing styles on mobiles and tablets.

"It could also be used with online exams to deter collusion during a session," he said.

Explore further: Innovative new supercomputers increase nation's computational capacity and capability

add to favorites email to friend print save as pdf

Related Stories

Better passwords get with the beat

May 17, 2011

No password is 100% secure. There are always ways and means for those with malicious intent to hack, crack or socially engineer access to a password. Indeed, there are more and more websites and databases compromised on a ...

The safe way to use one Internet password

Feb 25, 2010

(PhysOrg.com) -- A little-used Internet authentication system from the 1980s could provide the answer for enabling web users to securely log in only once per Internet session, a Queensland University of Technology researcher ...

Who goes there? Verifying identity online

Feb 17, 2012

We are all used to logging into networks where we have a unique identity, verified by the network server and associated with our account for other members of the network to see. Such an identity-based network system is useful ...

Recommended for you

Forging a photo is easy, but how do you spot a fake?

Nov 21, 2014

Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showin ...

Algorithm, not live committee, performs author ranking

Nov 21, 2014

Thousands of authors' works enter the public domain each year, but only a small number of them end up being widely available. So how to choose the ones taking center-stage? And how well can a machine-learning ...

Professor proposes alternative to 'Turing Test'

Nov 19, 2014

(Phys.org) —A Georgia Tech professor is offering an alternative to the celebrated "Turing Test" to determine whether a machine or computer program exhibits human-level intelligence. The Turing Test - originally ...

Image descriptions from computers show gains

Nov 18, 2014

"Man in black shirt is playing guitar." "Man in blue wetsuit is surfing on wave." "Black and white dog jumps over bar." The picture captions were not written by humans but through software capable of accurately ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.