Investigation of 'cognitive fingerprints' to bolster computer passwords

(—It won't make passwords passé, but a team led by Southwest Research Institute (SwRI) intends to use "cognitive fingerprints" to make sure you are you, and not an imposter.

Even the strongest password can be used freely once it has been compromised by a . However, a novel software-based authentication tool called covert-conditioned biometrics will attempt to use a unique sequence of problem-solving moves to distinguish between a legitimate user and an identity thief. Research in support of the system is sponsored by the (DARPA).

Covert-conditioned biometrics will incorporate principles of , behavior modification and game theory to capture and discriminate aspects of the cognitive fingerprint that authenticate a user's identity.

"It will deploy covert games, mimicking ordinary human computer interactions. Authenticated users are likely to unknowingly develop strategies for playing the games, even if the games are imperceptible," said Jenifer Wheeler, a senior instructional specialist in the Learning Sciences and Systems Department of SwRI's Aerospace Electronics, Systems Engineering and Training Division.

"While legitimate users will unconsciously learn how to overcome the anomalies, imposters who have never seen the anomalies will respond differently, triggering an alert within the ," Wheeler explained.

SwRI has teamed with Sentier Strategic Resources LLC to combine SwRI's experience in behavioral modeling, educational software development and with Sentier's experience in and human-subjects testing. The team will use adaptive learning system principles to design the two major components of the system: a user model to represent a user's game strategies, and an assessment model to deploy varied games based on user model data and user behavior.

The nine-month project comprises four major phases: collecting behavioral information related to computer use and developing a persona of a typical user; design and development, determining which types of covert game-like interactions best authenticate users with minimal disruption; developing prototype user and assessment models; and final evaluation by testing the efficacy of the system with a large group of volunteer participants.

Citation: Investigation of 'cognitive fingerprints' to bolster computer passwords (2012, September 10) retrieved 26 September 2023 from
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

Individual typing style gives key to user authentication


Feedback to editors