[Download postscript version]
next up previous
Next: Previous work Up: User Recognition by Keystroke Previous: User Recognition by Keystroke

Introduction

In many situations, a user may leave his computer without logging out or locking the computer. This gives an intruder a chance to use the console and the users login to break into systems and shows the insufficiency of password scheme for authentication purpose. In this project report we present a tool to provide continuous authentication of the user by continuously monitoring the users typing pattern. As soon as a different typing pattern is detected, the computer locks up and the ``intruder'' is asked to type in a password. This technique can be useful in many settings, for instance for notebooks. It can also be used as an additional biometric authentication method on a high security computer or for military applications.


next up previous
Next: Previous work Up: User Recognition by Keystroke Previous: User Recognition by Keystroke

Adrian Perrig
Wed Sep 29 17:51:43 PDT 1999