Asee peer logo

Biometric Authentication Tool For User Identification

Download Paper |

Conference

2006 Annual Conference & Exposition

Location

Chicago, Illinois

Publication Date

June 18, 2006

Start Date

June 18, 2006

End Date

June 21, 2006

ISSN

2153-5965

Conference Session

Security

Tagged Division

Information Systems

Page Count

7

Page Numbers

11.277.1 - 11.277.7

DOI

10.18260/1-2--172

Permanent URL

https://peer.asee.org/172

Download Count

590

Request a correction

Paper Authors

author page

Mario Garcia Texas A&M University-Corpus Christi

Download Paper |

Abstract
NOTE: The first page of text has been automatically extracted and included below in lieu of an abstract

Biometric Authentication Tool for User Identification Based on Keystroke Dynamics

Abstract

Biometric access methods for computer systems are gaining popularity because of governmental and corporate businesses' increased focus to secure sensitive data on computer systems and networks. Biometrics is the science of measuring a unique physical characteristic about an individual as an identification mechanism. Keystroke Biometrics is a relatively new method of biometric identification and provides a comparatively inexpensive and unobtrusive method of hardening the normal login and password process. This Project aims at investigating the validity of using typing dynamics to strengthen security in a computer system. A Keystroke Dynamics Analysis tool is developed that uses statistical analysis of a user’s typing patterns to perform identity verification.

Introduction

The increasing need for securing access to computer systems and networks from intruders is growing rapidly as the type of data and capabilities of these systems is becoming significantly sensitive. To provide access to these systems while preventing illegitimate access is the key requirement of modern day computing. Since biometric systems do not identify a person by what he or she knows (a code) or possesses (a card), but by a unique characteristic that is difficult for a different individual to reproduce, the possibility of forgery is greatly reduced 4

Biometric Authentication

Biometrics is the science of measuring a unique physical characteristic about an individual as an identification mechanism. A number of widely used biometric technologies and techniques exist. Some of the common methods include fingerprints, voice characteristics, eyes, facial features. Newer techniques like iris recognition and keystroke dynamics are now becoming more popular as they measure stronger and reliable biometric traits of human beings. Researches have shown that these techniques have virtually no FAR (False Acceptance Rates) and extremely low 0.2% FRR (False Rejection Rates).

Keystroke Biometrics

Keystroke Recognition is completely a software-based solution. It involves two processes: 1. Enrollment Process: This process will enroll the user and generate a template for him/her. To start with, the individual must type in a specific word or a phrase or a set of alphanumeric characters. This is usually a username and password. 2. Verification Process: This process will verify an enrolled individual to confirm the identification of the person. It will match the current template with an existing one for authentication purposes 7 This research aims at using the inexpensive and unobtrusive method of keystroke biometrics to build a user authentication system. The motivation to use this technology for this work comes

1

Garcia, M. (2006, June), Biometric Authentication Tool For User Identification Paper presented at 2006 Annual Conference & Exposition, Chicago, Illinois. 10.18260/1-2--172

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2006 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015