Security firm touts 'typing fingerprint'

Powered by SC Magazine
 

User authentication firm e-Solutions has developed an system based on individual typing behaviour, including speed, rhythm and agility..

The technology is designed to overcome some of the existing problems with biometric technology by adding an extra layer of security to normal log-in systems.

Biometrics is being hailed by many as an effective way to improve security and verify identification.

However, e-Solutions believes that many existing biometric technologies, like fingerprint readers and retina scanners, are problematic and expensive to install and operate.

The Remote Biometric Authentication system analyses typing characteristics to create an individual user profile or 'typing fingerprint'.

The software senses pauses, mistakes and speed, which e-Solutions reckons are just as personally identifiable as handwriting.

E-Solutions claims that the system works regardless of the environment or keyboard being used, even one unfamiliar to the user, and can also be used to verify the creator of documents and other content.

"Two-factor authentication has become commonplace in confirming remote worker identity. But it can be cost prohibitive for many organisations," said Angus Stewart, managing director at e-Solutions.

"Remote Biometric Authentication requires no additional hardware, management costs or user training and can be built into other applications easily."

Copyright ©v3.co.uk


 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 328

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 136

Vote