Security firm touts 'typing fingerprint'

Powered by SC Magazine
 

User authentication firm e-Solutions has developed an system based on individual typing behaviour, including speed, rhythm and agility..

The technology is designed to overcome some of the existing problems with biometric technology by adding an extra layer of security to normal log-in systems.

Biometrics is being hailed by many as an effective way to improve security and verify identification.

However, e-Solutions believes that many existing biometric technologies, like fingerprint readers and retina scanners, are problematic and expensive to install and operate.

The Remote Biometric Authentication system analyses typing characteristics to create an individual user profile or 'typing fingerprint'.

The software senses pauses, mistakes and speed, which e-Solutions reckons are just as personally identifiable as handwriting.

E-Solutions claims that the system works regardless of the environment or keyboard being used, even one unfamiliar to the user, and can also be used to verify the creator of documents and other content.

"Two-factor authentication has become commonplace in confirming remote worker identity. But it can be cost prohibitive for many organisations," said Angus Stewart, managing director at e-Solutions.

"Remote Biometric Authentication requires no additional hardware, management costs or user training and can be built into other applications easily."

Copyright ©v3.co.uk


 
 
 
Top Stories
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
Will Nutanix be outflanked before reaching IPO?
VMware muscles in on storage startup in hyper-converged infrastructure.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 603

Vote