Security firm touts 'typing fingerprint'

Powered by SC Magazine
 

User authentication firm e-Solutions has developed an system based on individual typing behaviour, including speed, rhythm and agility..

The technology is designed to overcome some of the existing problems with biometric technology by adding an extra layer of security to normal log-in systems.

Biometrics is being hailed by many as an effective way to improve security and verify identification.

However, e-Solutions believes that many existing biometric technologies, like fingerprint readers and retina scanners, are problematic and expensive to install and operate.

The Remote Biometric Authentication system analyses typing characteristics to create an individual user profile or 'typing fingerprint'.

The software senses pauses, mistakes and speed, which e-Solutions reckons are just as personally identifiable as handwriting.

E-Solutions claims that the system works regardless of the environment or keyboard being used, even one unfamiliar to the user, and can also be used to verify the creator of documents and other content.

"Two-factor authentication has become commonplace in confirming remote worker identity. But it can be cost prohibitive for many organisations," said Angus Stewart, managing director at e-Solutions.

"Remote Biometric Authentication requires no additional hardware, management costs or user training and can be built into other applications easily."

Copyright ©v3.co.uk


 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1051

Vote