Security firm touts 'typing fingerprint'

Powered by SC Magazine
 

User authentication firm e-Solutions has developed an system based on individual typing behaviour, including speed, rhythm and agility..

The technology is designed to overcome some of the existing problems with biometric technology by adding an extra layer of security to normal log-in systems.

Biometrics is being hailed by many as an effective way to improve security and verify identification.

However, e-Solutions believes that many existing biometric technologies, like fingerprint readers and retina scanners, are problematic and expensive to install and operate.

The Remote Biometric Authentication system analyses typing characteristics to create an individual user profile or 'typing fingerprint'.

The software senses pauses, mistakes and speed, which e-Solutions reckons are just as personally identifiable as handwriting.

E-Solutions claims that the system works regardless of the environment or keyboard being used, even one unfamiliar to the user, and can also be used to verify the creator of documents and other content.

"Two-factor authentication has become commonplace in confirming remote worker identity. But it can be cost prohibitive for many organisations," said Angus Stewart, managing director at e-Solutions.

"Remote Biometric Authentication requires no additional hardware, management costs or user training and can be built into other applications easily."

Copyright ©v3.co.uk


 
 
 
Top Stories
Westpac committed to core banking plan
[Blog post] Now with leadership.
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1135

Vote