Users ID'ed through typing, mouse movements

Powered by SC Magazine
 

Continuous authentication app created from DARPA research.

Researchers have built a continuous authentication platform that can accurately identify users based on their typing patterns.

A series of 90 minute typing tests carried out on 2000 people at Iowa State University found users could be identified with a half percent margin of error based on the way they hit keys.

The work has been spun into an application that could continuously authenticate users and lock accounts if another person jumped on the computer resulting in irregularities being detected. (pdf)

Uniquely syncopated mouse and keyboard patterns made it possible to identify users, Iowa State University associate professor Morris Chang said.

“These pauses between words, searches for unusual characters and spellings of unfamiliar words, all have to do with our past experiences, our learning experiences,” Chang said. “And so we call them cognitive fingerprints which manifest themselves in typing rhythms.”

“The system can see if the same person or an imposter is coming in to hijack the computer."

The year-long research run together with electrical engineering students Terry Fang, Kuan-Hsing Ho and Danny Shih received a half a million dollar grant from the US Defense Advanced Research Projects Agency which sought to discover if continuous authentication was possible.

It was now being extended to capture mouse movements and touch inputs from mobile devices with an additional $1.76 million dollars from the agency over two years.

Copyright © SC Magazine, Australia


Users ID'ed through typing, mouse movements
Credit: xlibber
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Credit: xlibber
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 439

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 210

Vote