Quraishi et al., 2018 - Google Patents
Keystroke dynamics biometrics, a tool for user authentication–reviewQuraishi et al., 2018
- Document ID
- 9739818963104230257
- Author
- Quraishi S
- Bedi S
- Publication year
- Publication venue
- 2018 International Conference on System Modeling & Advancement in Research Trends (SMART)
External Links
Snippet
User Specific traits are a very strong method to strengthen the security of any system as it makes the system connected to a specific individual instead of being accessed through some token, key, etc. Keystroke Dynamics is one such method which is inexpensive and …
- 238000011160 research 0 description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00103—Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bhatt et al. | Keystroke dynamics for biometric authentication—A survey | |
| Ahmed et al. | Biometric recognition based on free-text keystroke dynamics | |
| Teh et al. | Strengthen user authentication on mobile devices by using user’s touch dynamics pattern | |
| Teh et al. | A survey of keystroke dynamics biometrics | |
| Zhong et al. | A survey on keystroke dynamics biometrics: approaches, advances, and evaluations | |
| Revett et al. | A machine learning approach to keystroke dynamics based user authentication | |
| Quraishi et al. | Keystroke dynamics biometrics, a tool for user authentication–review | |
| Davoudi et al. | A new distance measure for free text keystroke authentication | |
| Ali et al. | Authentication and identification methods used in keystroke biometric systems | |
| Schclar et al. | User authentication based on representative users | |
| Mondal et al. | Continuous authentication and identification for mobile devices: Combining security and forensics | |
| Pahuja et al. | Biometric authentication & identification through behavioral biometrics: A survey | |
| Singh et al. | Enhanced password based security system based on user behavior using neural networks | |
| Patel et al. | Keystroke dynamics using auto encoders | |
| Rybnik et al. | An exploration of keystroke dynamics authentication using non-fixed text of various length | |
| Giot et al. | Keystroke dynamics authentication | |
| Kochegurova et al. | Aspects of continuous user identification based on free texts and hidden monitoring | |
| Budžys et al. | Deep learning-based authentication for insider threat detection in critical infrastructure | |
| Grzenda et al. | Evaluation of machine learning methods for impostor detection in web applications | |
| Yang et al. | Unsupervised sensor-based continuous authentication with low-rank transformer using learning-to-rank algorithms | |
| Abo‐alian et al. | Keystroke dynamics‐based user authentication service for cloud computing | |
| Al Solami et al. | Continuous biometric authentication: Can it be more practical? | |
| Quraishi et al. | Secure system of continuous user authentication using mouse dynamics | |
| Neha et al. | Biometric re-authentication: An approach towards achieving transparency in user authentication | |
| Venugopal et al. | Applying empirical thresholding algorithm for a keystroke dynamics based authentication system |