Bhatt et al., 2013 - Google Patents
Keystroke dynamics for biometric authentication—A surveyBhatt et al., 2013
- Document ID
- 2582920212345673304
- Author
- Bhatt S
- Santhanam T
- Publication year
- Publication venue
- 2013 international conference on pattern recognition, informatics and mobile engineering
External Links
Snippet
The latest trend in authenticating users is by using the potentiality of biometrics. Keystroke dynamics is a behavioural biometrics which captures the typing rhythms of users and then authenticates them based on the dynamics captured. In this paper, a detailed study on the …
- 230000003542 behavioural 0 abstract description 10
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00103—Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0861—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bhatt et al. | Keystroke dynamics for biometric authentication—A survey | |
| Abuhamad et al. | AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors | |
| Ayotte et al. | Fast free-text authentication via instance-based keystroke dynamics | |
| Shanmugapriya et al. | A survey of biometric keystroke dynamics: Approaches, security and challenges | |
| Ali et al. | Keystroke biometric systems for user authentication | |
| Karnan et al. | Biometric personal authentication using keystroke dynamics: A review | |
| Monrose et al. | Keystroke dynamics as a biometric for authentication | |
| Teh et al. | A survey of keystroke dynamics biometrics | |
| Crawford | Keystroke dynamics: Characteristics and opportunities | |
| Tasia et al. | Two novel biometric features in keystroke dynamics authentication systems for touch screen devices | |
| Bergadano et al. | Identity verification through dynamic keystroke analysis | |
| Rybnik et al. | A keystroke dynamics based system for user identification | |
| Ali et al. | Authentication and identification methods used in keystroke biometric systems | |
| Maiorana et al. | Mobile keystroke dynamics for biometric recognition: An overview | |
| Pahuja et al. | Biometric authentication & identification through behavioral biometrics: A survey | |
| Rybnik et al. | An exploration of keystroke dynamics authentication using non-fixed text of various length | |
| Saifan et al. | A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices | |
| Quraishi et al. | Keystroke dynamics biometrics, a tool for user authentication–review | |
| Rybnik et al. | User authentication with keystroke dynamics using fixed text | |
| Bhardwaj et al. | A novel behavioural biometric technique for robust user authentication | |
| Jagadeesan et al. | A novel approach to design of user re-authentication systems | |
| Li et al. | Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion | |
| Haque et al. | Authentication through keystrokes: What you type and how you type | |
| Avasthi et al. | Biometric authentication techniques: a study on keystroke dynamics | |
| Giot et al. | Keystroke dynamics authentication |