HOME

TheInfoList



OR:

Keystroke dynamics, keystroke biometrics, typing dynamics, or typing biometrics refer to the collection of biometric information generated by key-press-related events that occur when a user
types Type may refer to: Science and technology Computing * Typing, producing text via a keyboard, typewriter, etc. * Data type, collection of values used for computations. * File type * TYPE (DOS command), a command to display contents of a file. * Ty ...
on a keyboard. Use of patterns in key operation to identify operators predates modern computing, and has been proposed as an
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
alternative to passwords and PIN numbers.


Science

The behavioral biometric of keystroke dynamics uses the manner and rhythm in which an individual types characters on a keyboard or keypad. The user's keystroke rhythms are measured to develop a unique biometric template of the user's typing pattern for future authentication. Keystrokes are separated into static and dynamic typing, which are used to help distinguish between authorized and unauthorized users. Vibration information may be used to create a pattern for future use in both identification and authentication tasks.


History

During the late nineteenth century,
telegram Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas pi ...
operators began to develop unique "signatures" that could be identified simply by their tapping rhythm. As late as
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
, the military transmitted messages through
Morse Code Morse code is a telecommunications method which Character encoding, encodes Written language, text characters as standardized sequences of two different signal durations, called ''dots'' and ''dashes'', or ''dits'' and ''dahs''. Morse code i ...
. Using a methodology called "The Fist of the Sender," military intelligence identified that an individual had a unique way of keying in a message's "dots" and "dashes", creating a rhythm that could help distinguish ally from enemy. Keyboard dynamics received attention as a potential alternative to short PIN numbers, which were widely used for authentication early in the expansion of networked computing.


Collection and potential use of keystroke dynamics data

The behavioral biometric of keystroke dynamics uses the manner and rhythm in which an individual types characters on a keyboard or keypad. The user's keystroke rhythms are measured to develop a unique biometric template of the user's typing pattern for future authentication. Keystrokes are separated into static and dynamic typing, which are used to help distinguish between authorized and unauthorized users. Vibration information may be used to create a pattern for future use in both identification and authentication tasks. Keystroke dynamic information could be used to verify or determine the identity of the person producing the keystrokes. The techniques used to do this vary widely in sophistication and range from statistical techniques to artificial intelligence (AI) approaches such as
neural networks A neural network is a group of interconnected units called neurons that send signals to one another. Neurons can be either Cell (biology), biological cells or signal pathways. While individual neurons are simple, many of them together in a netwo ...
. The time to seek and depress a key (seek-time) and the time the key is held down (hold-time) may be characteristic of an individual, regardless of the total speed at which they type. Most people take longer to find or get to specific letters on the keyboard than their average seek-time for all letters. Which letters require more time vary dramatically and consistently for different people.
Right-handed In human biology, handedness is an individual's preferential use of one hand, known as the dominant hand, due to and causing it to be stronger, faster or more Fine motor skill, dextrous. The other hand, comparatively often the weaker, less dext ...
people may be statistically faster in getting to keys they hit with their right-hand fingers than with their left-hand fingers. Index fingers may be faster than other fingers, consistent for a user, regardless of their overall speed. In addition, sequences of letters may have characteristic properties for a user. In English, the use of "the" is very common, and those three letters may be known as a rapid-fire sequence. Common endings, such as "ing", may be entered far faster than the same letters in reverse order ("gni") to the degree that varies consistently by user. This consistency may hold and reveal common sequences of the user's native language even when they are writing entirely in a different language. Common "errors" may also be quite characteristic of a user. There is a taxonomy of errors, such as the user's most common "substitutions", "reversals", "drop-outs", "double-strikes", " adjacent letter hits", "homonyms" and hold-length-errors (for a shift key held down too short or too long a time). Even without knowing what language the user is working in, these errors may be detected by looking at the rest of the text and what letters the user goes back and replaces.


Authentication versus identification

Keystroke dynamics is part of a larger class of biometrics known as behavioral biometrics, a field in which observed patterns are statistical in nature. Because of this inherent uncertainty, a commonly held belief is that behavioral biometrics are not as reliable as biometrics used for authentication based on physically observable characteristics such as
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfa ...
s or retinal scans or
DNA Deoxyribonucleic acid (; DNA) is a polymer composed of two polynucleotide chains that coil around each other to form a double helix. The polymer carries genetic instructions for the development, functioning, growth and reproduction of al ...
. Behavioral biometrics use a ''confidence'' measurement in replacement of the traditional ''pass/fail'' measurements. As such, the traditional benchmarks of False Acceptance Rate (FAR) and False Rejection Rates (FRR) no longer have linear relationships. The benefit to keystroke dynamics (as well as other behavioral biometrics) is that FRR/FAR can be adjusted by changing the acceptance threshold at the individual level. This allows for explicitly defined individual risk mitigation that physical biometric technologies could not achieve. One of the major problems that keystroke dynamics runs into is that a user's typing varies substantially during a day and between different days and may be affected by any number of external factors. Because of these variations, any system will make false-positive and false-negative errors. Some successful commercial products have strategies to handle these issues and have proven effective in large-scale use in real-world settings and applications.


Legal and regulatory issues

Use of keylogging software may be in direct and explicit violation of local laws, such as the U.S. Patriot Act, under which such use may constitute wire-tapping.


Patents

* * * * * * * P. Nordström, J. Johansson. Security system and method for detecting intrusion in a computerized system. Patent No. 2 069 993, European Patent Office, 2009. *


Other uses

Because human beings generate keystroke timings, they are not well correlated with external processes. They are frequently used as a source of hardware-generated random numbers for computer systems. Mental health symptoms such as depression and anxiety have also been correlated with keystroke timing features.


See also

* Fist (telegraphy)


References


Other references

*Checco, J. (2003). Keystroke Dynamics & Corporate Security. ''WSTA Ticker Magazine''

* *iMagic Software. (vendor web-sit

May 2006). Notes: Vendor specializing in keystroke authentication for large enterprises. *AdmitOne Security - formerly BioPassword. (vendor web-site home eb Page UR

Notes: Vendor specializing in keystroke dynamics *Garcia, J. (Inventor). (1986). Personal identification apparatus. (USA 4621334). Notes:'' US Patent Office''

*Bender, S and Postley, H. (Inventors) (2007). Key sequence rhythm recognition system and method. (USA 7206938), Notes:'' US Patent Office''

*Joyce, R., & Gupta, G. (1990). Identity authorization based on keystroke latencies. ''Communications of the ACM'', 33(2), 168-176. Notes: Review up through 1990 * * much cited * *Monrose, F. R. M. K., & Susanne Wetzel, Wetzel, S. (1999). Password hardening based on keystroke dynamics. ''Proceedings of the 6th ACM Conference on Computer and Communications Security'', 73-82. Notes: Kent Ridge Digital Labs, Singapore * *Young, J. R., & Hammon, R. W. (Inventors). (1989). Method and apparatus for verifying an individual's identity. 4805222). Notes: ''US Patent Office'' -

*Vertical Company LTD. (vendor web-sit

October 2006). Notes: Vendor specializing in keystroke authentication solutions for government and commercial agencies. *Lopatka, M. & Peetz, M.H. (2009). Vibration Sensitive Keystroke Analysis. ''Proceedings of the 18th Annual Belgian-Dutch Conference on Machine Learning'', 75-8

*Coalfire Systems Compliance Validation Assessment (2007) https://web.archive.org/web/20110707084309/http://www.admitonesecurity.com/admitone_library/AOS_Compliance_Functional_Assessment_by_Coalfire.pdf * *


Further reading

* {{DEFAULTSORT:Keystroke dynamics User interfaces Biometrics