Abstract
The variables that help make a handwritten signature a unique human identifier also provide a unique digital signature in the form of a stream of latency periods between keystrokes. This article describes a method of verifying the identity of a user based on such a digital signature, and reports results from trial usage of the system.
- 1 Card, S.K., Moran, T.P., and Newell, A. The keystrok,-level model for user performance time with interactive systems. Commun. ACM 23, 7 (July 1980), 396-409. Google ScholarDigital Library
- 2 Gaines, R., Lisowski, W., Press, S., and Shapiro, N. Authentication by user performance time with interactive systems. commun. ACM NSF. Rand Corporation, Santa Monica, CA, 1980.Google Scholar
- 3 Garcia, J. Personal identification apparatus. Patent Number 4,621,334. U.S. Patent and Trademark Office. Washington. D.C. 1986.Google Scholar
- 4 Joyce, R., and Gupta, G. User authentication based on keystroke latencies. Technical Report #5, Department of Computer Science, james Cook University, Australia, 1989.Google Scholar
- 5 Leggett, J., and Williams, G. Verifying identity via keyboard characteristics. Int. J. Man-Machine Studies 23, 1 (Jan. 1988), 67-76. Google ScholarDigital Library
- 6 Leggett ,williams,G. and Umphress, D.Verification of user identity ia keyboard characteristics. In Human Factors in Management Information Systems, J.M. Carey, Ed., Ablex Publishing, Norwood, NJ. Google ScholarDigital Library
- 7 Urnphress, D., and Williams, G. Identity verification through keyboard characteristics. Int. J. Man-Machine Studies 23, 3 (Sept. 1985), 263-273.Google Scholar
- 8 Young, J.R., and Hammon, R.W. Method and apparatus for verifying an individual's identity. Patent Number 4,805,222. U.S. Patent and Trademark Office, Washington, D.C., 1989.Google Scholar
Index Terms
- Identity authentication based on keystroke latencies
Recommendations
Identity-Based signcryption from identity-based cryptography
WISA'11: Proceedings of the 12th international conference on Information Security ApplicationsA signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain ...
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption (IBPRE), where a semi-trusted proxy with some information (a.k.a. re-encryption key), can transform a ciphertext under an identity to another ciphertext under another ...
Fuzzy identity based signature with applications to biometric authentication
We introduce a new cryptographic primitive which is the signature analog of fuzzy identity based encryption (FIBE). We call it fuzzy identity based signature (FIBS). It possesses similar error-tolerance property as FIBE that allows a user with the ...
Comments