TY - GEN
T1 - A method of automatic user authentication by fulltime monitoring of keystroke timings
AU - Nakakuni, Masanori
AU - Dozono, Hiroshi
AU - Eisuke, I. T.O.
AU - Kasahara, Yoshiaki
PY - 2008
Y1 - 2008
N2 - This paper will propose a method of user authentication that constantly monitors the keystroke timings of a computer user, identifies a user based on the characteristics of keystrokes and discovers spoofing. This method authenticates users by comparing past and current keystroke timings when a user is working on a computer. This method has the following two main advantages. One is that it discovers spoofing even when users change while logged in. When a user pushes keys to operate a computer, the computer automatically performs personal authentication. Users do not have to take any special action for personal authentication. This paper will also propose how to enhance security using these characteristics in combination with existing user authentication methods.
AB - This paper will propose a method of user authentication that constantly monitors the keystroke timings of a computer user, identifies a user based on the characteristics of keystrokes and discovers spoofing. This method authenticates users by comparing past and current keystroke timings when a user is working on a computer. This method has the following two main advantages. One is that it discovers spoofing even when users change while logged in. When a user pushes keys to operate a computer, the computer automatically performs personal authentication. Users do not have to take any special action for personal authentication. This paper will also propose how to enhance security using these characteristics in combination with existing user authentication methods.
UR - http://www.scopus.com/inward/record.url?scp=62949201840&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=62949201840&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:62949201840
SN - 160132085X
SN - 9781601320858
T3 - Proceedings of the 2008 International Conference on Security and Management, SAM 2008
SP - 58
EP - 63
BT - Proceedings of the 2008 International Conference on Security and Management, SAM 2008
T2 - 2008 International Conference on Security and Management, SAM 2008
Y2 - 14 July 2008 through 17 July 2008
ER -