Featured Research

from universities, journals, and other organizations

Hey ... You're Not My User! Software Identifies Computer Users By Typing Style

Date:
October 3, 2003
Source:
American Technion Society
Summary:
Computing may be getting a lot more personal. Researchers at the Technion-Israel Institute of Technology have developed software that is able to identify computer users – with high accuracy – by their individual, distinct typing styles. This "behaviometric" technology may one day be part of security systems to prevent unauthorized users from gaining access to computers and sensitive data.

Computing may be getting a lot more personal. Researchers at the Technion-Israel Institute of Technology have developed software that is able to identify computer users – with high accuracy – by their individual, distinct typing styles. This "behaviometric" technology may one day be part of security systems to prevent unauthorized users from gaining access to computers and sensitive data.

Related Articles


The technology can be extended to other applications that involve a sufficiently complex interaction between humans and machines. Examples of such applications would include the identification of unauthorized drivers or pilots.

The system prototype was developed in the Data Mining Lab of the Technion’s Computer Science Faculty by students Ido Yariv and Mordechai Nisenson, under the supervision of Technion Professors Ran El-Yaniv and Ron Meir. The group’s findings were presented on September 25, 2003 at the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD) held in Cavtat, Croatia.

"This software is based upon a universal prediction algorithm," explains El-Yaniv. "It utilizes statistics gathered while a person types freely, and learns the specific behavior patterns that accurately identify the typist." He goes on to explain that time differential patterns between consecutive keystrokes can uniquely determine a user. In some cases, this can be accomplished after only a very few keystrokes.

The system’s innovation is the ability to identify the legal user as he/she types freely, a stark contrast to currently existing technologies that can only achieve equally high recognition rates if both the legal user and the intruder are asked to type the same long sentence (similar to standard passwords).

The system’s accuracy depends upon the length of its training. But even after a relatively short session consisting of several typed sentences, the system can distinguish the user from potential intruders with around 90 percent accuracy from a sentence as short as ‘What did you do today?’ After its initial training, the system continues monitoring the user and obtaining more keystroke sequences, allowing it to reach extremely high rates of recognition.

According to El-Yaniv, typing is a complex sequence of events. Many processes and factors make up this sequence, including language fluency, mental attributes, fine motor skills, hand size and finger length. As part of their ongoing research, the group will study the system’s reliability in the face of "noise" that can be introduced by many factors such as a finger injury. El-Yaniv believes that since it is the user’s behavior that is being measured (through the timing of keystrokes), there would still be enough information by which to make a very accurate identification.

The Technion-Israel Institute of Technology is Israel's leading science and technology university. It commands a worldwide reputation for its pioneering work in computer science, biotechnology, water-resource management, materials engineering, aerospace and medicine. The majority of the founders and managers of Israel's high-tech companies are alumni. Based in New York City, the American Technion Society is the leading American organization supporting higher education in Israel, with more than 20,000 supporters and 19 offices around the country.


Story Source:

The above story is based on materials provided by American Technion Society. Note: Materials may be edited for content and length.


Cite This Page:

American Technion Society. "Hey ... You're Not My User! Software Identifies Computer Users By Typing Style." ScienceDaily. ScienceDaily, 3 October 2003. <www.sciencedaily.com/releases/2003/10/031003062125.htm>.
American Technion Society. (2003, October 3). Hey ... You're Not My User! Software Identifies Computer Users By Typing Style. ScienceDaily. Retrieved November 25, 2014 from www.sciencedaily.com/releases/2003/10/031003062125.htm
American Technion Society. "Hey ... You're Not My User! Software Identifies Computer Users By Typing Style." ScienceDaily. www.sciencedaily.com/releases/2003/10/031003062125.htm (accessed November 25, 2014).

Share This


More From ScienceDaily



More Computers & Math News

Tuesday, November 25, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

FCC Forces T-Mobile To Alert Customers Of Data Throttling

FCC Forces T-Mobile To Alert Customers Of Data Throttling

Newsy (Nov. 25, 2014) T-Mobile and the FCC have reached an agreement requiring the company to alert customers when it throttles their data speeds. Video provided by Newsy
Powered by NewsLook.com
Symantec Uncovers Sophisticated Spying Malware Regin

Symantec Uncovers Sophisticated Spying Malware Regin

Newsy (Nov. 24, 2014) A Symantec white paper reveals details about Regin, a spying malware of unusual complexity which is believed to be state-sponsored. Video provided by Newsy
Powered by NewsLook.com
How to Keep Your Android Device Safe This Holiday Season

How to Keep Your Android Device Safe This Holiday Season

Howdini (Nov. 24, 2014) Protect yourself against malware and hackers, especially during the hectic online shopping season. Mobile device security makes a great holiday gift and protects your loved ones from cyber attacks and identity theft. Video provided by Howdini
Powered by NewsLook.com
How to Keep You and Your Family's Identitiy Safe Online This Holiday Season

How to Keep You and Your Family's Identitiy Safe Online This Holiday Season

Howdini (Nov. 24, 2014) The hectic holiday season is a prime time for online identity theft, so make sure you’re protected.Be cautious when shopping online Internet security software makes a great holiday gift and protects your loved ones from cyber attacks and identity theft. Video provided by Howdini
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins