Featured Research

from universities, journals, and other organizations

Engineers use keyboard, mouse and mobile device 'fingerprints' to protect data

Date:
November 19, 2013
Source:
Iowa State University
Summary:
Engineers are working to protect computer networks and data by using unique keyboard, computer mouse and mobile device "fingerprints."

Iowa State's Morris Chang, Terry Fang and Danny Shih, left to right, are working to use typing, mouse and mobile device use patterns to secure networks and data.
Credit: Photo by Amy Vinchattle/Iowa State University

We've all typed in a password to access a computer network. But how secure is that? Passwords can be hacked or hijacked to get at sensitive personal, corporate or even national security data.

That reality has Iowa State engineers looking for methods beyond passwords to verify computer users and protect data. They started by tracking individual typing patterns; now they're working to identify and track individual patterns for using a mobile device or a computer mouse.

Morris Chang, an Iowa State University associate professor of electrical and computer engineering, says the patterns are unique to individuals.

"These pauses between words, searches for unusual characters and spellings of unfamiliar words, all have to do with our past experiences, our learning experiences," he said. "And so we call them 'cognitive fingerprints' which manifest themselves in typing rhythms."

Prototype software technology developed by Chang and his research team can identify differences in typing rhythms: In experiments at Iowa State involving more than 2,000 computer users, the technology recorded false acceptance and rejection rates of .5 percent.

"Our technology is able to distinguish legitimate users versus imposters, based on the large-scale experiments we've been able to conduct," Chang said.

He also said engineers can improve those accuracy rates by combining analysis of typing patterns with analysis of mouse or mobile device patterns.

A defense initiative The Defense Advanced Research Projects Agency (DARPA) of the U.S. Department of Defense has supported Chang's study of typing patterns with a one-year grant of $500,000. It is now supporting additional work in mobile device and mouse patterns with a two-year, $1.76 million grant.

Working with Chang to develop the cyber security technologies are Terry Fang, Kuan-Hsing Ho and Danny Shih, Iowa State graduate students in electrical and computer engineering.

Chang said studies of keystroke dynamics go all the way back to the Morse code days. But he said the earlier attempts weren't accurate enough to reliably identify users. The available technology just wasn't up to the job.

"The technology we use today helped us to facilitate our research approach," Chang said.

The engineers' Cognitive Typing Rhythm technology records and collects a computer user's typing patterns during a 90-minute typing exercise. That information is then loaded into the security system where it can be used to constantly monitor network users.

"The system can see if the same person or an imposter is coming in to hijack the computer," Chang said.

And when the system detects a hijacking, Chang said it could lock a user out of the network, restrict access to sensitive information or ask for another password.

The technology operates behind the scenes and is invisible to computer users. It doesn't require any additional hardware. And it's now available for licensing from the Iowa State University Research Foundation.

"When you use a computer today, the user is typically only verified during the initial login," Chang said. "But DARPA wanted to know how we can assure the same person is using the computer as long as a session is still active. We had a hypothesis about how to do that, we implemented it and we proved it."


Story Source:

The above story is based on materials provided by Iowa State University. Note: Materials may be edited for content and length.


Cite This Page:

Iowa State University. "Engineers use keyboard, mouse and mobile device 'fingerprints' to protect data." ScienceDaily. ScienceDaily, 19 November 2013. <www.sciencedaily.com/releases/2013/11/131119100929.htm>.
Iowa State University. (2013, November 19). Engineers use keyboard, mouse and mobile device 'fingerprints' to protect data. ScienceDaily. Retrieved April 24, 2014 from www.sciencedaily.com/releases/2013/11/131119100929.htm
Iowa State University. "Engineers use keyboard, mouse and mobile device 'fingerprints' to protect data." ScienceDaily. www.sciencedaily.com/releases/2013/11/131119100929.htm (accessed April 24, 2014).

Share This



More Computers & Math News

Thursday, April 24, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Will New FCC Rules Trigger Death Of Net Neutrality?

Will New FCC Rules Trigger Death Of Net Neutrality?

Newsy (Apr. 24, 2014) The Federal Communications Commission will reportedly propose new rules for Net neutrality that could undermine the principles of a free and open Web. Video provided by Newsy
Powered by NewsLook.com
Apple Beats Estimates, Most Looking to Second Half of 2014

Apple Beats Estimates, Most Looking to Second Half of 2014

TheStreet (Apr. 24, 2014) TheStreet's Stephanie Link and Real Money Contributor Dan Nathan discuss Apple's first quarter results. Link and Nathan expected the tech giant to lower guidance for the current quarter which they felt could send shares lower and present a buying opportunity. Nathan says options are cheap because Apple has been aggressively buying back shares. Video provided by TheStreet
Powered by NewsLook.com
Raw: Obama Plays Soccer With Japanese Robot

Raw: Obama Plays Soccer With Japanese Robot

AP (Apr. 24, 2014) President Obama briefly played soccer with a robot during his visit to Japan on Thursday. The President has been emphasizing technology along with security concerns during his visit. (April 24) Video provided by AP
Powered by NewsLook.com
Obama Encourages Japanese Student-Scientists

Obama Encourages Japanese Student-Scientists

AP (Apr. 24, 2014) President Obama spoke with student innovators in Japan and urged them to take part in increased opportunities for student exchanges with the US. (April 24) Video provided by AP
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins