DefenceTech reports:
The rhythm, timing and tactile characteristics of how a person types on a computer keyboard or presses keys on a smartphone screen can be used to verify identify and prevent hacking and computer fraud, according to an ongoing project with the Pentagon's research arm and Louisiana Tech University.
Computer scientists with Louisiana Tech University are working on a collaborative project with the Defense Advanced Projects Research Agency, or DARPA, to refine algorithms able to authenticate computer and smartphone users. This is the sort of project that could release the military from having to use Common Access Cards to access government computers.
This discussion has been archived.
No new comments can be posted.
DARPA Develops Keyboard Security System
|
Log In/Create an Account
| Top
| 10 comments
| Search Discussion
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(Score: 5, Insightful) by bob_super on Thursday May 29 2014, @07:56PM
We've heard that many times, but I still haven't read any study about the reliability of the authentication when life happens to the users.
Stress, injury, load, tiredness, keyboard style, position changes, getting shot at... how do your typing skills hold up?
(Score: 5, Funny) by frojack on Thursday May 29 2014, @08:11PM
Doesn't take that big of a life event to change typing style.
Just listening to the radio or music, in the background can change your typing cadence. Years ago, three of us were in the office busily typing code when Funky Town came on the radio and within a few seconds we were all typing in tyme with the music. Much hilarity ensued.
I'm not convinced that this development is a security feature or another spying technology.
No, you are mistaken. I've always had this sig.
(Score: 3, Interesting) by FatPhil on Thursday May 29 2014, @08:41PM
Everyone else in the office? They all sound the same to me.
Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
(Score: 3, Insightful) by mrider on Thursday May 29 2014, @10:31PM
So when I'm using a telephone handset and typing with one hand - the computer locks me out? Yeah, that will work GREAT for me...
Doctor: "Do you hear voices?"
Me: "Only when my bluetooth is charged."
(Score: 2, Funny) by Alfred on Thursday May 29 2014, @09:01PM
this would prevent a lot of drunk texts.
(Score: 3, Insightful) by kaszz on Thursday May 29 2014, @09:09PM
This is decades old. And it's an security by obscurity protection. Because if the target is enough high value. Someone will learn the typing pattern of their target. Just as people can imitate voice, gait, clothing style etc. Or simple bring an adapter that will imitate said pattern.
(Score: 2) by skullz on Thursday May 29 2014, @10:12PM
Yes BUT... if you are at Louisiana Tech University you can publish a paper on it and graduate. So this technique is not entirely useless.
(Score: 2) by kaszz on Thursday May 29 2014, @11:21PM
It's a method to bypass the examination evaluation algorithm ;-)
(Score: 4, Informative) by wonkey_monkey on Thursday May 29 2014, @10:18PM
I heard something like this about 20 years ago, and nothing came of it back then, either.
It doesn't take an "ongoing project" to come to this rather obvious conclusion, and it doesn't much more thinking to show you that it's not going to be the greatest of security measures.
systemd is Roko's Basilisk
(Score: 2, Insightful) by Max Hyre on Friday May 30 2014, @02:49AM