Stories
Slash Boxes
Comments

SoylentNews is people

posted by n1 on Thursday May 29 2014, @07:49PM   Printer-friendly
from the sign-your-tactile-signature-here dept.

DefenceTech reports:

The rhythm, timing and tactile characteristics of how a person types on a computer keyboard or presses keys on a smartphone screen can be used to verify identify and prevent hacking and computer fraud, according to an ongoing project with the Pentagon's research arm and Louisiana Tech University.

Computer scientists with Louisiana Tech University are working on a collaborative project with the Defense Advanced Projects Research Agency, or DARPA, to refine algorithms able to authenticate computer and smartphone users. This is the sort of project that could release the military from having to use Common Access Cards to access government computers.

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Insightful) by bob_super on Thursday May 29 2014, @07:56PM

    by bob_super (1357) on Thursday May 29 2014, @07:56PM (#48895)

    We've heard that many times, but I still haven't read any study about the reliability of the authentication when life happens to the users.
    Stress, injury, load, tiredness, keyboard style, position changes, getting shot at... how do your typing skills hold up?

    • (Score: 5, Funny) by frojack on Thursday May 29 2014, @08:11PM

      by frojack (1554) Subscriber Badge on Thursday May 29 2014, @08:11PM (#48902) Journal

      Doesn't take that big of a life event to change typing style.

      Just listening to the radio or music, in the background can change your typing cadence. Years ago, three of us were in the office busily typing code when Funky Town came on the radio and within a few seconds we were all typing in tyme with the music. Much hilarity ensued.

      I'm not convinced that this development is a security feature or another spying technology.

      --
      No, you are mistaken. I've always had this sig.
    • (Score: 3, Interesting) by FatPhil on Thursday May 29 2014, @08:41PM

      by FatPhil (863) <pc-soylentNO@SPAMasdf.fi> on Thursday May 29 2014, @08:41PM (#48911) Homepage
      My workmates have always been able to know it's me. I was even given a native-style nickname of (he who) "types with stabs" once.

      Everyone else in the office? They all sound the same to me.
      --
      Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
    • (Score: 3, Insightful) by mrider on Thursday May 29 2014, @10:31PM

      by mrider (3252) on Thursday May 29 2014, @10:31PM (#48940)

      So when I'm using a telephone handset and typing with one hand - the computer locks me out? Yeah, that will work GREAT for me...

      --

      Doctor: "Do you hear voices?"

      Me: "Only when my bluetooth is charged."

  • (Score: 2, Funny) by Alfred on Thursday May 29 2014, @09:01PM

    by Alfred (4006) on Thursday May 29 2014, @09:01PM (#48917) Journal

    this would prevent a lot of drunk texts.

  • (Score: 3, Insightful) by kaszz on Thursday May 29 2014, @09:09PM

    by kaszz (4211) on Thursday May 29 2014, @09:09PM (#48920) Journal

    This is decades old. And it's an security by obscurity protection. Because if the target is enough high value. Someone will learn the typing pattern of their target. Just as people can imitate voice, gait, clothing style etc. Or simple bring an adapter that will imitate said pattern.

    • (Score: 2) by skullz on Thursday May 29 2014, @10:12PM

      by skullz (2532) on Thursday May 29 2014, @10:12PM (#48936)

      Yes BUT... if you are at Louisiana Tech University you can publish a paper on it and graduate. So this technique is not entirely useless.

      • (Score: 2) by kaszz on Thursday May 29 2014, @11:21PM

        by kaszz (4211) on Thursday May 29 2014, @11:21PM (#48959) Journal

        It's a method to bypass the examination evaluation algorithm ;-)

  • (Score: 4, Informative) by wonkey_monkey on Thursday May 29 2014, @10:18PM

    by wonkey_monkey (279) on Thursday May 29 2014, @10:18PM (#48938) Homepage

    The rhythm, timing and tactile characteristics of how a person types on a computer keyboard or presses keys on a smartphone screen can be used to verify identi[t]y and prevent hacking and computer fraud, according to an ongoing project with the Pentagon's research arm and Louisiana Tech University.

    I heard something like this about 20 years ago, and nothing came of it back then, either.

    It doesn't take an "ongoing project" to come to this rather obvious conclusion, and it doesn't much more thinking to show you that it's not going to be the greatest of security measures.

    --
    systemd is Roko's Basilisk
  • (Score: 2, Insightful) by Max Hyre on Friday May 30 2014, @02:49AM

    by Max Hyre (3427) <{maxhyre} {at} {yahoo.com}> on Friday May 30 2014, @02:49AM (#48988)
    If it could be used reliably as additional verification, great, but what I really want is a way to prevent the snoopers from using it as a keystroke logger.