Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

An novel two layer user identification method

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Wen-Pinn Fang ; Dept. of Comput. Sci. & Inf. Eng., Yuanpei Univ., Hsinchu ; Hong-Ru Lee ; Fang-Pan Line

This paper proposed a two layer authorization mechanism, including traditional password system and rhythm recognition. The whole system includes two phases: preprocessing and usual operation for users. In preprocessing phase, users type password in a specific rhythm in order to record and analyse the characteristics of behaviour of users. In the second phase, how to verify a user in usual operation is described. The main recognition procedure consists of two stages: password check and rhythm recognition separately. User shall input correct password in correct rhythm. Here rhythm is a sequence of beats with various time intervals in between. The beat is in correspondent with every key down event. In the authorization procedure, system will check ID and password first. At the same time, system will record all time intervals of key down events. After recording all time intervals, system compares the characteristics of the resultant rhythm with that in user database. If the distance is under some threshold of error tolerance, user will be authorized. Otherwise, entering system will not be approved. The proposed two layer authorization method successfully enhances the security and efficiency of password system. The proposed distance calculation enables our calculation to be much cost effective than that of other rhythm recognition methods.

Published in:

Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on

Date of Conference:

17-20 June 2008