Skip to Main Content
This paper proposed a two layer authorization mechanism, including traditional password system and rhythm recognition. The whole system includes two phases: preprocessing and usual operation for users. In preprocessing phase, users type password in a specific rhythm in order to record and analyse the characteristics of behaviour of users. In the second phase, how to verify a user in usual operation is described. The main recognition procedure consists of two stages: password check and rhythm recognition separately. User shall input correct password in correct rhythm. Here rhythm is a sequence of beats with various time intervals in between. The beat is in correspondent with every key down event. In the authorization procedure, system will check ID and password first. At the same time, system will record all time intervals of key down events. After recording all time intervals, system compares the characteristics of the resultant rhythm with that in user database. If the distance is under some threshold of error tolerance, user will be authorized. Otherwise, entering system will not be approved. The proposed two layer authorization method successfully enhances the security and efficiency of password system. The proposed distance calculation enables our calculation to be much cost effective than that of other rhythm recognition methods.