Abstract:
An approach to securing access to computer systems is described. By performing real-time measurements of the time durations between the keystrokes when a password is ente...Show MoreMetadata
First Page of the Article

Abstract:
An approach to securing access to computer systems is described. By performing real-time measurements of the time durations between the keystrokes when a password is entered and using pattern-recognition algorithms, three online recognition systems were devised and tested. Two types of passwords were considered: phrases and individual names. A fixed phrase was used in the identification system. Individual names were used as a password in the verification system and in the overall recognition system. All three systems were tested and evaluated. The identification system used 10 volunteers and gave an indecision error of 1.2%. The verification system used 26 volunteers and gave an error of 8.1% in rejecting valid users and an error of 2.8% in accepting invalid users. The overall recognition system used 32 volunteers and gave an error of 3.1% in rejecting valid users and an error of 0.5% in accepting invalid users.<>
Published in: IEEE Transactions on Pattern Analysis and Machine Intelligence ( Volume: 12, Issue: 12, December 1990)
DOI: 10.1109/34.62613
First Page of the Article
