The Scalability of Keystroke Biometrics in Access Control and Identity Management Systems

نویسندگان

  • John C. Stewart
  • Kirk M. Anne
چکیده

Recent legislation requires that institutions of higher learning to take steps to ensure that the student of record enrolled in the course is the one taking the tests on line, accessing the information systems, and receiving academic credit for the course. We suggest that keystroke biometric systems can play a role in access control for purposes of identity management systems in conjunction with other security and privacy methods. Further, we suggest that some of the current limitations in deploying keystroke biometric systems might be negated by this inclusion. In this paper we discuss the limitations of deploying keystroke biometric system applications in real world situations such as on-line course tests and tracking of keystrokes used in user names and passwords. We propose some possible solutions to these problems both within the keystroke biometric feature extraction and classification process, and in viewing keystroke biometrics as a tool in a broader context of a system component. Finally we discuss how Bayesian statistical analysis may help in accurately determining student identity in a multilevel keystroke biometric access control system. Introduction With the ever increasing offering of on-line courses and degrees, it is becoming necessary to verify that students taking courses, completing on-line exams, and submitting written text papers are the actual students enrolled in the course. The problem of accurate identification of students accessing their resources (including online assessment) has not traditionally been a priority for many higher education institutions. User names and Passwords, inherently vulnerable to misuse have been singularly relied upon as the definitive verification of student identity. However, recent legislative requirements are significantly raising the threshold on what will be required in the broader context of Identity Management at institutions of higher learning with distance learning programs[1]. The Higher Education Opportunity Act requires that the institutions of higher learning establish processes that ensure that the student that registers for a course or program must be the same individual that participates in, completes the course or program, and accepts the credits. [1. Institutions will be required to improve upon the current minimum authentication (user name and password )by adopting identification technologies as they become more ubiquitous.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mouse Dynamics Biometric Technology

Different types of biometrics are currently available in the market, and are widely used in various security applications. Biometrics can be classified into two categories, “physiological biometrics” and “behavioral biometrics”. Physiological biometrics identify the user based on physiological characteristics, such as fingerprints and eye retina/iris scanning, whereas behavioral biometrics depe...

متن کامل

User Authentication Based On Keystroke Dynamics

The most common way to enforce access control is user authentication based on username and password. This form of access control has many flaws which make it vulnerable to hacking. Biometric authentication such as the keystroke dynamics is used in which the keyboard is used in order to identify users. Then the classifier is tailored to each user to find out whether the given user is genuine or ...

متن کامل

User Credential Hardening through Keystroke Dynamics

Most computer systems rely on usernames and passwords as a mechanism for access control and authentication of authorized users. These credential sets offer weak protection to a broad scope of applications with differing levels of sensitivity. Traditional physiological biometric systems such as fingerprint, face, and iris recognition are not readily deployable in remote authentication schemes. K...

متن کامل

Continuous User Identity Verification Based Secure Internet Services

We explore the continuous user verification for the secure internet services using biometrics in the session management. We have used the novel biometric modality named “Facial Recognition” for continuous user authentication. Given a camera pointing towards the user, we develop real-time facial recognition algorithm (CMM-Correlation Matrix memories) to automatically extract facial recognition a...

متن کامل

Keystroke Analysis for Thumb-based Keyboards on Mobile Devices

The evolution of mobile networking has opened the door to a wide range of service opportunities for mobile devices, increasing at the same time the sensitivity of the information stored and access through them. Current PINbased authentication has proved to be an insufficient and an inconvenient approach. Biometrics have proven to be a reliable approach to identity verification and can provide a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010