Security method and apparatus employing authentication by keystroke dynamics
First Claim
1. A device for verifying the identity of an individual based on a typing characteristic, said device embedded in a keyboard, said keyboard in communication with a processing system to be secured, said device comprising:
- an input means for monitoring the time interval in which keys on said keyboard are depressed;
a processing means in electrical communication with said input means for generating a first typing characteristic based on said monitored time intervals;
a memory means in data communication with said processing means for storing said first typing characteristic, and wherein said processing system is adapted to compare said first typing characteristic with a second typing characteristic generated for a current user;
wherein said processing system denies access to said current user if said second typing characteristic does not match said stored first typing characteristic; and
wherein a typing barcode in a graphic form is produced from said first typing characteristic which is used for producing a physical token to be used as a unique key for unlocking security-protected devices.
5 Assignments
0 Petitions
Accused Products
Abstract
A device for verifying the identity of an individual based on a typing characteristic token. The device having said device embedded in a keyboard, said keyboard in communication with an a processing system to be secured, said device comprising: an input means for monitoring the time interval in which keys on the keyboard are depressed; a processing means in electrical communication with the input means for generating a first typing characteristic token based on the monitored time intervals; a memory means in data communication with the processing means for storing the first typing characteristic token, and wherein the processing system is adapted to compare the first typing characteristic token with a second typing characteristics token generated for a current user; and wherein the processing system denies access to the current user if the second typing characteristic does not match the stored first typing characteristic token.
-
Citations
18 Claims
-
1. A device for verifying the identity of an individual based on a typing characteristic, said device embedded in a keyboard, said keyboard in communication with a processing system to be secured, said device comprising:
-
an input means for monitoring the time interval in which keys on said keyboard are depressed;
a processing means in electrical communication with said input means for generating a first typing characteristic based on said monitored time intervals;
a memory means in data communication with said processing means for storing said first typing characteristic, and wherein said processing system is adapted to compare said first typing characteristic with a second typing characteristic generated for a current user;
wherein said processing system denies access to said current user if said second typing characteristic does not match said stored first typing characteristic; and
wherein a typing barcode in a graphic form is produced from said first typing characteristic which is used for producing a physical token to be used as a unique key for unlocking security-protected devices. - View Dependent Claims (2, 3)
an output means for sending said first and second typing characteristics to said processing system to be secured.
-
-
3. A device according to claim 1, wherein said processing means disables said keyboard if said first typing characteristic does not match said second typing characteristic.
-
4. A method for employing authentication through the use of a keyboard, comprising the steps of:
-
providing a first data matrix comprised of 1640 channels to store typing times for any pair of alphanumeric keys;
monitoring a first set of keystrokes on said keyboard based on predetermined parameters;
generating a first typing characteristic irrespective of inputted text for a first user based on said first set of keystrokes;
storing said first typing characteristic in said first data matrix;
providing a second data matrix comprised of 1640 channels to store typing times for any pair of alphanumeric keys;
monitoring a second set of keystrokes, based on predetermined parameters;
generating a second typing characteristic irrespective of inputted text based on said second set of keystrokes;
storing said second typing characteristic in said second data matrix;
comparing said second typing characteristic with said first typing characteristic; and
determining whether a user is allowed access to a processing system based on said comparison of said second typing characteristic with said first typing characteristic.
-
-
5. A method for employing authentication through the use of an embedded microcontroller in a keyboard, comprising the steps of:
-
embedding a microcontroller in said keyboard;
monitoring a first set of keystrokes on said keyboard based on predetermined parameters, said monitoring performed by said microcontroller;
generating a first typing characteristic for a first user based on said first set of keystrokes;
storing said first typing characteristic in a memory;
monitoring a second set of keystrokes, based on predetermined parameters, said monitoring performed by said microcontroller;
generating a second typing characteristic based on said second set of keystrokes;
comparing said second typing characteristic with said stored first typing characteristic;
determining whether a user is allowed access to a processing system based on said comparison of said second typing characteristic with said first typing characteristic; and
wherein said step of creating a typing characteristic is comprised of the steps of;
measuring typing times for inputting single alphanumeric keys on said keyboard;
measuring typing times for inputting pairs of alphanumeric keys;
storing said first and second typing characteristics in a data matrix comprised of 1640 channels to store typing times for any pair of alphanumeric keys; and
wherein said first and second typing characteristics are created irrespective of inputted text. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
storing said first typing characteristic in a data matrix format, wherein said data matrix format stores said typing times for inputting single alphanumeric keys and said typing times for inputting pairs of alphanumeric keys, and wherein said data matrix format has channels for predetermined single alphanumeric keys and for predetermined pairs of alphanumeric keys.
-
-
7. A method according to claim 5, wherein said first typing characteristic is stored in a memory of said processing system.
-
8. A method according to claim 5, wherein said first typing characteristic is stored in a memory of said processing system and wherein said method further comprises the step of transmitting said first and second typing characteristics to said processing system before performing the step of comparison.
-
9. A method according to claim 5 further comprising the step of:
storing a first user identifier along with said first typing characteristic.
-
10. A method according to claim 9, wherein said first user identifier is an assigned password of said first user.
-
11. A method according to claim 9, wherein said first user identifier is an assigned microcontroller identification number.
-
12. A method according to claim 9, further comprising the step of:
-
obtaining a second user identifier associated with said second typing characteristic;
comparing said second user identifier with said first user identifier;
determining whether a user associated with said second user identifier and said second typing characteristic is allowed access to said processing system based on said comparison of said second typing characteristic with said first typing characteristic and said comparison of said second user identifier with said first user identifier.
-
-
13. A method according to claim 5, wherein said first typing characteristic is formed upon creation of a first user password.
-
14. A method according to claim 5 wherein said processing system is a local computer.
-
15. A method according to claim 5, wherein said processing system is a network server.
-
16. A method according to claim 15, wherein said step of comparison is performed upon said establishment of communication between said network and a user terminal connected to said terminal.
-
17. A method according to claim 5, further comprising the step of:
allowing access to said processing system if said second typing characteristic matches said stored first typing characteristic.
-
18. A method according to claim 5, wherein said first typing characteristic is used as an ESTABLISHED TYPING BARCODE for said user.
Specification