Method and system for biometric keyboard
First Claim
1. A method for secure operation of a computing system using a biometrics keyboard, the method comprising:
- providing a database of user keyboard behavior biometric information;
authenticating a user to use the biometrics keyboard;
establishing a secure connection with the computing system; and
subsequent to establishing the secure connection, the biometrics keyboard performing steps of;
probing the computing system to determine if the secure connection with the computing system is compromised;
if the secure connection is compromised, disabling the secure connection with the computing system;
sampling user keyboard behavior biometric information;
determining if the sampled user keyboard behavior biometric information is within an allowable tolerance;
disabling the secure connection with the computing system, if the sampled user keyboard behavior biometric information exceeds the allowable tolerance; and
displaying indications associated with the sampled user keyboard behavior biometric information on a display device provided on a portion of the biometrics keyboard;
wherein authenticating the user to use the biometrics keyboard comprises;
the biometrics keyboard performing the steps of;
prompting the user to enter a user ID and a user password;
deriving biometric behavioral information from the entered user ID and user password;
comparing the derived biometric behavioral information with the database to determine if the derived biometric behavioral information is within the allowable tolerance;
disabling an initial connection, that is different from the secure connection, with the computing system, if the derived biometric behavioral information exceeds the allowable tolerance;
displaying indications associated with the derived user keyboard behavior biometric information on the display device provided on the portion of the biometrics keyboard; and
tightening the tolerance, if the derived biometric behavioral information is within the allowable tolerance.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for training a computing system using keyboard biometric information. The method includes depressing two or more keys on a keyboard input device for a first sequence of keys. The method then determines a key press time for each of the two or more keys to provide a key press time characteristic in the first sequence of keys. The method also determines a flight time between a first key and a second key to provide a flight time characteristic in the first sequence of keys, the first key being within the two or more keys. The method includes storing the key press time characteristic and the flight time characteristic for the first sequence of keys, and displaying indications associated with the first sequence of keys on a display device provided on a portion of the keyboard input device.
-
Citations
8 Claims
-
1. A method for secure operation of a computing system using a biometrics keyboard, the method comprising:
-
providing a database of user keyboard behavior biometric information; authenticating a user to use the biometrics keyboard; establishing a secure connection with the computing system; and subsequent to establishing the secure connection, the biometrics keyboard performing steps of; probing the computing system to determine if the secure connection with the computing system is compromised; if the secure connection is compromised, disabling the secure connection with the computing system; sampling user keyboard behavior biometric information; determining if the sampled user keyboard behavior biometric information is within an allowable tolerance; disabling the secure connection with the computing system, if the sampled user keyboard behavior biometric information exceeds the allowable tolerance; and displaying indications associated with the sampled user keyboard behavior biometric information on a display device provided on a portion of the biometrics keyboard; wherein authenticating the user to use the biometrics keyboard comprises; the biometrics keyboard performing the steps of; prompting the user to enter a user ID and a user password; deriving biometric behavioral information from the entered user ID and user password; comparing the derived biometric behavioral information with the database to determine if the derived biometric behavioral information is within the allowable tolerance; disabling an initial connection, that is different from the secure connection, with the computing system, if the derived biometric behavioral information exceeds the allowable tolerance; displaying indications associated with the derived user keyboard behavior biometric information on the display device provided on the portion of the biometrics keyboard; and tightening the tolerance, if the derived biometric behavioral information is within the allowable tolerance. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method in a keyboard having an initial connection with a computing system, comprising the keyboard performing steps of:
-
authenticating a user based on user keyboard behavior biometric information, comprising; prompting the user to enter a user ID and user password; deriving keyboard behavior biometric information from the entered user ID and user password; comparing the derived keyboard behavior biometric information with a database of keyboard behavior biometric information to determine if the derived keyboard behavior biometric information is within an allowable tolerance; disabling the initial connection with the computing system, if the derived keyboard behavior biometric information exceeds the allowable tolerance; tightening the tolerance, if the derived keyboard behavior biometric information is within the allowable tolerance; subsequent to authenticating the user, establishing a secure connection, that is different from the initial connection, with the computing system, if the derived keyboard behavior biometric information is within the allowable tolerance; subsequent to establishing the secure connection, sampling user keyboard behavior biometric information; determining if the sampled user keyboard behavior biometric information is within the allowable tolerance; disabling the secure connection with the computing system, if the sampled user keyboard behavior biometric information exceeds the allowable tolerance; and displaying indications associated with the sampled user keyboard behavior biometric information on a display device provided on a portion of the keyboard. - View Dependent Claims (8)
-
Specification