Developing a Tighter Authentication Security Mechanism Using Keystroke Dynamics

Abstract / Excerpt:

As technology advances, information management systems become more powerful and information security enforcement becomes more critical. This paper presents a more secure approach in authenticating users. It uses keystroke dynamics by employing a combination of the conventional approach and of the neural networks. This combined approach not only deals with users' conventional textual passwords but also with its corresponding unique typing patterns for tighter and more secure authentication. To achieve this, the proponents planned to have five phases in implementing keystroke dynamics: the Initialization stage, the Data Collection stage, the Retrieval Phase, the Adaptability stage, and the Recovery phase.

Source InstitutionAteneo de Davao University
UnitComputer Studies
AuthorsDuches Dianne B. Castañeda, Khimy Jyanina L. Iñigo, Larence O. Lao
Page Count13
Place of PublicationDavao City
Original Publication DateMarch 1, 2005