Browse Definitions :
Definition

keystroke ID (keystroke identification)

Contributor(s): Ivy Wigmore

Keystroke ID (keystroke identification) is a biometric authentication method based on the unique typing dynamics of individuals.

Keystroke dynamics are the patterns of rhythm and timing created when a person types. Elements include:

  • Overall speed.
  • Dwell time (the length of time a key is pressed).  
  • Flight time (the length of time between the depression of one key and the next one).
  • Variations in flight time among particular key combinations.
  • Common errors.

Data captured during authentication is compared to a stored sample for the user. Some systems also monitor the dynamics throughout a session or sample it periodically to ensure that the same user is still involved and the session has not been hijacked. 

The patterns of people's keystroke dynamics are known as their typeprints; they are as distinctive as the patterns of ridges and branches on their fingertips that yield fingerprints and the vocal characteristics that yield voiceprints.

Benefits of keystroke ID:

  • Because it's software-based, deployment is simple and inexpensive.
  • User keystroke dynamics can't be lost, stolen or forgotten.
  • The dynamics cannot be copied or faked. 
  • Both false positives and false negatives tend to be low.

Keystroke identification goes back to the days of the telegraph, when  operators were known by their distinctive patterns (known as the telegraph operator's "fist"). During the second World War, a methodology known as the "fist of the sender" helped to identify the source of Morse code to confirm that a particular message was, in fact, from the legitimate sender.

Keystroke ID is sometimes used as one method of multifactor authentication (MFA).

This was last updated in February 2015

Continue Reading About keystroke ID (keystroke identification)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close