What makes us unique? Our way of looking, talking, thinking, seeing the world, and many, many other things. What about our typing behavior?
Typing Behavior as Authentication Method
Have you ever thought of the way you type as a criteria of establishing your unique identity? Well, our unique typing behavior is a way of identifying a person and it is currently exploited by identity and access management solutions.
DID YOU KNOW?
Does the idea of human typing behavior as a way of identification and authentication might seem new or even futuristic?
Well, it appears that it was first exploited in the second world war when the military intelligence noticed that the way the Morse code is transmitted can say something about the sender, in that particular case, if the sender was their soldier or the enemy’s. They called the methodology “Fist of the Sender”.
Recent years studies show that written communication via digital devices is preferred over verbal communication (phone calls) among teenagers and young adults. So the exploitation of their typing behavior came only natural and are being integrated just as natural in the software solutions we use.
Such solutions assess the user’s typing behavior in terms of typing speed, keys pressing and releasing times, movement of the mouse, the position of the device. Using such data, a typer profile is created that is unique for the user and can be used an authentication method.
How exactly authentication software solutions using typing behavior work was explained during the 15th edition of Sibiu Web Meetup by our guest Madalina Burci.
HIT PLAY:
CONNECT WITH US
To stay up to date with the Sibiu Web Meetup events, connect with us on our social channels: