Comments Off on Create a Safe Password to protect yourself

Create a Safe Password to protect yourself

Unlike a kitten on the keys, your keystroke patterns that protect you from a musical sour note, or a stolen computer password. Timing is crucial for a good song, and now may be the answer to foiling hackers. This approach has forgotten to secure some form of biometric data from the fingerprints, iris and retina recognition, gait analysis, and now typing patterns.

KPA. Is relatively new and still has its weaknesses. However, persons have at several universities, as was Ravel Jabbour, Wes Masri and Ali El-Hajj, American University of Beirut, Lebanon, and Daniele Gunetti, Claudia Picardi and Giancarlo Ruffo, Department of computer science, University of Turin, testing how the model perfect. You are looking at their use for backing up data and the identification of the user. Many aspects of typing, are taken into account.


The length of time a key is pressed, the time between pressing a button and then the next, know respectively as the dwell time or duration and latency, or time of flight, are all recorded on the basis of the electronic signals from a standard keyboard. As with recognition software like Dragon Dictate, must “teach” the user’s computer, as they give you their password several times by repeating voice, a profile of their patterns can be developed.

Even if your password in the wrong hands, no one can replicate your input style for the hypothesis. However, the magic word, we make use of, access to our data, password theft easily. It is estimated that most Internet users, only one or two magic words that they use over and over again to have their online accounts. Creating a template or biometric profile is a question of balance, but like Goldilocks and the Three Bears, it has exactly the right thing.

The longer the password, the better and more complex your profile, but make it too long, and you have fewer opportunities, matching your input pattern exactly every time. Researchers at the University of Turin in testing the effect of language on KPA pointed out some of its pitfalls. “Keystrokes, unlike other biometric features, give an unstructured and very small amount of information. Keystroke duration and digraphs latency are in fact a pretty shallow kind of information. Keystroke dynamics is a behavioral biometric, be signed as voice prints and hand-writing.

As such, they are intrinsically unstable and show a certain variability even for no apparent reason. “Saying that the input dynamics can provide meaningful information to improve the accuracy of intrusion detection system, they tested the viability of the KPA in different languages. They used samples from 31 volunteers entering free form input, as if they wrote an email in Italian and English. They showed that a user enter his style could be identified, even when writing in another language used to create his profile. Since 1975, when the idea of ​​the key combination analysis was first explored, many studies have taken place.

A paper in 2007 in the International Journal of Information Security, by Clarke and Furnell was the first conducted on mobile devices. More recently, Nathan Clarke and A. Buchoux by the Center for Information Security & Network Research, University of Plymouth created in Britain to study a software prototype to the keystroke analysis on a smartphone. They used Visual Basic. NET, Microsoft. NET Compact Framework 2.0 and a SPV C600 smartphone running Microsoft Windows Mobile 5 A determination was that not a 4-digit PIN, long enough for practical use.

Filed in: Computer Tips

Share This Post

Recent Posts

© Daily-Tips.Net. All rights reserved.