Everipedia Logo
Everipedia is now IQ.wiki - Join the IQ Brainlist and our Discord for early access to editing on the new platform and to participate in the beta testing.
Keystroke dynamics

Keystroke dynamics

Keystroke dynamics, keystroke biometrics, typing dynamics and lately typing biometrics, is the detailed timing information which describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard.[1]

Science

The behavioral biometric of Keystroke Dynamics uses the manner and rhythm in which an individual types characters on a keyboard or keypad.[2][3][4] The keystroke rhythms of a user are measured to develop a unique biometric template of the user's typing pattern for future authentication.[5] Vibration information may be used to create a pattern for future use in both identification and authentication tasks.

Data needed to analyze keystroke dynamics is obtained by keystroke logging. Normally, all that is retained when logging a typing session is the sequence of characters corresponding to the order in which keys were pressed and timing information is discarded. When reading email, the receiver cannot tell from reading the phrase "I saw 3 zebras!" whether:

  • that was typed rapidly or slowly.

  • the sender used the left shift key, the right shift key, or the caps-lock key to make the "i" turn into a capitalized letter "I".

  • the letters were all typed at the same pace, or if there was a long pause before any characters while looking for that key.

  • the sender typed any letters wrong initially and then went back and corrected them, or if they got them right the first time.

Origin

On May 24, 1844, the message "What hath God wrought" was sent by telegraph from the U.S. Capitol in Washington, D.C. to the Baltimore and Ohio Railroad "outer depot" in Baltimore, Maryland, a new era in long-distance communications had begun. By the 1860s the telegraph revolution was in full swing and telegraph operators were a valuable resource. With experience, each operator developed their unique "signature" and was able to be identified simply by their tapping rhythm.

As late as World War II the military transmitted messages through Morse Code. Using a methodology called "The Fist of the Sender", Military Intelligence identified that an individual had a unique way of keying in a message's "dots" and "dashes", creating a rhythm that could help distinguish ally from enemy.[6][7]

Use as biometric data

Researchers are interested in using this keystroke dynamic information, which is normally discarded, to verify or even try to determine the identity of the person who is producing those keystrokes. The techniques used to do this vary widely in power and sophistication, and range from statistical techniques to AI approaches like neural networks.

The time to get to and depress a key (seek-time), and the time the key is held-down (hold-time) may be very characteristic for a person, regardless of how fast they are going overall. Most people have specific letters that take them longer to find or get to than their average seek-time over all letters, but which letters those are may vary dramatically but consistently for different people. Right-handed people may be statistically faster in getting to keys they hit with their right hand fingers than they are with their left hand fingers. Index fingers may be characteristically faster than other fingers to a degree that is consistent for a person day-to-day regardless of their overall speed that day.

In addition, sequences of letters may have characteristic properties for a person. In English, the word "the" is very common, and those three letters may be known as a rapid-fire sequence and not as just three meaningless letters hit in that order. Common endings, such as "ing", may be entered far faster than, say, the same letters in reverse order ("gni") to a degree that varies consistently by person. This consistency may hold and may reveal the person's native language's common sequences even when they are writing entirely in a different language, just as revealing as an accent might in spoken English.

Common "errors" may also be quite characteristic of a person, and there is an entire taxonomy of errors, such as this person's most common "substitutions", "reversals", "drop-outs", "double-strikes", "adjacent letter hits", "homonyms", hold-length-errors (for a shift key held down too short or too long a time). Even without knowing what language a person is working in, by looking at the rest of the text and what letters the person goes back and replaces, these errors might be detected. Again, the patterns of errors might be sufficiently different to distinguish two people.

Authentication versus identification

Keystroke dynamics is part of a larger class of biometrics known as behavioral biometrics; a field in which observed patterns are statistical in nature. Because of this inherent uncertainty, a commonly held belief is that behavioral biometrics are not as reliable as biometrics used for authentication based on physically observable characteristics such as fingerprints or retinal scans or DNA. The reality here is that behavioral biometrics use a confidence measurement instead of the traditional pass/fail measurements. As such, the traditional benchmarks of False Acceptance Rate (FAR) and False Rejection Rates (FRR) no longer have linear relationships.

The benefit to keystroke dynamics (as well as other behavioral biometrics) is that FRR/FAR can be adjusted by changing the acceptance threshold at the individual level. This allows for explicitly defined individual risk mitigation–something physical biometric technologies could never achieve.

One of the major problems that keystroke dynamics runs into is that a person's typing varies substantially during a day and between different days, and may be affected by any number of external factors.

Because of these variations, any system will make false-positive and false-negative errors. Some of the successful commercial products have strategies to handle these issues and have proven effective in large-scale use (thousands of users) in real-world settings and applications.

Use of keylogging software may be in direct and explicit violation of local laws, such as the U.S. Patriot Act, under which such use may constitute wire-tapping. This could have severe penalties including jail time. See spyware for a better description of user-consent issues and various fraud statutes.

Patents

  • John D. Rome, Bethann G. Rome and Thomas E. Ketcham II. User authentication via known text input cadence. Patent No. 9 430 626, U.S. Patent and Trademark Office, 2012.

  • S. Blender and H. Postley. Key sequence rhythm recognition system and method. Patent No. 7 206 938, U.S. Patent and Trademark Office, 2007.

  • J. Garcia. Personal identification apparatus. Patent No. 4 621 334, U.S. Patent and Trademark Office, 1986.

  • J.R. Young and R.W. Hammon. Method and apparatus for verifying an individual's identity. Patent No. 4 805 222, U.S. Patent and Trademark Office, 1989.

  • P. Nordström, J. Johansson. Security system and method for detecting intrusion in a computerized system. Patent No. 2 069 993, European Patent Office, 2009.

  • A. Awad and I. Traore. System and method for determining a computer user profile from a motion-based input device. Patent No. 8 230 232, U.S. Patent and Trademark Office, 2012.

Other uses

Because keystroke timings are generated by human beings, they are not well correlated with external processes, and are frequently used as a source of hardware-generated random numbers for computer systems.

See also

  • Fist (telegraphy)

References

[1]
Citation Linkwww.ise.bgu.ac.ilRobert Moskovitch , Clint Feher , Arik Messerman , Niklas Kirschnick , Tarik Mustafic , Ahmet Camtepe , Bernhard Löhlein , Ulrich Heister , Sebastian Möller , Lior Rokach , Yuval Elovici (2009). Identity theft, computers and behavioral biometrics (PDF). Proceedings of the IEEE International Conference on Intelligence and Security Informatics. pp. 155–160.CS1 maint: multiple names: authors list (link)
Sep 30, 2019, 4:40 PM
[2]
Citation Link//doi.org/10.1155%2F2013%2F565183Deng, Y.; Yu, Y. (2013). "Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets". ISRN Signal Processing. 2013: 565183. doi:10.1155/2013/565183.
Sep 30, 2019, 4:40 PM
[3]
Citation Linkai.pku.edu.cnUser authentication through typing biometrics features
Sep 30, 2019, 4:40 PM
[4]
Citation Linkieeexplore.ieee.orgContinuous authentication by analysis of keyboard typing characteristics
Sep 30, 2019, 4:40 PM
[5]
Citation Linklink.springer.comA modified algorithm for user identification by his typing on the keyboard
Sep 30, 2019, 4:40 PM
[6]
Citation Linkwww.biometric-solutions.com"Keystroke Dynamics". Biometrics. Retrieved 2018-01-18.
Sep 30, 2019, 4:40 PM
[7]
Citation Linkbooks.google.comHaring, Kristen (2007). Ham Radio's Technical Culture. MIT Press. p. 23. ISBN 978-0-262-08355-3.
Sep 30, 2019, 4:40 PM
[8]
Citation Linkold.wsta.org[1]
Sep 30, 2019, 4:40 PM
[9]
Citation Link//doi.org/10.1145%2F581271.58127210.1145/581271.581272
Sep 30, 2019, 4:40 PM
[10]
Citation Linkwww.imagicsoftware.com[2]
Sep 30, 2019, 4:40 PM
[11]
Citation Linkwww.admitonesecurity.com[3]
Sep 30, 2019, 4:40 PM
[12]
Citation Linkwww.uspto.gov[4]
Sep 30, 2019, 4:40 PM
[13]
Citation Linkpatft.uspto.gov[5]
Sep 30, 2019, 4:40 PM
[14]
Citation Link//doi.org/10.1006%2Fijhc.1995.106110.1006/ijhc.1995.1061
Sep 30, 2019, 4:40 PM
[15]
Citation Linkportal.acm.org[6]
Sep 30, 2019, 4:40 PM
[16]
Citation Linkwww1.cs.columbia.edu[7]
Sep 30, 2019, 4:40 PM
[17]
Citation Linkieeexplore.ieee.org[8]
Sep 30, 2019, 4:40 PM
[18]
Citation Linkwww.uspto.gov[9]
Sep 30, 2019, 4:40 PM
[19]
Citation Linkweb.archive.org[10]
Sep 30, 2019, 4:40 PM
[20]
Citation Linkbenelearn09.uvt.nl[11]
Sep 30, 2019, 4:40 PM