• 10.harddisk.jpg
  • 20.jpg
  • 30.keys.jpg
  • 40.mobile_phone.jpg
  • 50.padlock.jpg

Keystroke Biometrics

Biometric authentication technologies are classified into the categories physiological characteristics and behavioural characteristics according to what is measured. Some common commercial examples are fingerprint, face, iris, hand geometry, voice and now also Keystroke Recognition or Dynamics.

Something you are
This is biometric authentication in which access is granted to users based on biological signatures such as a fingerprint, iris scan or biometrics based on keystroke behaviour. ID Control brings you KeystrokeID which is the best way to authenticate a person while minimizing the impact on privacy.

This keystroke behaviour is used to recognize or verify the identity of a person. Not only unique physiological biometrics such as the iris and finger bring us unique biometrics. Physiological biometrics defines biological aspects of a person that determine identity. Behavioural biometrics verifies users based on how they conduct a given activity.

Behavioural biometrics
such as the way we sign our name or type in our password are unique as well and have much lower impact on privacy and costs. The way and the manner in which we type on our computer keyboard varies from individual to individual and is considered to be a unique behavioural biometric. Keystroke Dynamics or Recognition is probably one of the easiest biometrics forms to implement and manage. This is so because at the present time, Keystroke Recognition is completely a software based solution. There is no need to install any new hardware and even software. All that is needed is the existing computer and keyboard that is already in place and use.
1 Biometric Authentication method Pro's and Con's
Go to top