How does KeystrokeID work?
Keystroke dynamics is measured with dwell time and flight time in keyboard typing. Measurements can be recorded from every keyboard to determine Dwell time (the time a key pressed) and Flight time (the time between “key down” and the next “key down” and the time between “key up” and the next “key up”). Once the verification string is entered, it’s processed through an algorithm that compares the person’s typing behaviour to a sample collected in a previous session. The output of the comparison is a score.
KeystrokeID calculates a unique behavioural signature used to ensure the user’s identity as the system is being used. It identifies malicious computer actions and network intrusions.
Quick and very secure identification
Affordable, because it doesn’t need distribution management or replacement of tokens;
No user interference, the person that is typing does not have to know that he’s being watched;
The user does not have to be trained to use it, since he or she won’t even notice the difference with a normal logon to your network, Server Based Computing or Web Application Sign-on;
Almost no affect on someone’s privacy, you only type in the password and username and you’re identified;
The user behaviour becomes the identification token.