Typing Patterns A Java Project |
|
Author:
| Agal, Sanjay |
ISBN: | 978-1-4935-6931-1 |
Publication Date: | Oct 2013 |
Publisher: | CreateSpace Independent Publishing Platform
|
Book Format: | Paperback |
List Price: | USD $11.00 |
Book Description:
|
The deficiencies of traditional password-based access systems have become more acute as these systems have grown in size and scope. Researchers are actively investigating ways to improve the security of password systems or offer replacements. One category of improvements uses keystroke biometrics, an approach which seeks to identify an individual by their typing characteristics. Since 1980, a number of techniques have been proposed for accurately harnessing keystroke dynamics for...
More DescriptionThe deficiencies of traditional password-based access systems have become more acute as these systems have grown in size and scope. Researchers are actively investigating ways to improve the security of password systems or offer replacements. One category of improvements uses keystroke biometrics, an approach which seeks to identify an individual by their typing characteristics. Since 1980, a number of techniques have been proposed for accurately harnessing keystroke dynamics for system authentication and other novel uses. But do these systems deliver on their promise to increase system security and simultaneously ease the burden of logging into systems and remembering passwords? And do databases of users' keystroke profiles present additional privacy concerns? The keystroke bio metrics is used with the application in news reporting system. It will detect the person who send the news is the reporter or some other person who hacked the user name and password of the system. First the pattern of the reporter is stored with the server system. Server after receiving the text then it matches with the text pattern information in it.Today, all computer based system claims for more sophisticated mechanisms to guarantee the information security. The fast evolution of communication systems provided us a great volume of information anywhere any time. The security question became proprietary. Making these systems reliable and secure is one of the most important challenges of the communication evolution.