Upload

Loading icon Loading...

This video is unavailable.

Innovation Contest | Safelock

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to like ACM UIST Conference Videos's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to dislike ACM UIST Conference Videos's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to add ACM UIST Conference Videos's video to your playlist.

Uploaded on Oct 7, 2009

We used the keyboard to biometrically authenticate a user with just eight entered characters. We measure four attributes about each keystroke, allowing us to compress a significant number of attributes within a relatively small word. These included: flight time (the interval in between each keystroke); hold time (the amount of time for which the key was held); (normalized) maximum pressure; and a curve fit to the pressure over time as a user pressed each key.

Jeff Allen - Southern Methodist University
John Howard - Southern Methodist University

ACM Symposium on User Interface Software and Technology

UIST 2009 STUDENT INNOVATION CONTEST
http://www.acm.org/uist/uist2009/call...

Loading icon Loading...

Loading icon Loading...

Loading icon Loading...

The interactive transcript could not be loaded.

Loading icon Loading...

Loading icon Loading...

Ratings have been disabled for this video.
Rating is available when the video has been rented.
This feature is not available right now. Please try again later.

Loading icon Loading...

Loading...
Working...
to add this to Watch Later

Add to