Upload

Loading...

Innovation Contest | Safelock

60,285

Loading...

Loading...

Transcript

The interactive transcript could not be loaded.

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Oct 7, 2009

We used the keyboard to biometrically authenticate a user with just eight entered characters. We measure four attributes about each keystroke, allowing us to compress a significant number of attributes within a relatively small word. These included: flight time (the interval in between each keystroke); hold time (the amount of time for which the key was held); (normalized) maximum pressure; and a curve fit to the pressure over time as a user pressed each key.

Jeff Allen - Southern Methodist University
John Howard - Southern Methodist University

ACM Symposium on User Interface Software and Technology

UIST 2009 STUDENT INNOVATION CONTEST
http://www.acm.org/uist/uist2009/call...

Loading...

When autoplay is enabled, a suggested video will automatically play next.

Up Next


Sign in to add this to Watch Later

Add to