Meeting Name
1st Annual UMR Undergraduate Research Symposium (1991: Apr., Rolla, MO)
Abstract
Most computer security systems verify the identity of a user through objects in the user's possession such as keys or magnetic cards, or through knowledge the user has, such as a password or PIN number. There are, however, two other methods of user verification, which have as yet received little or no attention. There has been some work done on the third method, recognition of physiological patterns (such as finger prints, retinal patterns, or voice patterns), but this work has been limited and requires expensive hardware to implement. The final method of user verification is through actions such as signature or behavior patterns.
Research Category
Improving the Interface Between People and Technology
Document Type
Presentation
Award
2nd Place
Presentation Date
April 1991
Recommended Citation
Lammers, Angela and Langenfeld, Sharon, "Identity Authentication Based on Keystroke Latencies Using Neural Networks" (1991). Opportunities for Undergraduate Research Experience Program (OURE). 121.
https://scholarsmine.mst.edu/oure/121