1st Annual UMR Undergraduate Research Symposium (1991: Apr., Rolla, MO)
Most computer security systems verify the identity of a user through objects in the user's possession such as keys or magnetic cards, or through knowledge the user has, such as a password or PIN number. There are, however, two other methods of user verification, which have as yet received little or no attention. There has been some work done on the third method, recognition of physiological patterns (such as finger prints, retinal patterns, or voice patterns), but this work has been limited and requires expensive hardware to implement. The final method of user verification is through actions such as signature or behavior patterns.
Improving the Interface Between People and Technology
Lammers, Angela and Langenfeld, Sharon, "Identity Authentication Based on Keystroke Latencies Using Neural Networks" (1991). Opportunities for Undergraduate Research Experience Program (OURE). 121.