Presenter Information

Angela Lammers
Sharon Langenfeld

Meeting Name

1st Annual UMR Undergraduate Research Symposium (1991: Apr., Rolla, MO)


Most computer security systems verify the identity of a user through objects in the user's possession such as keys or magnetic cards, or through knowledge the user has, such as a password or PIN number. There are, however, two other methods of user verification, which have as yet received little or no attention. There has been some work done on the third method, recognition of physiological patterns (such as finger prints, retinal patterns, or voice patterns), but this work has been limited and requires expensive hardware to implement. The final method of user verification is through actions such as signature or behavior patterns.

Research Category

Improving the Interface Between People and Technology

Document Type



2nd Place

Presentation Date

April 1991