SlideShare uma empresa Scribd logo
1 de 21
Keystroke Dynamics Biometric Technology
         “We Know Your Type”
The Problem – Passwords are Vulnerable

 PASSWORDS
 People write them down
    The Sticky Note Problem
 People share passwords with friends
    Buddy Punching
 People watch other people type them
    Shoulder Surfing
 People use special software to steal them
    Key Loggers / SpyWare
 People deceive people into giving them up
    Phishing and Pharming
 People steal other people’s stuff using passwords
    Account-Hijacking and Identity-Theft
Solutions Today
 Hardware Tokens – What you have
   Smartcards, Key-fobs, USB tokens, RFID tags


 Biometrics – Who you are
   Fingerprint, Hand Geometry, Facial
   Keystroke, Signature, Speech


 Two-Factor Authentication
   A Password combined with a Token or a Biometric
Hardware Tokens
 A device that contains unique information and is used to
 grant access to a computer system, software, or data, for
 the person that possesses the token
Biometrics
 A Physical or Behavioral characteristic that can be used
 to positively identify a person
   Physical Biometrics are physiological traits
   Behavioral Biometrics are learned traits

 Physical Biometrics
   Fingerprint Recognition
   Facial Recognition
   Hand Geometry Recognition
   Iris Recognition

 Behavioral Biometrics
   Signature Recognition
   Speech Recognition
   Keystroke Dynamics
Behavioral vs. Physical Biometrics
  Process is the same
    Capture a sample to create an enrollment template
    Perform 1:1 authentication match between a live sample and a
    previously enrolled template
    Determine probability of a match or no-match
    Perform database management


  Advantage of Behavioral vs. Physical
    Does not have the stigma of “Big Brother” watching you
    Very low total-cost-of-ownership to deploy and manage
    Users do not need to change their behavior to use it
Keystroke Dynamics
 Authenticates a person by the way characters are typed
 on a computer keyboard
   Detects a person’s unique rhythm


 The only software-only biometric
   Does not require a special device or sensor


 The password problem solver
Keystroke Dynamics Advantages
 Non-Invasive

 User-Friendly

 Highly Accurate

 Low Total Cost of Ownership

 Simple to Deploy and Manage

 Do not need to change behavior to use it

 Doesn’t require a special sensor or device

 Seamlessly integrates with existing process
Biometric Authentication Landscape

The table below depicts how requirements for the major
biometric authentication solutions compare with Keystroke
Dynamics
How Keystroke Dynamics Works
Origin of Keystroke Dynamics
 World War II Morse Code Telegraph Keys
      The “Fist of the Sender”




                  Morse Code: BioPassword
                  -... .. --- .--. .- ... ... .-- --- .-. -..
Keystroke Dynamics Historical Timeline
CBS Numb3rs –   Season 1, Episode 11
Who We Are
 A software company providing secure-access and anti-fraud
 solutions based on the science of biometrics

 A manufacturer of a behavioral-biometric matching engine and
 products based on patented Keystroke Dynamics Technology

 The Worldwide leader in Keystroke Dynamics Technology

 We created the use of Keystroke Dynamics to lead the development
 of next generation authentication solutions

 Corporate office is located in Issaquah, Washington

 Development office is located in Vancouver, Canada
What We Do
 Provide assurance that a person is who they claim they are
    Our patented, high performance behavioral biometric processing engine
    provides low-cost two-factor authentication. It is transparent to the user,
    and is immediately deployable across both an organization and the
    Internet

 Help customers operate their business in compliance with
 regulations and help minimize risk
    Our solutions assure compliance with regulations as well as minimize the
    risk of impersonation, lost assets, and reputation

 Provide customers with peace of mind and harden password
 credentials
    Our device-independent software provides fast, accurate, and scalable
    authentication from an individual consumer to millions of users
Technology
 Today – Keyboard based
   Solves the Password Problem
   Authentication for Computers and Networks
   (Two-Factor: User ID/Password, & BioPassword Credentials)
      Enterprise Network Access Control
      Stand-alone PC and Laptop Access Control
      Internet Authentication


 Future – Any input device
   Any device where data is input by touching, tapping or typing is a
   candidate for using BioPassword technology
Products and Platforms
 BioPassword 6.0
   Windows Enterprise Networks and Citrix Presentation Server
      Windows 2000/2003/XP Server
      Citrix Presentation Server FR 3 and 4

 BioPassword Internet Authentication SDK
   Internet Browser-based Authentication

 BioPassword Software Developers Kit - SDK
   Windows 2000, XP
   Operating Systems Integration/Software Applications

 B-Identified Home & Professional (SOHO)
   Standalone Windows XP/XP Home/2000 Pro
Products and Key Markets
 BioPassword 6.0
   Healthcare and Financial Institutions due to regulatory compliance
   issues
      HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley


 BioPassword 6.0 SDK
   Custom Enterprise Identity and Access Management Applications


 BioPassword Internet Authentication SDK
   eCommerce Internet Authentication for Online Banking, Digital
   Content Distribution, Online Purchases
Product Capabilities
  BioPassword 6.0
    Protects the logon credentials for MSFT Windows and the Citrix
    Environment
    Protects Windows ‘Run As’, ‘Net Use’, ‘Connect As’ and ‘Screen
    Saver’ functions


  BioPassword 6.0 SDK
    Provides the capability to enable Keystroke Dynamic technology
    within an Application or an Operating System


  BioPassword Internet Authentication SDK
    Provides the capability to enable Keystroke Dynamics technology
    within a website logon procedure using any Internet Browser on
    the market today
BIOPASSWORD, Inc.
1605 NW Sammamish Road
       Suite 105
   Issaquah, WA 98027
 www.biopassword.com
     425-649-1100

Mais conteúdo relacionado

Mais procurados

Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Authentication using Biometrics
Authentication using BiometricsAuthentication using Biometrics
Authentication using Biometricsisha ranjan
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security MobileJerry Ruggieri
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & consGagan Gowda
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 

Mais procurados (20)

Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Authentication using Biometrics
Authentication using BiometricsAuthentication using Biometrics
Authentication using Biometrics
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security Mobile
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 

Destaque

Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4sakshi_20
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...Mina Khidhir
 
Detecting hardware keyloggers
Detecting hardware keyloggersDetecting hardware keyloggers
Detecting hardware keyloggersmihailowitsch
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingDan Morrill
 
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...Jiang Zhu
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timen|u - The Open Security Community
 
Keylogger
KeyloggerKeylogger
Keyloggerfrank
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Process monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingProcess monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingDan Morrill
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 

Destaque (13)

Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
 
Detecting hardware keyloggers
Detecting hardware keyloggersDetecting hardware keyloggers
Detecting hardware keyloggers
 
Misspelled words
Misspelled wordsMisspelled words
Misspelled words
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
 
Keylogger
KeyloggerKeylogger
Keylogger
 
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long time
 
Keylogger
KeyloggerKeylogger
Keylogger
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Process monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingProcess monitoring in UNIX shell scripting
Process monitoring in UNIX shell scripting
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 

Semelhante a We Know Your Type

Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
Securing Access Control with Biometric Identity Verification Software.pptx
Securing Access Control with Biometric Identity Verification Software.pptxSecuring Access Control with Biometric Identity Verification Software.pptx
Securing Access Control with Biometric Identity Verification Software.pptxIDefy
 
Biometric - Solutions for Enterprises & Commercial banking
Biometric - Solutions for Enterprises & Commercial bankingBiometric - Solutions for Enterprises & Commercial banking
Biometric - Solutions for Enterprises & Commercial bankingSuresh Babu
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-defQafis
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdfCIO Look Magazine
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareNeil Costigan
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
Phishcops multifactor-authentication-website-authentication1096
Phishcops multifactor-authentication-website-authentication1096Phishcops multifactor-authentication-website-authentication1096
Phishcops multifactor-authentication-website-authentication1096Hai Nguyen
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber SecurityArtanContracting
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect DesignRajat Jain
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Harikrishna Patel
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 

Semelhante a We Know Your Type (20)

Loqr
LoqrLoqr
Loqr
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Securing Access Control with Biometric Identity Verification Software.pptx
Securing Access Control with Biometric Identity Verification Software.pptxSecuring Access Control with Biometric Identity Verification Software.pptx
Securing Access Control with Biometric Identity Verification Software.pptx
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Biometric - Solutions for Enterprises & Commercial banking
Biometric - Solutions for Enterprises & Commercial bankingBiometric - Solutions for Enterprises & Commercial banking
Biometric - Solutions for Enterprises & Commercial banking
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshare
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
Phishcops multifactor-authentication-website-authentication1096
Phishcops multifactor-authentication-website-authentication1096Phishcops multifactor-authentication-website-authentication1096
Phishcops multifactor-authentication-website-authentication1096
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 

Mais de CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source ForensicsCTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Nra
NraNra
NraCTIN
 
Live Forensics
Live ForensicsLive Forensics
Live ForensicsCTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Edrm
EdrmEdrm
EdrmCTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassCTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrimeCTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007CTIN
 

Mais de CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

We Know Your Type

  • 1. Keystroke Dynamics Biometric Technology “We Know Your Type”
  • 2. The Problem – Passwords are Vulnerable PASSWORDS People write them down The Sticky Note Problem People share passwords with friends Buddy Punching People watch other people type them Shoulder Surfing People use special software to steal them Key Loggers / SpyWare People deceive people into giving them up Phishing and Pharming People steal other people’s stuff using passwords Account-Hijacking and Identity-Theft
  • 3. Solutions Today Hardware Tokens – What you have Smartcards, Key-fobs, USB tokens, RFID tags Biometrics – Who you are Fingerprint, Hand Geometry, Facial Keystroke, Signature, Speech Two-Factor Authentication A Password combined with a Token or a Biometric
  • 4. Hardware Tokens A device that contains unique information and is used to grant access to a computer system, software, or data, for the person that possesses the token
  • 5. Biometrics A Physical or Behavioral characteristic that can be used to positively identify a person Physical Biometrics are physiological traits Behavioral Biometrics are learned traits Physical Biometrics Fingerprint Recognition Facial Recognition Hand Geometry Recognition Iris Recognition Behavioral Biometrics Signature Recognition Speech Recognition Keystroke Dynamics
  • 6. Behavioral vs. Physical Biometrics Process is the same Capture a sample to create an enrollment template Perform 1:1 authentication match between a live sample and a previously enrolled template Determine probability of a match or no-match Perform database management Advantage of Behavioral vs. Physical Does not have the stigma of “Big Brother” watching you Very low total-cost-of-ownership to deploy and manage Users do not need to change their behavior to use it
  • 7. Keystroke Dynamics Authenticates a person by the way characters are typed on a computer keyboard Detects a person’s unique rhythm The only software-only biometric Does not require a special device or sensor The password problem solver
  • 8. Keystroke Dynamics Advantages Non-Invasive User-Friendly Highly Accurate Low Total Cost of Ownership Simple to Deploy and Manage Do not need to change behavior to use it Doesn’t require a special sensor or device Seamlessly integrates with existing process
  • 9. Biometric Authentication Landscape The table below depicts how requirements for the major biometric authentication solutions compare with Keystroke Dynamics
  • 11. Origin of Keystroke Dynamics World War II Morse Code Telegraph Keys The “Fist of the Sender” Morse Code: BioPassword -... .. --- .--. .- ... ... .-- --- .-. -..
  • 13. CBS Numb3rs – Season 1, Episode 11
  • 14.
  • 15. Who We Are A software company providing secure-access and anti-fraud solutions based on the science of biometrics A manufacturer of a behavioral-biometric matching engine and products based on patented Keystroke Dynamics Technology The Worldwide leader in Keystroke Dynamics Technology We created the use of Keystroke Dynamics to lead the development of next generation authentication solutions Corporate office is located in Issaquah, Washington Development office is located in Vancouver, Canada
  • 16. What We Do Provide assurance that a person is who they claim they are Our patented, high performance behavioral biometric processing engine provides low-cost two-factor authentication. It is transparent to the user, and is immediately deployable across both an organization and the Internet Help customers operate their business in compliance with regulations and help minimize risk Our solutions assure compliance with regulations as well as minimize the risk of impersonation, lost assets, and reputation Provide customers with peace of mind and harden password credentials Our device-independent software provides fast, accurate, and scalable authentication from an individual consumer to millions of users
  • 17. Technology Today – Keyboard based Solves the Password Problem Authentication for Computers and Networks (Two-Factor: User ID/Password, & BioPassword Credentials) Enterprise Network Access Control Stand-alone PC and Laptop Access Control Internet Authentication Future – Any input device Any device where data is input by touching, tapping or typing is a candidate for using BioPassword technology
  • 18. Products and Platforms BioPassword 6.0 Windows Enterprise Networks and Citrix Presentation Server Windows 2000/2003/XP Server Citrix Presentation Server FR 3 and 4 BioPassword Internet Authentication SDK Internet Browser-based Authentication BioPassword Software Developers Kit - SDK Windows 2000, XP Operating Systems Integration/Software Applications B-Identified Home & Professional (SOHO) Standalone Windows XP/XP Home/2000 Pro
  • 19. Products and Key Markets BioPassword 6.0 Healthcare and Financial Institutions due to regulatory compliance issues HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley BioPassword 6.0 SDK Custom Enterprise Identity and Access Management Applications BioPassword Internet Authentication SDK eCommerce Internet Authentication for Online Banking, Digital Content Distribution, Online Purchases
  • 20. Product Capabilities BioPassword 6.0 Protects the logon credentials for MSFT Windows and the Citrix Environment Protects Windows ‘Run As’, ‘Net Use’, ‘Connect As’ and ‘Screen Saver’ functions BioPassword 6.0 SDK Provides the capability to enable Keystroke Dynamic technology within an Application or an Operating System BioPassword Internet Authentication SDK Provides the capability to enable Keystroke Dynamics technology within a website logon procedure using any Internet Browser on the market today
  • 21. BIOPASSWORD, Inc. 1605 NW Sammamish Road Suite 105 Issaquah, WA 98027 www.biopassword.com 425-649-1100