2. ABSTRACTABSTRACT
At one end, there is a continuous andAt one end, there is a continuous and
tremendous improvement in the lifestyle oftremendous improvement in the lifestyle of
Humans while at the other end; the technologicalHumans while at the other end; the technological
crimes are increasing rapidly.crimes are increasing rapidly.
Technologies capable of identifying each personTechnologies capable of identifying each person
uniquely need to be developed. The only powerfuluniquely need to be developed. The only powerful
solution for the problem of illegal authenticationsolution for the problem of illegal authentication
is Biometrics.is Biometrics.
Biometrics is a means of using the physiologicalBiometrics is a means of using the physiological
or behavioral characteristics of a person as aor behavioral characteristics of a person as a
kind of permanent password.kind of permanent password.
4. INTRODUCTIONINTRODUCTION
Biometrics is an automated method of recognizing aBiometrics is an automated method of recognizing a
person based on a physiological or behavioralperson based on a physiological or behavioral
characteristic.characteristic.
Biometric technologies are becoming the foundationBiometric technologies are becoming the foundation
of an extensive array of highly secure identificationof an extensive array of highly secure identification
and personal verification solutions.and personal verification solutions.
Most systems make use of a personal identificationMost systems make use of a personal identification
code in order to authenticate the user.code in order to authenticate the user.
5. THE BIOMETRIC MODELTHE BIOMETRIC MODEL
The biometric authentication system consists of theThe biometric authentication system consists of the
following partsfollowing parts
User interface or the biometric readerUser interface or the biometric reader
Communication SubsystemCommunication Subsystem
The Controlling softwareThe Controlling software
Data storageData storage
6. APPLICATIONSAPPLICATIONS
BIOMETRIC BANKING: Banks have beenBIOMETRIC BANKING: Banks have been
experimenting with keystroke Biometrics for ATMexperimenting with keystroke Biometrics for ATM
machine use and to counteract the credit cardmachine use and to counteract the credit card
frauds.frauds.
INTERNET SECURITY: If the password is leaked out,INTERNET SECURITY: If the password is leaked out,
the computer or the web server will not be able tothe computer or the web server will not be able to
identify whether the original user is operating theidentify whether the original user is operating the
computer.computer.
BIOMETRIC SMARTCARDS:BIOMETRIC SMARTCARDS: Biometric technologiesBiometric technologies
are used with smart cards for ID systemsare used with smart cards for ID systems
applications specifically due to their ability toapplications specifically due to their ability to
identify people with minimal ambiguity.identify people with minimal ambiguity.
8. CONCLUSIONCONCLUSION
Keystroke Biometrics offers a valuable approach to currentKeystroke Biometrics offers a valuable approach to current
security technologies that make it far harder for fraud tosecurity technologies that make it far harder for fraud to
take place by preventing ready impersonation of thetake place by preventing ready impersonation of the
authorized user.authorized user.
Even if the unauthorized user discovers the access code,Even if the unauthorized user discovers the access code,
he cannot get access to the system until and unless he alsohe cannot get access to the system until and unless he also
knows the rhythm.knows the rhythm.
Also, the typing rhythm can be self-tuned by the user toAlso, the typing rhythm can be self-tuned by the user to
suit his needs. As the keyboard has duplicate keys, thesuit his needs. As the keyboard has duplicate keys, the
typing rhythm also depends whether the user is a left-typing rhythm also depends whether the user is a left-
handed person or a right-handed person. Positivelyhanded person or a right-handed person. Positively
Keystroke Biometrics will replace the entire traditionalKeystroke Biometrics will replace the entire traditional
security systems in the future.security systems in the future.