play the keyboard

14
PLAY THE KEYBOARD Zhao Tian Kai Liu

Upload: roza

Post on 23-Feb-2016

67 views

Category:

Documents


0 download

DESCRIPTION

PLAY THE KEYBOARD. Zhao Tian Kai Liu. Outline. 1. Motivation. 2. Related Work. 3. Proposed Solution. 4. Preliminary Results. Password Is Not Secure. Numerous passwords in the Internet. Security is significant!. Passwords around us. Secure?. NO!. When Password Is Disclosed. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: PLAY THE KEYBOARD

PLAY THE KEYBOARD

Zhao Tian Kai Liu

Page 2: PLAY THE KEYBOARD

Outline

4. Preliminary Results

3. Proposed Solution

2. Related Work

1. Motivation

Page 3: PLAY THE KEYBOARD

Password Is Not Secure

Numerous passwords in the Internet.

Security is significant! Secur

e?NO!

Passwords around us

Page 4: PLAY THE KEYBOARD

When Password Is Disclosed

We could let out our key accidently

How to protect the password even if it has already been disclosed?

Page 5: PLAY THE KEYBOARD

Analogy: Password vs. Music Score

VSSame as the music score, the players can be distinguished.

Can we distinguish the keyboard

players?

Page 6: PLAY THE KEYBOARD

Outline

4. Preliminary Results

3. Proposed Solution

2. Related Work

1. Motivation

Page 7: PLAY THE KEYBOARD

Ways To Enhance AuthenticationDigital IdentificationBiometrics

COST TOO MUCH

Page 8: PLAY THE KEYBOARD

Coltell, O., Badfa, J.M., Torres, G., “Biometric identification system based on keyboard filtering”, Security Technology, 1999. Proceedings. IEEE 33rd Annual

1999 International Carnahan Conference on, On page(s): 203-209

Keystroke Pattern

“Research results demonstrate that users follow generally certain patterns when they are writing their password.”

Page 9: PLAY THE KEYBOARD

Outline

4. Preliminary Results

3. Proposed Solution

2. Related Work

1. Motivation

Page 10: PLAY THE KEYBOARD

oodd

Input & Send the Password

Time

V m 25 r qt1

5 r q 2t2 t3 t4 t5 t6 t7 t8

V m

Page 11: PLAY THE KEYBOARD

Receive & Match the Password

Times1 s2 s3 s4 s5 s6 s7 s8

odV m 25 r qStored Pattern

Timet1 t2 t3 t4 t5 t6 t7 t8

odV m 25 r qMatch

Page 12: PLAY THE KEYBOARD

Outline

4. Preliminary Results

3. Proposed Solution

2. Related Work

1. Motivation

Page 13: PLAY THE KEYBOARD

Password Is Stolen

Times1 s2 s3 s4 s5 s6 s7 s8

odV m 25 r qStored Pattern

Timet1 t2 t3 t4 t5 t6 t7 t8

odV m 25 r qNot Match

Page 14: PLAY THE KEYBOARD

THE END!

THANK YOU!