Verifying Passwords By the Way They're Typed 140
Zothecula writes "There are good passwords and bad passwords, but none of them are totally secure. Researchers at the American University of Beirut, Lebanon, are working on strengthening an approach to password security that's not just about what you type, but how you type it (abstract)." Note that the actual paper appears to be behind some crappy paywall: hopefully the research exists elsewhere on-line.
how will it know? (Score:5, Informative)
How would such a system know if I am typing on my normal keyboard vs. using an on-screen one on a tablet vs. using a coworkers "ergonomic" keyboard vs. being interrupted in the middle of typing my password by my kids?
Re: (Score:1)
It runs on intuition.
Re: (Score:1)
doesn't matter if it actually works, can sales wanks can sell it to IT managerial and director dumb-asses, that's what matters.
Re: (Score:1)
They profile the device too
Re: (Score:2)
It's not just the keyboard that you are typing on, but the time of day, i.e. how tried or awake you are, etc.
Bunch of highly educated idjits to say the least at them thar university.
Re: (Score:1)
Wouldn't you be a little less confident while trying out the password? How would this "verify by the way you type" approach interpret this?
Re: (Score:2)
Re: (Score:1)
It's not just the keyboard that you are typing on, but the time of day, i.e. how tried or awake you are, etc.
Bunch of highly educated idjits to say the least at them thar university.
Imagine when an admin has to change your password: Your new password is Y(eRx!! and you have to type it to the rhythm of "shave and a haircut".
Re: (Score:1)
It's not just the keyboard that you are typing on, but the time of day, i.e. how tried or awake you are, etc.
Yeah. I remember not publicizing my very old VB Course project, which was "password typing pattern matcher" for exactly this reason.
Re: (Score:1)
And for all you know a keyboard snooper could easily track your pattern and play it back later.
Re:how will it know? (Score:5, Interesting)
It doesn't. My bank used such a service for a while before it stopped due to complaints. If you made a mistake, paused, etc you would need to start over. Backspace automatically did it for you. It was a major PITA when my wife would log in to our bank account, then I would try. It always seemed to remember her slow typing but not mine. Plus, it would reject me if I used the number pad to enter the account number because digits there were different keys apparently then the digits on the top row.
Re: (Score:2)
I suffer from arthritis so my typing speed varies. Similarly I find it hard to verify credit card transactions with a signature because mine varies quite a bit with how stiff my hands are feeling.
Re: (Score:2, Insightful)
Let's see....
This would add additional complexity for users who are *already* overwhelmed by what security experts tell them to memorize. A unique username and password for every site and each password needs to be a random jumble of upper, lower, and special characters. I've got nearly 30 passwords (I have no intention of memorizing them - I can't).
Now, you want to *also* introduce the time between keystrokes? Now I've got three attempts to remember my password, type it correctly, and at the same speed a
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Also, the temperature of your hands affects both typing speed and number of typos... and how awake you are does too.
And the worst thing is: if someone's keylogging your system, they'll have the pauses as well as the exact sequence you used, and can just replay it. So the system causes issues for legitimate users, while only stopping the most casual attempts at unauthorized access (for which a regular 12-16 character passphrase is usually enough in the first place).
Re: (Score:2)
Tried this already (Score:2)
Re: (Score:2)
Alternate keyboards can be an issue with passwords as they are used now. I have some longish ones that I never get wrong on the laptop, but fumble with on the phone. Some level of muscle memory kicks in on the full keyboard that's absent on the touch screen.
The description in the article might be useful, but only if the entry device is static. A numeric keypad for a door entry might work, or the keyboard attached to a specific machine, like with a laptop. But a password used for access to a remote syste
Re: (Score:1)
No, it sucks. (Score:3)
I had an account at a bank that did something like this.
It sure was great fun having to type in my password 3 times because it didn't like the way I typed it.
And forget about trying to log-in from a mobile device.
(and before you tell me to switch banks, they do have other advantages that make it worth it. Just online-access is a pain-in-the-ass.)
Re: (Score:2)
A parallel system for mobile devices (Score:2)
Re: (Score:2)
Great. (Score:1)
Quit posting articles w/ paywalls (Score:5, Insightful)
Note that the actual paper appears to be behind some crappy paywall
Then don't post it until you find a reference w/o a paywall. Period.
This was tried years ago... (Score:2)
Hmmm (Score:2)
"American University of Beirut, Lebanon"
This is rather confusing to me.
Re: (Score:2)
Here you go. [aub.edu.lb]
Founded in 1866, the American University of Beirut bases its educational philosophy, standards, and practices on the American liberal arts model of higher education. ... [it] was granted institutional accreditation in June 2004 by the Commission on Higher Education of the Middle States Association of Colleges and Schools in the United States ... The language of instruction is English (except for courses in the Arabic Department and other language courses).
Re: (Score:2)
Just as Korbel wine is not Champagne (Score:2)
It is not uncommon--particularly in the developing world--to label universities with credibility building notions such as "American." They typically have a structure resembling an "American/Western" college
Then "American Style University of Beirut" would be more honest. In fact, given what I've read about the rise of "protected designations of origin", this naming practice might even become illegal in some parts of the world, just as only one region's sparkling wine can be called CHAMPAGNE® in the EU.
yes. it exists online in the 'ashbin of the 90s' (Score:2)
IIRC the keyboards of the day did not have precise enough timing for it to be very workable, and there wasnt enough fancy pattern matching software to figure out how to make use of any 'persoanlized' quirks in typing patterns.
plus, if you ever had a bad headache or were slightly intoxicated or tired, it could throw off the whole thing if you 'lock people out' based on weird criteria like that
i think the main difference nowdays is some idiot will try to patent it and sue
More prior art (Score:1)
Re: (Score:1)
all it would see is crtl+v (Score:1)
I don't even know what my passwords are, I copy and paste them out of keypass.
So i guess it would work really well for me!
Re: (Score:3)
Ctrl-V is rendered useless when your bank uses flash for the login disabling Ctrl-V.
Re: (Score:2)
Useless. (Score:2)
Hope that paper-cut heals quickly (Score:2)
My voice is my password (Score:1)
Re: (Score:1)
My name is Werner Brandis. $SUBJECT Verify me.
Injure your hand? Can't log in. (Score:1)
Arthritis? Can't log in. Too much caffeine? Can't log in. Too little? Can't...
No, No... (Score:1)
Alcohol test for soviet pilots (Score:4, Interesting)
I remember hearing a story that this system was used to determine the state of mind for soviet military pilots.
You type a control paragraph of text, and then you have to type the same thing again before each flight. The computer just measures the pattern of how you type, and sinc ethere's substantial amount of text (not just shorter password) I guess it could work.
Of course this was easy to bypass if you just typed initial control text already drunk. :) Just make sure you are drunk for each flight afterwards.
BTW, I have also heard a lecture in my uni 15 years ago from a guy that was trying to develop the system to also determine general mood of the person by the way they typed. Not sure how far that went.
Re: (Score:2)
Watson's success in Jeopardy has me wondering if we ever see a limit to machine learning. Cell phones have so many sensors on board - camera, location, microphone. I know the last Batman film touched on this but if those sensors were all switched on and listening, a data centre would know when we were relaxi
MS Research did some more useful research here (Score:2)
http://channel9.msdn.com/Blogs/TheChannel9Team/Kevin-Schofield-Tour-of-Microsoft-Research-Part-II-machine-learning [msdn.com]
http://research.microsoft.com/en-us/um/people/horvitz/interrupt.htm [microsoft.com] - this is his stuff about email/IM interruptions
for example this one http://research.microsoft.com/en-us/um/people/horvitz/learninterrupt.htm [microsoft.com]
I have only really watched the video myself, it's an interesting idea - using webcam, microphone and your calendar, try to estimate how much is your time worth (in dollars) at any particula
Michael Crichton had this idea in the 80s (Score:2)
Michael Crichton (yes, that Michael Crichton) actually wrote an article about this in Creative Computing magazine back in the early 80s. He even included a BASIC program to demonstrate the idea. I believe it was called MouseTrap.
Re: (Score:2)
Funny...I was just going to post this, but thanks for reminding me of the name. As I recall, it was a short story (I want to say I read it in Life, of all places), about a "hot shot" programmer who ignores another, older, programmer who wants to show him this cool new tech he's been working on. Suffice to say the hot-shot programmer gets seduced into selling the company secrets and, this is the part I remember most vividly, does it in a motel room, using a modem, and while he's waiting wanders down the hall
Re: (Score:2)
Michael Crichton (yes, that Michael Crichton) actually wrote an article about this in Creative Computing magazine back in the early 80s. He even included a BASIC program to demonstrate the idea. I believe it was called MouseTrap.
Before that, morse code operators could identify each other by their "fist" - the unique way they types the code on the morse key.
Re: (Score:2)
The original story was printed in the July 1984
Old paper in obscure journal; trivially defeatable (Score:2)
Re: (Score:1)
I foresee difficulties with anything portable (Score:2)
Being a laptop, and I being a total freak, I often use my laptop in... unusual positions. Seriously, I once used it, standing on my head (leaning against a wall), holding it with one hand and typing with another. Good way to stretch without having to take a break from the Internet.
Anyways, part of that involves logging in, say, one-handed. Or with t
Old Research (Score:1)
Frozen fingers, drunk status updates (Score:1)
Could work for Sony. (Score:1)
Back in the BBS days (Score:2)
I remember back in those old BBS days where they had DOS Based BBS Software where when somone logged into your BBS You had a near mirror image on what the user was doing. So while they typed their password you saw their password echoed to the Sysop screen at real time. For small BBS's a SysOp knew if the user was just by watching them login. You knew by they way they typed if it was them or not.
Passwords based on shapes (Score:2)
Does anyone else make up passwords based on a shape or pattern on a keyboard? I got in that habit years ago, remembering them is more "muscle memory" than anything. Half of the time I couldn't even tell you what the actual letters are but can remember that its a Tree shape or fish shape, etc.
Really Old News (Score:1)
Here's a paper on the same subject from 18 years ago, and that was just the first result I found on google scholar!
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=256563 [ieee.org]
Obviously, there have been advances since then but this certainly isn't a new idea by any stretch of the imagination.
Sounds problematic (Score:2)
So what happens when I injure a hand working on the car or something and have to do my keyboarding with only my right or only my left? I can't login?
Re: (Score:2)
So what happens when I injure a hand working on the car
Have your doctor notify the service provider of this.
It'll work perfectly for me, most of the time (Score:2)
...my password manager should fill the buffer at the same rate every time.
already implemented (Score:1)
Keycode stream, not character stream (Score:2)
I keep wanting a password input that works off a keycode stream, not a string.
That way your password could include deletions, modifier keys, and other unusual combinations. It sounds less fragile than this approach, although it might be interesting on devices with different keyboard layouts.
Old Story (Score:2)
I read about this over 10 years ago. It was the same time hand writing recognition was supposed to turn Palms into ultra-secure password verifiers, and someone said "Hey, we can do that with typing too!". It went nowhere. Anyone got a link to the old research?
This also sounds like the old program to allow the NSA to identify anonymous blog writers. But instead of typing patterns, it used words already typed patterns.
But still, this is OLD tech. Nothing new to see, move along.
Not an entirely new idea... (Score:4, Interesting)
I reviewed a company's offering a few years ago that was recording the relative timing between keystrokes when you entered a password. Any subsequent attempts had to match that relative pattern in order to be verified.
It failed miserably.
I had a demo with the company. They showed me a nice fake online banking login screen. They then told me the name and password and said "Go ahead and try to login." I did so. And it let me right in. The woman giving the demo couldn't believe it. I took a screenshot and sent it to her as verification. Sure enough, their system did not stop me from logging in.
So she reset the password to something else, ran through a couple of calibration runs to make sure she could login, and then again gave me the password. I once again logged in immediately.
Once more she changed the password, and again asked me to try it. I couldn't login. So I tried a few more times, and on the third try I was once again staring at fake bank accounts.
I realized two things from this demo. First, its easily breakable by a human with comparable typing skills to the victim when the password is known. Second, the only thing this (particular product) could defeat was an automated system attempting to login. ...I don't think that review ever got published...
Re: (Score:2)
One handed (Score:2)
Behind some crappy paywall? (Score:2)
Seriously? ... Let me be the first to welcome you to the world of academic journals.
This is nothing new (Score:2)
That would kill my best posts... (Score:2)
... as most of them are made when I'm drunk...
Not New (Score:2)
I read about this years ago. How is this news? It's a cool idea that I find works well in some situations, but you wouldn't want to use it everywhere. I do think it is a cool technology though.
Forgot password (Score:2)
Password timing (Score:1)
18 years ago, I wrote a DOS-based keyboard lock intercept that used keydown/keyup in addition to keypress. Current password schemes use the sequence of keypresses only. Mine captured when a key was depressed and when it was released, such that you could have a passcode consisting of:
Depress H
Depress E
Release E
Depress L
Release H
Release L
Depress L
Depress O
Release L
Release O
This sequence spells out the word HELLO, but is somewhat more secure than HELLO at the console as it also requires the press/release to
Fisting (Score:2)
Credit where credit is due (Score:1)
Flashback (Score:1)
Too Many Variables (Score:1)
So much for research (Score:2)
It's probably already patented.
Re: (Score:2)
Are you saying I need to teach my dog to type my password then?
"It does not keep track of your actual password" (Score:2)
neither does any other system created since the 1970s. they all store the passwords as hashes
Re: (Score:1)
Re:Is this a new slashdot business model - 30 Eu! (Score:1)
Crappy does not describe this. The price of the paper is 30 Euros! (I didn't buy it, if I had I would be posting as AC) Who is going to pay that kind of money based on the posted abstract?
Re: (Score:2)
Who is going to pay that kind of money based on the posted abstract?
Malware authors working for organised crime? :)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
1) Just typing the password is far easier
Not if it's a good strong password and you only use it in one place, which means you have a lot of passwords.
2) If you'd have to copy and paste it, you'd have to have it in a text file
Not necessarily. It could be a salted hash that's regenerated when it's needed.
3) Storing that text file unencrypted would be incredibly stupid
That depends on who has physical access to the text file. Contrary to popular belief, a sticky note pasted to the monitor is actually quite secure against Chinese hackers, though you still have to worry about the cleaning staff because they have physical access.
4) What's the point of encrypting it when you'd have to enter a password to get to it?
At least then your master password still requires physical acc
Re: (Score:2)
linuxgeek64 asks:
Why would anyone enter a password with copy and paste?
1) Just typing the password is far easier
2) If you'd have to copy and paste it, you'd have to have it in a text file
3) Storing that text file unencrypted would be incredibly stupid
4) What's the point of encrypting it when you'd have to enter a password to get to it?
There are these things called "Password Safes" which can hold many many MANY passwords... long passwords... secure passwords... passwords to servers or routers that I log into once a year... Password safes keeps the contents encrypted and many work via copy-and-paste... you double-click on the server name, the password safe puts the password in your clipboard and then you move focus to your SSH session to your router...hit control-V and log in
Re: (Score:2)
I find it highly unlikely that your "safe" is air-walled in a physically secure location. So... what if someone manages to obtain your safe's password? Your plethora of uber strong passwords is effectively just one password.
These password vaults/safes are nothing but another convenience tool sold to people with poor judgement that are continually finding ways to skirt the protection measures put in place to protect their's and their company's butt from malware and various other forms of security breaches.
Re: (Score:2)
yeah, you're right... better go back to a text file with all passwords in it. because security is binary...all in or all out
you have a lot to learn, bub
Re: (Score:1)
I have to have physical access to the machine it is on.
I have to know the password to log on to that machine (technically, this can be bypassed with physical access...)
I have to know where the password safe is.
And I have to know my (fairly secure) password, which I do not share with anyone, and does not match any other sites.
There are ways around those, but the truth is that no one cares enough about my
Re: (Score:1)
Re: (Score:2)
"I find it highly unlikely that your "safe" is air-walled in a physically secure location."
Why would you find that unlikely? Lots of people keep theirs on a USB key.
"So... what if someone manages to obtain your safe's password?"
The point is that this is almost vanishingly unlikely, because that password never needs to be stored anywhere outside of your own system or transmitted over any kind of network connection; these are by far the most likely vectors by which someone could discover one of your passwords
Re: (Score:2)
... and then you move focus to your SSH session to your router...hit control-V and log in
I call shenanigans! Unless you have very windows-user-friendly SSH software, CTRL+V is not going to help you out too much when trying to paste.
Re: (Score:2)
-----BEGIN PGP MESSAGE-----
Version: GnuPG v2.0.12 (MingW32)
hQIMAz00SGeYEuCgARAApEqhL8yaKi4TGy/u+OhpCfeILMDuqJZHiUal3ERSqPpo
GynRpLc8H6bdThJs9Z3p5OLtq2NIKBCRCtAo/vVpgiCvyMqUs/DcH+Sfz
Re: (Score:2)
That's a feature - if it's password protected, you're best off not doing it while intoxicated.
Re: (Score:2)
Or when you break an arm, or sprain a hand, or your arthritis is acting up, or you are eating some food with one hand while typing with the other like I was at lunch at my desk at work today, etc, etc, etc...
This is just a bad idea
Re: (Score:3)
I have heard it called keystroke dynamics, and as others have said it isn't too feasible for just straight-up identify verification. However, you can do a lot of cool things with KD software. Hasn't this concept been around for quite awhile?
Yup, it has. I worked on a mainframe system back in the early 1970s whose OS provided keystroke timings to apps that wanted the info. The first use was in the login code, which used the character-pair timings to verify the user. It was actually fairly successful, and didn't have the rampant failures that many people here describe. In fact, it pretty quickly made login ids unnecessary, since the "system" could identify each user fairly quickly when they typed anything at all.
There was a funny follow-o
Re: (Score:2)
I hesitate to refer people to his work since he turned into a raving bigot, but there's a similar plot point in the short story Dogwalker [wikimedia.org] by Orson Scott Card.