Today : Tuesday - Sep 23, 2014, 11:52am (GMT+5.5)
All News  
Top News
National News
International News
Business News
Sports News
   » Cricket
   » Football
Entertainment News
Sci - Tech
Politics News
Health & Fitness
Gulf News
::| Latest News
News in Pictures

Reliance Communications has made full repayment of two loans amounting to $1 billion (around Rs 6,000 crore), during the quarter ended June 30.The repayments have been from the company's rupee resources.

Sci - Tech

Revolutionary software may eliminate need of computer passwords

Tuesday - Mar 20, 2012, 03:50am (GMT+5.5)
[+] Text [-]

Sydney -  Computer experts are looking forward to ways through which people can start working right away by just typing their user name - no password required.

This is the vision of Defence Advanced Research Projects Agency, part of the Defence Department. It will distribute research funds to develop software that determines, just by the way you  type, that you are indeed the person you say you are.

DARPA’s purpose is to sponsor “revolutionary, high-payoff research” for military use. But technology developed under DARPA’s auspices - the internet itself being only one among many  achievements traceable to its initiatives - eventually tends to find its way into the civilian world, the Sydney Morning Herald reported.

Passwords like “6tFcVbNhTfCvBn” meet the Defence Department’s definition of “strong,” said Richard Guidorizzi, a program manager at DARPA.

“The problem is, they don’t meet human requirements,” he said.

“What I’d like to do,” Guidorizzi said, “is move to a world where you sit down at a console, you identify yourself, and you just start working, and the authentication happens in the background,

invisible to you, while you continue to do your work without interruptions.”

No biometric sensors, such as thumb print or iris scanners, would be used.

Instead, he is looking for a technology that depends solely on an individual’s distinct behavioural characteristics, which he calls the cognitive fingerprint.

Academic experts are trying a number of approaches to determine users’ identities only through their computer behaviour.

Roy Maxion, a research professor of computer science at Carnegie Mellon University in Pittsburgh, supervises research on “keystroke dynamics,” including the length of time a user holds

down a given key and moves from one particular key to another.

Motions that we’ve performed countless times, Maxion says, are governed by motor control, not deliberate thought.

“That is why successfully mimicking keystroke dynamics is physiologically improbable,” he said.

He asserted that there is some evidence that a user’s emotional state affects typing rhythms.

But just as people can recognise a familiar song even if it is mangled by inept musicians, so, too, he hypothesizes, could software recognise one’s distinct “core rhythm,” which would be  “perceptible even through the noise of emotion, fatigue or intoxication.”

He adds that the notion of core rhythm has not been experimentally confirmed.

Charles C. Tappert, a professor of computer science at Pace University in New York, has also carried out research on the keystroke biometric, verifying identities by looking at the way  students type their answers to questions on online tests.

His research group has come up with a software that analyses the distinctive pattern of keyboard pressure; it accurately confirms the claimed identity of a test taker in 99.5 per cent of cases,  he said.

The situations that DARPA has in mind would require a system that quickly authenticates the user, without waiting to collect data on hundreds of keystrokes. But Tappert says an intruder’s  movement within an internal network would show telltale irregularities and that his software would be able to detect them.

Research overseen by Salvatore J. Stolfo, professor of computer science at Columbia University, has led to the development of software that uses a simple means of detecting an intruder:  placing decoy documents on the computer.

Because of the conventional password-based systems used today, the agency insisted, there is now no way “to verify that the user originally authenticated is the user still in control of the  keyboard.”


Rating (Votes: )   

blog comments powered by Disqus

Related Articles:
» Google breaks 2005 promise not to show banner ads on web search results
» Samsung Galaxy S4 unit sales exceeded 40 million in past six months
» Microsoft beats expectations with 17-percent profit surge in Q3
» Twitter seeks $10.9bn valuation in IPO
» BlackBerry introduces new smartphone priced at Rs.39,990
» Apple announces latest OS Mavericks for free download
» Apple unveils latest iPad Air, Macs and new OS
» India's Mars mission Nov 5
» Google accused of making `library visits` history!
» Google Doodle celebrates 216th anniversary of worlds first parachute jump
» Nokia Lumia 1320 likely to be unveiled today
» Kudankulam n-power plant generates 160 MW
» Power generation at Kudankulam n-plant begins
» Twitter considering killing no-longer profitable #Music mobile app
» Latest iPad5 to be thinner, lighter, sans TouchID
» Airtel acquires Qualcomms 4G company
» Google shares soar `all-time high` in Q3
» Microsoft updates Windows 8 with start button, Facebook app and better multitasking
» Kobo introduces e-reader tablets in India
» eBay forecasts lower-than-expected Q4 profit and sales
» HCL Technologies' Q1 profit rises 64 percent, tops estimate
» Online database of disease genes that could be targeted with drugs
» Iran to launch second monkey into space next month
» New genetic pathways involved in bladder cancer identified
» Explosive dynamic behaviour on Twitter similar to horde behaviour in financial market

Other Articles:
Bone marrow transplant arrests symptoms of Rett syndrome in mice (19th Mar, 2012)
Migrating humans `carried mice to colonies` (19th Mar, 2012)
What Apple plans to do with $98bn cash pile (19th Mar, 2012)
Your face can give the game away when you lie (19th Mar, 2012)
Japanese traditional therapy may help prevent inflammatory brain damage (19th Mar, 2012)
Protein used to treat cancer modified to boost potency, reduce toxicity (19th Mar, 2012)
Early `see-sawing` Earth experienced hazy shades of life (19th Mar, 2012)
Free apps may be behind short battery life of cell phones (19th Mar, 2012)
Smartphone ban one night a week boosts office workers’ performance (19th Mar, 2012)
Human stem cell injections ease Parkinson’s symptoms in monkeys (19th Mar, 2012)
Gene variant in East Asians could explain resistance to cancer drugs (19th Mar, 2012)
Scientist unravels secret of T.rex's fearsome snarl (19th Mar, 2012)
Sex-addicted Bonobo apes on brink of extinction (18th Mar, 2012)
Samsung to launch cheaper smartphones for India (18th Mar, 2012)
Human brain may be hard-wired to care for infants (18th Mar, 2012)
Babies fed on demand `better at academics` (18th Mar, 2012)
Pre-stressed plants ‘remember’ drought for survival (18th Mar, 2012)
Brain deficits may be behind shyness (18th Mar, 2012)
Biofuel cell-implanted snails can generate months of electricity (18th Mar, 2012)
New surgical techniques offer hope for more effective vitiligo treatment (18th Mar, 2012)
Live cells printed with standard inkjet printer (17th Mar, 2012)
Common chemicals used in plastics alter reproductive system in female mice (17th Mar, 2012)
Sea-level rise could be lower than previous estimates (17th Mar, 2012)
US engineer breaks open iPad to study its insides (17th Mar, 2012)
Past changes in monsoon linked to major shifts in Indian civilizations (17th Mar, 2012)

Contact Us | Advertise with Us | Privacy Policy | Disclaimer | Terms of Use