Keyboard Dynamics

  • Living reference work entry
  • First Online:
Encyclopedia of Cryptography, Security and Privacy
  • 50 Accesses

Synonyms

Keystroke dynamics; Ty** dynamics; Ty** patterns

Definition

Keyboard dynamics are the time-varying measurable characteristics of ty** or rhythmic patterns of sequences of keystrokes on a keyboard.

Background

Early telegraph operators realized that they could identify other operators by listening to the unique characteristics of their keying patterns. The ability to identify and differentiate among groups of telegraph operators happened naturally through repeated listening to their telegraphic transmissions. All of the operators used Morse code; it was the more subtle differences in keying patterns that provided the ability to distinguish one operator from another. Individual operators tend to develop unique keying characteristics, particularly as related to timing between keystrokes and the amount of time that a telegraph key is depressed. Studies on the analysis of telegraph operator keying rhythms occurred as early as the work of Bryan and Harter in 1899(Bryan and...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Alharbi A, Thornton MA (2016) Demographic group prediction based on smart device user recognition gestures. In: IEEE international conference on Machine learning and applications, 18 Dec 2016, pp 100–107

    Google Scholar 

  • Allen JD, Howard J (2010) Design and implementation of a novel behavioral biometric for user authentication. In: Proceedings of the society for design and process science

    Google Scholar 

  • Allen JD, Howard JJ, Thornton MA (2016) Method for subject classification using a pattern recognition input device. US Patent 9,329,699, 3 May 2016

    Google Scholar 

  • Alshehri A, Coenen F, Bollegala D (2016) Towards keystroke continuous authentication using time series analytics. In: Bramer M, Petridis M (eds) Research and development in intelligent systems XXXIII. Springer International Publishing AG. https://doi.org/10.1007/978-3-319-47175-4

  • Bleha S, Slivinsky C, Hussien B (1990) Computer-access security systems using keystroke dynamics. IEEE Trans Pattern Anal Mach Intell 12(12):1217–1222

    Article  Google Scholar 

  • Bryan WL, Harter N (1899) Studies on the telegraphic language: the acquisition of a hierarchy of habits. Psychol Rev 6(4):345–375

    Google Scholar 

  • Gaines R, Lisowski W, Press S, Shapiro N (1980) Authentication by keystroke timing: some preliminary results. Rand Report R-256-NSF, Rand Corporation

    Google Scholar 

  • Garcia JD (1986) Electronic signature lock. US Patent 4,621,334, 4 Nov 1986

    Google Scholar 

  • Killourhy K, Maxion R (2008) The effect of clock resolution on keyboard dynamics. In: 11th international symposium on recent advances in detection, LNCS 5230, Springer

    Google Scholar 

  • Shepherd SJ (1995) Continuous authentication by analysis of keyboard ty** characteristics. In: European Convention on Security and Detection, IET, pp 111–114

    Google Scholar 

  • Spillane R (1975) Keyboard apparatus for personal identification. Technical report, IBM Technical Disclosure Bulletin

    Google Scholar 

  • Sternberg S, Monsell S, Knoll R, Wright C (1978) The latency and duration of rapid movement sequences: comparisons of speech and ty**. In: Stelmach GE (ed) Information processing in motor control and learning. Academic, New York, pp 117–152

    Chapter  Google Scholar 

  • Young JR, Hammon RW (1989) Method and apparatus for verifying an individual’s identity. US Patent 4,805,222, 14 Feb 1989

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mitchell A. Thornton .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Science+Business Media LLC

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Thornton, M.A. (2021). Keyboard Dynamics. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_783-2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27739-9_783-2

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27739-9

  • Online ISBN: 978-3-642-27739-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics

Navigation