System and method for classifying regions of keystroke...

Electrical computers and digital processing systems: support – System access control based on user identification by... – Using record or token

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C382S115000, C706S006000, C706S015000, C706S016000, C706S025000, C706S033000, C706S034000, C706S035000, C706S036000, C706S037000, C706S038000, C706S039000, C706S040000, C706S041000, C706S042000, C706S043000, C706S044000

Reexamination Certificate

active

07620819

ABSTRACT:
We develop a system consisting of a neural architecture resulting in classifying regions corresponding to users' keystroke patterns. We extend the adaptation properties to classification phase resulting in learning of changes over time. Classification results on login attempts of 43 users (216 valid, 657 impersonation samples) show considerable improvements over existing methods.

REFERENCES:
patent: 3993976 (1976-11-01), Ginsburg
patent: 4197524 (1980-04-01), Salem
patent: 4455588 (1984-06-01), Mochida et al.
patent: 4499462 (1985-02-01), Stoesser et al.
patent: 4621334 (1986-11-01), Garcia
patent: 4805222 (1989-02-01), Young et al.
patent: 5060263 (1991-10-01), Bosen et al.
patent: 5161245 (1992-11-01), Fenwick
patent: 5181238 (1993-01-01), Medamana et al.
patent: 5222195 (1993-06-01), Alkon et al.
patent: 5276769 (1994-01-01), Ueda et al.
patent: 5371809 (1994-12-01), Desieno
patent: 5544255 (1996-08-01), Smithies et al.
patent: 5557686 (1996-09-01), Brown et al.
patent: 5675497 (1997-10-01), Petsche et al.
patent: 5764889 (1998-06-01), Ault et al.
patent: 5793952 (1998-08-01), Limsico
patent: 5802507 (1998-09-01), Gentric et al.
patent: 5910989 (1999-06-01), Naccache
patent: 5930804 (1999-07-01), Yu et al.
patent: 6062474 (2000-05-01), Kroll
patent: 6070159 (2000-05-01), Wilson et al.
patent: 6151593 (2000-11-01), Cho et al.
patent: 6167439 (2000-12-01), Levine et al.
patent: 6272479 (2001-08-01), Farry et al.
patent: 6307955 (2001-10-01), Zank et al.
patent: 6334121 (2001-12-01), Primeaux et al.
patent: 6405922 (2002-06-01), Kroll
patent: 6421450 (2002-07-01), Nakano
patent: 6513018 (2003-01-01), Culhane
patent: 6597775 (2003-07-01), Lawyer et al.
patent: 6839682 (2005-01-01), Blume et al.
patent: 6850606 (2005-02-01), Lawyer et al.
patent: 6865566 (2005-03-01), Serrano-Morales et al.
patent: 6903723 (2005-06-01), Forest
patent: 6944604 (2005-09-01), Majoor
patent: 6965889 (2005-11-01), Serrano-Morales et al.
patent: 6968328 (2005-11-01), Kintzer et al.
patent: 6993514 (2006-01-01), Majoor
patent: 7246243 (2007-07-01), Uchida
patent: 2001/0036297 (2001-11-01), Ikegami et al.
patent: 2002/0171603 (2002-11-01), Chen et al.
patent: 2004/0005995 (2004-01-01), Edelson
patent: 2004/0034788 (2004-02-01), Ross
patent: 2004/0103296 (2004-05-01), Harp et al.
patent: 2004/0162999 (2004-08-01), Schreiber et al.
patent: 2004/0187037 (2004-09-01), Checco
patent: 2005/0008148 (2005-01-01), Jacobson
patent: 2005/0058324 (2005-03-01), Karhik
patent: 2005/0149463 (2005-07-01), Bolt et al.
patent: 2006/0136744 (2006-06-01), Lange
patent: 2006/0222210 (2006-10-01), Sundaram
patent: 2007/0009140 (2007-01-01), Jitsui et al.
patent: 2007/0245151 (2007-10-01), Phoha et al.
patent: 1251468 (2002-10-01), None
patent: 11253426 (1999-09-01), None
patent: 11306351 (1999-11-01), None
BioPassword Technical Report, BioPassword Keystroke Dynamics, Oct. 2001, pp. 1-9.
Umphress, D., et al., “Identity Verification Through Keyboard Characteristics”, Int'l. Journal of Man-Machine Studies (1985) 23(3): 263-273.
Leggett, et al., “Verifying Identity via Keystroke Characteristics”, Intl. Journal of Man-Machine Studies, (1988) 28(1): 67-76.
M. Brown, et al., “User Identification via Keystroke Characteristics of Typed Names Using Neural Networks”, Int'l. Journal of man-Machine Studies (1993) 39(6): 999-1014.
Monrose, et al., “Authentication via Keystroke Dynamics”, Proc. of the ACM Workshop, ACM Conference on Computer Communications Security (1997) pp. 48-56.
Robinson, et al., “Computer User Verification Using Login String Keystroke Dynamics”, IEEE Transactions on Systems, Man, and Cypernetics—Part A: Systems and Humans (Mar. 1998) vol. 28, No. 2, pp. 236-241.
Bleha, et al., “Computer-Access Security Systems Using Keystroke Dynamics”, IEEE Transactions on Pattern Analysis and Machine Intelligence (Dec. 1990) 12(12): 1217-1222.
The Penn State Research Foundation, “PCT notification of transmittal of international search report and written opinion of the international search authority,” dated May 17, 2007, PCT/US05/35219, filed Sep. 30, 2005.
R. Gaines, et al., “Authentication by Keystroke Timing: Some Preliminary Results”, Rand Report R-256-NSF, Rand Corporation, 1980.
Jain, A.K., et al., “Artificial Neural Networks: A Tutorial,” Computer, 29(3):31-44, Mar. 1996.
Lippmann, R., “An Introduction to Computing with Neural Nets,” ASSP Magazine, 4(2):4-22, Apr. 1987.
Monrose, F., et al., “Keystroke dynamics as a biometric for authentication,” Future Generation Computer Systems, 16(2000):351-359, Mar. 1999.
Sheng, Y., et al., “A parallel decision tree-based method for user authentication based on keystroke patterns,” IEEE Transactions on Systems, Man and Cybernetics—Part B: Cybernetcs, 35(4):826-833, Aug. 2005.
Biopassword, “Technical Report. BioPassword Keystroke Dynamics”, http://web.archive.org/web/20040807231; http://www.biopassword.com/home/technology/BP%204.5%20 Technical%20Paper.pdf, (Oct. 18, 2001).
Ilonen, J, “Keystroke dynamics”, Advanced topics in information processing 1—lectures, Lappeenranta University of Technology, Department of Information Technology, (2003), 1-15.
Monrose, F, et al., “Keystroke dynamics as a biometric for authentication”, Future Generation Computer Systems, vol. 16, (2000), 351-359.
Peacock, A, et al., “Typing patterns: a key to user identification”, IEEE Computer Society, vol. 2, No. 5, (Sep. 2004), 40-47.
Penn State Research Foundation, Inc., EP Extended Search Report dated Oct. 1, 2008 for EP Application No. 05858188.5.
Cotton, Ira W. et al, “Approaches to Controlling Personal Access to Computer Terminals,”Proceeding Computer Networks: Treads & Appos., 1975.
Fielding, R., et al., “Hypertext Transfer Protocol—HTTP 1.1”, RFC2616 dated Jun. 1999; 177 pages.
“Guidelines on Evaluation of Techniques for Automated Personal ID,” U.S. Dept. Of Comm./NBS, FIPS, PUB 48, Apr. 1977.
“Keystroke Dynamics Authentication of Computer Terminal Users,” Bioaccess System 2000, 2000A, 2001, 2011, and OEM, Jun. 1984.
Kullback, Solomon,Information Theory&Statistics, John Wiley & Sons Inc., pp. 3383, 1959.
Rennick, R.J. et al., “Mufti-A Multi-Function ID System,”WESCON Tech. Papers, 1975.
Riganati, John P., “An Overview of Electronic ID Systems,”WESCON Tech. Papers, 1975.
Saltzer, Jerome H. et al., “The Protection of Information in Computer System,”Proceedings of the IEEE, vol. 63, No. 9, Sep. 1975 (pp. 1278-1308).
Sedgwick, John, “The Body Code Machines: These New Computerized Devices Can Recognize You Anywhere,”This World, Jan. 9, 1983, pp. 9-10.
Biopassword, Inc., PCT International Search Report dated Jun. 5, 2007, International Application No. PCT/US2006/048964, filed Dec. 20, 2006.
Admitone Security, Inc., Non final office action dated Jun. 2, 2009 for US11/396,786.
Admitone Security, Inc., Non final office action dated Jun. 8, 2009 for US11/317,685.
Admitone Security, Inc., Final Office Action dated Jul. 14, 2009 for US11/349,814.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for classifying regions of keystroke... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for classifying regions of keystroke..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for classifying regions of keystroke... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4129462

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.