That is very true. But at a company or a instituitional level, you may 
want to have two levels of authentication: 1) the initial "get me pass the 
front door" authentication, and 2) an on going authenthication that 
monitors your behavior to ensure that you "continue" to be the person that 
entered the door.

Actually, behavioral identification is already in practical use. 
Credit card companies use this to red flag transactions that many not be 
coming from the rightful owner based on his/her pass transasction 
patterns. And if so, it suspends the card until the owner calls in to 
confirm that the transactions are vaild.

Scott

On Mon, 5 Feb 2007, [EMAIL PROTECTED] wrote:

>
> Behavioral Biometrics sounds like a bit of a shaky affair to me. Not
> only would authentication take quite a while...[after all how much
> behavioral safety can there be in 30seconds of typing?] but what
> happens if you have bad flu, or loose a finger and your behaviors are
> all put out.
>
>
> ---- Original Message ----
> From: [EMAIL PROTECTED]
> To: [email protected]
> Subject: RE: [FDE] Going Beyond Biometrics - Behavioral Metrics
> Date: Sun, 4 Feb 2007 23:39:44 -0800 (PST)
>
>> With the increase concern on data access and data protection,
>> highlighted
>> by identity thefts and data break-ins or corporation and personal
>> computer, there is a renaissance in the research of identification
>> systems
>> that are reliable and tamper-proof. The good old username and
>> password has
>> been the granddaddy of identification in the computer age. Recently
>> the
>> focus has been shifted to biometrics. However, the biometric
>> identification that most people are familiar with revolves around
>> fingerprint, retinal/iris, or voice recognition. Well, biometrics is
>> deeper than that. It deals with such basic aspects of human
>> behavioral
>> distinctions such as your keyboard clicking rhythm, your writing
>> style,
>> and your hand script patterns. So, even if you have multiple alias
>> and/or
>> anonymous accounts on the Internet, the way you do things on-line may
>>
>> still reveal your true identity. Read full article on this research
>> here
>> (http://www.sciencenews.org/articles/20070113/bob9.asp).
>> _______________________________________________
>> FDE mailing list
>> [email protected]
>> http://www.xml-dev.com/mailman/listinfo/fde
>
>
>
> _______________________________________________
> FDE mailing list
> [email protected]
> http://www.xml-dev.com/mailman/listinfo/fde
>
_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to