Expand your user-authentication options with mouse dynamics
Logging into a computer consists of entering a user ID, password, or on some ThinkPads, reading a fingerprint. But as I show in three earlier articles, it's possible to authenticate a user with other means, too. Think of these articles as a proof-of-concept for authenticating a user independently of other credentials.
In this article, we discuss how mouse-click hold times, or a combination of keyboard and mouse activity can enable new levels of access-requirements obfuscation. Learn how to apply the open source tools cnee and Perl in applications to measure the characteristic attributes of how users manipulate the mouse.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.