Abstract

Nowadays, information technologies are used in almost every sphere of our life. Large amounts of personal and corporate data are stored in digital form. Thus, the problem of protecting this data from unauthorized access is raised. Access control subsystems and technologies used in these subsystems, in particular, methods of user authentication and identification, play an important role in this case. The paper provides an overview of methods for solving information system user authentication and identification problems based on the analysis of their keystroke dynamics. These tasks are considered in detail, a brief history of methods for keystroke dynamics authentication and identification is described, their advantages and disadvantages compared with other known methods are indicated and the relevance of this line of research is substantiated. The main stages of creating mathematical models for solving these problems are listed. The description of the methods used in each of these stages is also presented

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.