Password Classifier using Typing Biometrics
Benefits of Typing Biometrics
This system offers two key security advantages:
- Unphishable Passwords: Even if someone knows your password, they can't replicate your unique typing pattern, making your account more secure against phishing attacks.
- Protected Typing Signature: Your typing rhythm remains secure even if you verbally share your password, as the authentication relies on both the password and your distinct typing pattern.
How It Works
This classifier analyzes your typing rhythm to distinguish between legitimate and illegitimate users. It learns from the timing patterns of your keystrokes as you enter your password.
Getting Started
- Load Existing Data: If you have previous training data, you can import it using the "Import Training Data" button.
- Start Fresh: To begin with a clean slate, simply enter your password and click "Reset & Train". This will clear any existing data and start a new training session.
Training the Classifier
- Enter Your Password: Type your password in the input field as you normally would.
- Classify & Train: Click this button to submit your typing pattern.
- Provide Feedback: Indicate whether the entry was "legitimate" (you) or "illegitimate" (someone else).
- Repeat: For best results, repeat this process multiple times with both legitimate and illegitimate entries.
Using the Classifier
Once trained, you can test the classifier by entering the password and clicking "Classify & Train". The system will attempt to determine if the typing pattern matches a legitimate user.
Tips for Accurate Classification
- Maintain a consistent typing rhythm when training for legitimate entries.
- For illegitimate entries, try varying the typing speed or rhythm.
- The more diverse data you provide, the more accurate the classifier becomes.
- Install Classifier upgrades for futher improvements.
Data Management
You can export your training data for backup or future use with the "Export Training Data" button.
Note: While this system enhances security, it should be used in conjunction with other security measures for comprehensive protection.