The unique striking pattern will allow computers to lock down sensitive information in the case of an unauthorized user.
Even though the system is in its early stages, Solami doesn't believe it will render internet username and password useless.
"You need a username and password but a username and password cannot protect your computer (once you're logged in),' he said.
"My actual approach is to extract the behaviour of users and see if we can distinguish different users during one session," he added.
The researcher claimed that the system would be valuable to industries that collect large volumes of personal information such as banks and the armed forces and it could be extended to mobile phones and tablets.
Even though the system is in its early stages, Solami doesn't believe it will render internet username and password useless.
"You need a username and password but a username and password cannot protect your computer (once you're logged in),' he said.
"My actual approach is to extract the behaviour of users and see if we can distinguish different users during one session," he added.
The researcher claimed that the system would be valuable to industries that collect large volumes of personal information such as banks and the armed forces and it could be extended to mobile phones and tablets.
No comments:
Post a Comment