"Logging into a computer consists of entering a user
ID, password, or on some ThinkPads, reading a fingerprint. But as I
show in three earlier articles, it's possible to authenticate a
user with other means, too. Think of these articles as a
proof-of-concept for authenticating a user independently of other
"In this article, we discuss how mouse-click hold times, or a
combination of keyboard and mouse activity can enable new levels of
access-requirements obfuscation. Learn how to apply the open source
tools cnee and Perl in applications to measure the characteristic
attributes of how users manipulate the mouse.
"In addition to the many identification options presented by
keystroke dynamics discussed in my three earlier articles, mouse
usage provides additional data to help determine identity. This
article uses example code to demonstrate mouse dynamics for
enhancing the security of applications in authentication and
continuous usage contexts. With an example login application and
using the cnee tool to measure mouse events, learn how to add an
additional layer of user-interaction requirements."
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.