Hit upon an expedient by suggesting, off the reel, the propriety of the cabman’s shelter, as it was called
A group of computer security researchers have refined an innovative method of combatting identity theft. (…) Its method, described in the journal Information Sciences, “continuously verifies users according to characteristics of their interaction with the mouse.”
The idea of user verification through mouse monitoring is not new. As the researchers note, “a major threat to organizations is identity thefts that are committed by internal users who belong to the organization.”
To combat this, some organizations turn “physiological biometrics” to verify the identity of a computer user. But these techniques, such as fingerprint sensors or retina scanners, “are expensive and not always available,” the researchers write.
An alternative approach is the use of “behavioral biometrics.” Such a system compiles biometric data such as “characteristics of the interaction between the user and input devices such as the mouse and keyboard” and constructs a “unique user signature.”
painting { Antonio Ciseri, Ecce Homo, 1871 }