Biometrics represent uniquely identifying and measurable patterns in human interaction with devices. Behavioural biometrics are used in multiple scenarios such as authentication while analyzing physical or behavioral models.
The various biometrics such as physical and behavior based successfully represent a factor in an authentication system. Biometrics or behavioral traits are considered what the user is or the inherence factor. What the user knows or the knowledge factor is a PIN or password. Lastly, what the user has or possession factor is hardware such a SIM or token.
Some biometrics require specialized hardware to be recorded while others, like typing biometrics, are easy to capture with just conventional equipment such as a keyboard. Recently, medical research is using AI to analyze biometrics to improve human lives and identify diseases.
In these series, we look into the different types of biometrics, their use cases and also, the advantages for both companies and end-users alike.
Mouse use characteristics
Invented in the ’60s, the mouse is still widely used for pointing and selecting in desktop environments. Even after the wide public acceptance following the launch of the Apple Macintosh in 1983, the device hasn’t changed much. The ball underneath is indeed become an optical transmitter, but most design and functional features remain the same.
Until recent years, mouse tracking has been used to gather information on the interaction of a user with a web interface. In the past, most data collected was used to improve design and site interaction. However, research in the past few years has made it possible to analyze behavior. Used conventionally, a mouse interaction provides proprioceptive feedback through grasping and visual feedback via the stimulus presented on the computer system’s display. Based on Fitt’s law and the Accot-Zhai steering law, mouse movement analysis can predict behavior and indicate the identity of the user.
The conventional mouse is enough to “capture” the natural behavior of a user. With this, no additional hardware is required.
If used as an additional layer of security in authentication, the mouse use characteristics are not reliable enough. The behavior traits must be paired with other, more secure factors.
Another drawback of mouse use is the limitation to a desktop environment. If users are switching devices, like mobile, the technique is redundant.