biometric authentication

Comparative Analysis of Models, Methods and Tools of Personal Authentication in Informational Systems After Keyboard Rhythm

The article analyzes the models, methods and means of authentication of computer users by their handwriting keyboard. Identified deficiencies of existing mathematical models and methods of data processing keyboard writing. Formulated topical problems of further research in the field of information security.