According to foreign media reports, the Defense Advanced Research Projects Agency (DARPA) under the US Department of Defense gave birth to the Internet that has swept the world today. At present, the agency is developing a new technology to complete identity authentication through each person's keystrokes and other behavioral characteristics. The entire identification process requires no auxiliary equipment other than the keyboard. The purpose of DARPA was to study the new technology for the US military. However, in fact, the new technology developed by the agency will gradually play a huge role in the civilian sector. The most typical one is the Internet itself. Richard Guidorizzi, DARPA’s research project manager, said that for the US military, passwords such as “6tFcVbNh^TfCvBn†meet password strength requirements, but for humans, it’s too complicated and hard to remember. "It is difficult for humans to understand the random combination of letters and numbers." It is said that ordinary computer users and regular users use a regular combination of letters and numbers to make passwords easier to remember. In a recent meeting, Guillitz displayed five sets of passwords, all of which are similar to Jane123. It is easy to be cracked. Gui Lizi said that according to the keyboard identification project, future users can sit in front of a computer and start tapping on the computer. Identity recognition will be automatically started and completed in the background. It is invisible to the user, and verification does not interfere with it. This new technology will avoid the use of sophisticated identification devices such as fingerprint scanners or iris scanners. Guillitz said that he will use the different habits and strengths of each person's keyboard to identify the identity, which can almost be counted as another kind of fingerprint. Previously, Professor Roy Maxion of Carnegie Mellon University conducted a "button dynamics" study that involved the length of time each person pressed a button and the time it took to move from a specific button to another button. interval. Professor Maxi said that people often perform numerous body movements, not through careful consideration, but by the control of a certain kind of "motor." Physiologically speaking, it is almost impossible to imitate other people's keystrokes. Professor Maxi also pointed out that there is evidence that the emotional state of computer users will affect the rhythm of keystrokes. But just as people can identify a familiar song that a low-level singer sings, related technology can also identify someone’s “core key rhythmâ€. However, Maxi also said that the "core key rhythm" theory has not yet been confirmed in experiments. In addition, Charles C. Tappert, a professor of computer science at the University of Pace in the United States, also conducted research on identity identification through keystrokes. He studied the process by which a user hits the keyboard while answering a question. His research analyzed the pressure changes when people press each key. In the experiment, the accuracy of this authentication is as high as 99.5%. AS2129 Flanges are Australian Standard. There are Table C/D, Table E, Table F and Table H. AS2129 Flanges,Table Flanges,Table D Flanges,Table E Flanges Shandong Zhongnuo Heavy Industry Co.,Ltd. , https://www.znforged.com