The keyboard, a staple tool for information entry and human-machine interaction, faces demands for enhanced information security due to evolving internet technologies. This study introduces a self-powered flexible intelligent keyboard (SFIK) that harnesses the giant magnetoelastic effect to convert the mechanical pressure from key presses into electrical signals. The sensor boasts a wide sensing range (35 to 600 kPa) and a rapid response time (∼300 ms), allowing it to record and recognize individual keystroke dynamics. Integrated with machine learning, this keyboard enables identity authentication through both fixed- and dynamic-text inputs. It accurately authenticates fixed passwords of eight characters with a 95.3% success rate and dynamic text from 14 sets of double keys with 100% accuracy. Given its capabilities, the SFIK offers promising applications in artificial intelligence, network security, and access control for computers and networks.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1126/sciadv.ads2297 | DOI Listing |
Sci Adv
March 2025
Department of Bioengineering, University of California, Los Angeles, Los Angeles, CA 90095, USA.
The keyboard, a staple tool for information entry and human-machine interaction, faces demands for enhanced information security due to evolving internet technologies. This study introduces a self-powered flexible intelligent keyboard (SFIK) that harnesses the giant magnetoelastic effect to convert the mechanical pressure from key presses into electrical signals. The sensor boasts a wide sensing range (35 to 600 kPa) and a rapid response time (∼300 ms), allowing it to record and recognize individual keystroke dynamics.
View Article and Find Full Text PDFSci Rep
March 2025
Cyberspace Security Institute, Xi'an University of Posts & Telecommunications, Xi'an, 710121, China.
With the continuous development of Airborne Wireless Sensor Networks (AWSN) in airplane monitoring systems, security isolation is facing increasingly serious insider threats. Due to the real-time bi-directional data exchange, attackers can exploit compromised nodes as the springboard to infiltrate the aircraft control domain and airline information services domain, thus stealing sensitive data or doing damage. However, existing zero-trust schemes have centralized deployment bottlenecks and static identity authentication problems, so it is difficult to combat insider threats caused by compromised nodes in the AWSN environments.
View Article and Find Full Text PDFMol Biol Rep
March 2025
Department of Biotechnology, PES University, Bengaluru, Karnataka, 560085, India.
Background: Byadagi chilli, a Geographical Indication (GI)-tagged chilli variety known for its special aroma and bright red colour, was accorded the GI tag in February 2011 with the GI number 129. The two traditional varieties of Byadagi chilli, namely: Dabbi and Kaddi, are the GI-tagged varieties. In this study, GI-tagged Byadagi Dabbi, Byadagi Kaddi and other cultivars of Byadagi chilli, such as Byadagi Lali (BL), Byadagi HPH 2043 (B2), Byadagi BSS 355 (B3) and another popular GI-tagged chilli variety, Guntur Sannam, were analysed to assess their inter-relationships.
View Article and Find Full Text PDFAnnu Int Conf IEEE Eng Med Biol Soc
July 2024
Biometric authentication relies on an individual's physiological or behavioral traits to verify their identity before granting access permission to a system or device without remembering anything. Although electrocardiograms (ECGs) have been considered a biometric trait, an ECG biometric recognition system that operates in verification mode is rarely considered. This study proposes two two-factor cancelable biometric verification schemes that enable identity recognition using ECGs.
View Article and Find Full Text PDFClin Teach
April 2025
Department of Education, University of Oxford, Oxford, UK.
Innovative assessment for learning is an important part of professional medical and health professions education programmes. We propose that student poster conferences are a formative, authentic, inclusive and sustainable assessment practice that has the potential to support research competency development and professional identity formation. Of primary importance, the poster conference is a safe-to-fail formative experiential learning opportunity, with opportunities for feedback from peers and key stakeholders.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!