In a enterprise level sritical security requirement, time between keystoke can be considered as a constraint for password. Lets say user wants to create his new password. He types in the first character and purposefully idles out 2 seconds and then types the second character and then continues then the password to login will be considered with that pause. Even if the user enters the same characters it doesnt login. He ...more »
Voting on Ideas
Vote for your favorite ideas by clicking on the up arrow.To undo an upvote, simply click the arrow again. This second click removes your vote.