Hand Geometry and Handwriting
Handwriting-- Handwriting is unique to every individual. Biometric devices which test such uniqueness are gainning popularity in many technologies which regulate sensitive materials or access controls. Most systems are based on a 3D analysis of a writing sample which takes into account pressure and form of script.
Dynamic signature recognition is a behavioral authentication method used to recognize an individual's handwritten signature. This technology actually measures how a signature is signed by treating the signature as a series of movements that contain unique biometric data, such as rhythm, acceleration, pressure, and flow. The signature is captured when a person signs his or her name on a digitized graphics tablet, which can be attached to a computer or part of a PDA. The signature dynamics information is encrypted and compressed into a template.
Dynamic signature recognition technology can also track a person's natural signature fluctuations over time. Dynamic signature recognition systems are different from electronic signature capture systems, which treat the signature as a graphic image. Electronic signature capture systems are commonly used by merchants to capture electronic signatures in the authorization of credit card transactions.
Keystroke Recognition-- Keystroke recognition requires no additional hardware with which to read, scan, view, record, or otherwise interrogate the requesting user because every computer is equipped with a keyboard. To authenticate an individual, keystroke recognition relies solely on software, which can reside on the client or host system. To create an enrollment template, the individual must type his or her user name and password a number of times. Best results are obtained if enrollment occurs over a period of time rather than at one sitting: over a period of time, individual characteristics are identified more accurately. With keystroke recognition, a user must type without making any corrections. If keystroke errors are made, the system will prompt the user to start over. Some of the distinctive characteristics measured by keystroke recognition systems are:
- The length of time each key is held down
- The length of time between keystrokes
- Typing speed
- Tendencies to switch between a numeric keypad and keyboard numbers
- The keystroke sequences involved in capitalization.
Each individual characteristic is measured and stored as a unique template. Some systems authenticate only at sign-on, whereas others continue to monitor the user throughout the session. As in other biometrics, the user's keystroke sample is compared with the stored template, and access is granted if the submitted sample matches the template according to preestablished probabilities.
If the keystroke recognition software is used as one factor in a two-factor authentication system, it can be an effective layer of security. Keystroke recognition is not considered an effective single-factor authentication technique because hand injuries, fatigue, variations in temperature that affect physical actions, arthritis, and other conditions can affect authentication effectiveness. Also, since keystroke recognition is a relatively new biometric technology, reliable information concerning its effectiveness is not as available as with fingerprint recognition.
Keystroke recognition biometrics is generally considered to be the easiest biometric technology to implement and use. No hardware is involved. Software may be installed on the client or host. Because authentication is based on normal keyboard entry, individuals need only type the prescribed text to be authenticated.
Hand Geometry-- Hand geometry systems use an optical camera to capture two orthogonal twodimensional
images of the palm and sides of the hand, offering a balance of reliability and
relative ease of use. They typically collect more than 90 dimensional measurements, including
finger width, height, and length; distances between joints; and knuckle shapes. These systems
rely on geometry and do not read fingerprints or palm prints. Although the basic shape and size
of an individual's hand remains relatively stable, the shape and size of our hands are not highly
distinctive. The system is not well suited for performing one-to-many identification matches.
Hand geometry readers can function in extreme temperatures and are not impacted by dirty
hands (as fingerprint sensors can be). Hand geometry devices are able to withstand wide
changes in temperature and function in a dusty environment. They are commonly used for
access control to facilities, time clocks, or controlled areas.

The large size of the actual hand geometry readers restricts their use in widespread applications such as those requiring a small user interfaces (e.g., home computer user, keyboard). Hand-geometry readers could be appropriate for multiple users or where users access the system infrequently and are perhaps less disciplined in their approach to the system. Today, organizations are using hand-geometry readers in various scenarios, primarily for physical access control and recording work time and attendance. They are also used for the known traveler programs, such as the Transportation Security Administration's Registered Passenger Program, for streamlining airport security procedures for certain frequent travelers.
The INSPASS card utilizes hand geometry for identification purposes. The INSPASS program facilitates airport congestion by speeding up the customs process. Business travelers who fly into the United States at least three times a year can apply for a credit card sized identification card at an INSPASS enrollment center. Then, upon arrival, the traveler inserts his INSPASS card into the kiosk and places his hand where indicated. Once the system has verified the biometric reading of the person identified on the card, it prints a receipt to prove immigration admittance. The entire process takes a fraction of the time that would be required for an immigration inspector to manually review the traveler's credentials.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|