Abstract
With the growing number of smartcard applications there comes an increasing need to restrict access to the card itself. In previous work we proposed the pressure sequence biometric, within which a biometric sensor is integrated onto the card in a low-cost and mechanically compliant manner. Using an off-card verifier we demonstrated reasonable discrimination between users. In this paper we consider a number of on-card verification schemes, the best of which offers an equal error rate of 2.3%. On-card computational time requirements were found to be 3.1 seconds for enrolment and 0.12 seconds for verification. Incorporating our implementation into an existing applet used 684 bytes of program space. Whilst data memory requirements are estimated to be 1400 and 300 bytes for enrolment and verification, respectively. These time and size requirements demonstrate our biometric as a practical proposition for the protection of smart cards. Experiments were performed with the iButton’s Java Card platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Bleha, C. Slivinsky, and B. Hussien, Computer access security systems using keystroke dynamics, IEEE Transactions on Pattern Analysis and Machine Intelligence 12 (1990), no. 12, 1217–1222.
S. A. Bleha and M. S. Obaidat, Computer user verification using the perceptron algorithm, IEEE Transactions on Systems, Man and Cybernetics 23 (1993), no. 3, 900–902.
M. Brown and S. J. Rogers, User identification via keystroke characteristics of typed names using neural networks, International Journal of Man-Machine Studies 39 (1993), 999–1014.
W. L. Bryan and N. Harter, Studies in the physiology and psychology of the telegraphic language, Psychological Review 4 (1897), 27–53.
J. Crenshaw, Integer square roots, Embedded Systems Programming (1998), no. 2.
J. D. Garcia, Personal identification apparatus, US Patent 4 621 334, November 1986.
G. Hachez, F. Koeunne, and J-J. Quisquater, Biometrics, access control, smartcards: A not so simple combination, Smart Card Research and Advanced Applications (Bristol, UK), IFIP/TC8 Fourth Working Conference on Smart Card Research and Advanced Applications, Kluwer Academic Publishers, September 2000, ISBN: 0-7923-7953-5, pp. 273–288.
N. J. Henderson and P. H. Hartel, ’pressure sequence’-a novel method of protecting smart cards, Smart Card Research and Advanced Applications (Bristol, UK), IFIP/TC8 Fourth Working Conference on Smart Card Research and Advanced Applications, Kluwer Academic Publishers, September 2000, ISBN: 0-7923-7953-5, pp. 241–256.
A. Jain, R. Bolle, and S. Pankanti, Biometrics: Personal identification in networked society, Kluwer, Boston, 1998, ISBN 0792383451.
R. Joyce and G. Gupta, Identity authentication based on keystroke dynamics, Communications of the ACM 33 (1990), no. 2, 168–176.
E. R. Kandel, Principles of neural science, Elsevier, North Holland, 1981.
J. Leggett and G. Williams, Verifying identity through keystroke characteristics, International Journal of Man-Machine Studies 28 (1988), 67–76.
F. Monrose and A. D. Rubin, Keystroke dynamics as a biometric for authentication, Future Generation Computer Systems 16 (2000), 351–359.
M. S. Obaidat and B. Sadoun, Verification of computer users using keystroke dynamics, IEEE Transactions on Systems, Man and Cybernetics-Part B-Cybernetics 27 (1997), no. 2, 261–269.
W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery, Numerical recipies in c, Cambridge University Press, Cambridge, United Kingdom, 1993.
J. A. Robinson, V. M. Liang, J. A. M. Chambers, and C. L. MacKenzie, Computer user verification using login string keystroke dynamics, IEEE Transactions on Systems, Man and Cybernetics-Part A-Systems and Humans 28 (1998), no. 2, 236–241.
D. E. Rummelhart and D. A. Norman, Simulating a skilled typist: A study of skilled cognitive-motor performance, Cognitive Science 6 (1982), no. 1, 1–36.
Dallas Semiconductor, http://www.ibutton.com/, March 2001.
Siemens, http://www.silicon-trust.com/, March 2001.
D. Umphress and G. Williams, Identity verification through keyboard characteristics, International Journal of Man-Machine Studies 23 (1985), 67–76.
J. R. Young and W. Hammond, Method and apparatus for verifying an individual’s identity, US Patent 4 805 222, February 1989.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Henderson, N.J., White, N.M., Hartel, P.H. (2001). iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric. In: Attali, I., Jensen, T. (eds) Smart Card Programming and Security. E-smart 2001. Lecture Notes in Computer Science, vol 2140. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45418-7_11
Download citation
DOI: https://doi.org/10.1007/3-540-45418-7_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42610-3
Online ISBN: 978-3-540-45418-2
eBook Packages: Springer Book Archive