Skip to main content

iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric

  • Conference paper
  • First Online:
Smart Card Programming and Security (E-smart 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2140))

Included in the following conference series:

Abstract

With the growing number of smartcard applications there comes an increasing need to restrict access to the card itself. In previous work we proposed the pressure sequence biometric, within which a biometric sensor is integrated onto the card in a low-cost and mechanically compliant manner. Using an off-card verifier we demonstrated reasonable discrimination between users. In this paper we consider a number of on-card verification schemes, the best of which offers an equal error rate of 2.3%. On-card computational time requirements were found to be 3.1 seconds for enrolment and 0.12 seconds for verification. Incorporating our implementation into an existing applet used 684 bytes of program space. Whilst data memory requirements are estimated to be 1400 and 300 bytes for enrolment and verification, respectively. These time and size requirements demonstrate our biometric as a practical proposition for the protection of smart cards. Experiments were performed with the iButton’s Java Card platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Bleha, C. Slivinsky, and B. Hussien, Computer access security systems using keystroke dynamics, IEEE Transactions on Pattern Analysis and Machine Intelligence 12 (1990), no. 12, 1217–1222.

    Article  Google Scholar 

  2. S. A. Bleha and M. S. Obaidat, Computer user verification using the perceptron algorithm, IEEE Transactions on Systems, Man and Cybernetics 23 (1993), no. 3, 900–902.

    Article  Google Scholar 

  3. M. Brown and S. J. Rogers, User identification via keystroke characteristics of typed names using neural networks, International Journal of Man-Machine Studies 39 (1993), 999–1014.

    Article  Google Scholar 

  4. W. L. Bryan and N. Harter, Studies in the physiology and psychology of the telegraphic language, Psychological Review 4 (1897), 27–53.

    Article  Google Scholar 

  5. J. Crenshaw, Integer square roots, Embedded Systems Programming (1998), no. 2.

    Google Scholar 

  6. J. D. Garcia, Personal identification apparatus, US Patent 4 621 334, November 1986.

    Google Scholar 

  7. G. Hachez, F. Koeunne, and J-J. Quisquater, Biometrics, access control, smartcards: A not so simple combination, Smart Card Research and Advanced Applications (Bristol, UK), IFIP/TC8 Fourth Working Conference on Smart Card Research and Advanced Applications, Kluwer Academic Publishers, September 2000, ISBN: 0-7923-7953-5, pp. 273–288.

    Google Scholar 

  8. N. J. Henderson and P. H. Hartel, ’pressure sequence’-a novel method of protecting smart cards, Smart Card Research and Advanced Applications (Bristol, UK), IFIP/TC8 Fourth Working Conference on Smart Card Research and Advanced Applications, Kluwer Academic Publishers, September 2000, ISBN: 0-7923-7953-5, pp. 241–256.

    Google Scholar 

  9. A. Jain, R. Bolle, and S. Pankanti, Biometrics: Personal identification in networked society, Kluwer, Boston, 1998, ISBN 0792383451.

    Google Scholar 

  10. R. Joyce and G. Gupta, Identity authentication based on keystroke dynamics, Communications of the ACM 33 (1990), no. 2, 168–176.

    Article  Google Scholar 

  11. E. R. Kandel, Principles of neural science, Elsevier, North Holland, 1981.

    Google Scholar 

  12. J. Leggett and G. Williams, Verifying identity through keystroke characteristics, International Journal of Man-Machine Studies 28 (1988), 67–76.

    Article  Google Scholar 

  13. F. Monrose and A. D. Rubin, Keystroke dynamics as a biometric for authentication, Future Generation Computer Systems 16 (2000), 351–359.

    Article  Google Scholar 

  14. M. S. Obaidat and B. Sadoun, Verification of computer users using keystroke dynamics, IEEE Transactions on Systems, Man and Cybernetics-Part B-Cybernetics 27 (1997), no. 2, 261–269.

    Article  Google Scholar 

  15. W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery, Numerical recipies in c, Cambridge University Press, Cambridge, United Kingdom, 1993.

    Google Scholar 

  16. J. A. Robinson, V. M. Liang, J. A. M. Chambers, and C. L. MacKenzie, Computer user verification using login string keystroke dynamics, IEEE Transactions on Systems, Man and Cybernetics-Part A-Systems and Humans 28 (1998), no. 2, 236–241.

    Article  Google Scholar 

  17. D. E. Rummelhart and D. A. Norman, Simulating a skilled typist: A study of skilled cognitive-motor performance, Cognitive Science 6 (1982), no. 1, 1–36.

    Article  Google Scholar 

  18. Dallas Semiconductor, http://www.ibutton.com/, March 2001.

  19. Siemens, http://www.silicon-trust.com/, March 2001.

  20. D. Umphress and G. Williams, Identity verification through keyboard characteristics, International Journal of Man-Machine Studies 23 (1985), 67–76.

    Article  Google Scholar 

  21. J. R. Young and W. Hammond, Method and apparatus for verifying an individual’s identity, US Patent 4 805 222, February 1989.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Henderson, N.J., White, N.M., Hartel, P.H. (2001). iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric. In: Attali, I., Jensen, T. (eds) Smart Card Programming and Security. E-smart 2001. Lecture Notes in Computer Science, vol 2140. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45418-7_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-45418-7_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42610-3

  • Online ISBN: 978-3-540-45418-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics