ebook img

Signature verification for access control. PDF

64 Pages·0.85 MB·en_US
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Signature verification for access control.

NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS SIGNATURE VERIFICATION FOR ACCESS CONTROL by Susan Carol Geshan September 1991 Thesis Advisor: Gary K. Poock Approved for public release; distribution is unlimited T260813 Unclassified SECURITYCLASSIFICATION OFTHIS PAGE FormApproved REPORT DOCUMENTATION PAGE OMB No.0704-0188 1a. REPORTSECURITYCLASSIFICATION lb. RESTRICTIVE MARKINGS UNCLASSIFIED 2a. SECURITYCLASSIFICATIONAUTHORITY 3. DISTRIBUTION/AVAILABILITYOF REPORT Approved for public release; distribution is unlimited 2b. DECLASSIFICATION/DOWNGRADING SCHEDULE 4. PERFORMING ORGANIZATION REPORTNUMBER(S) 5. MONITORING ORGANIZATION REPORT NUMBER(S) 6a. NAMEOF PERFORMINGORGANIZATION 6b. OFFICESYMBOL]7a. NAME OF MONITORING ORGANIZATION Naval Postgraduate School OR 6c.ADDRESS (City, State,andZIPCode) 7b.ADDRESS (City, State,andZIPCode) Monterey, CA93943-5000 8a. NAMEOF FUNDING/SPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENTINSTRUMENTIDENTIFICATION NUMBER ORGANIZATION 8c.ADDRESS (City, State,andZIPCode) 10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENTNO. NO. NO. ACCESSION NO 11.TITLE (Including SecurityClassification) SIGNATURE VERIFICATION FOR ACCESS CONTROL 12PERSONALAUTHOR(S) GESHAN, Susan Carol 13 TYPEOF REPORT 13b.TIMECOVERED 14. DATE OF REPORT(Year, Month, Day) 15. Page Count Master'sthesis FROM TO 1991, September 55 16. SUPPLEMENTALNOTATION Theviews expressed in thisthesis arethose ofthe authorand do not reflectthe official policy or position ofthe Department of Defense orthe U.S. Government. 17. COSATI CODES 18. SUBJECTTERMS (Continueon reverseifnecessaryandidentifyby blocknumber) FIELD GROUP SUB-GROUP Access Control, Biometric, SignatureVerification, Personal Identification, Personal Security 19.ABSTRACT(Continueonreverseifnecessaryand identifybyblocknumber) Access control to sensitive information is a vital concern for Department of Defense agencies. Current methods employed to control access arevulnerableto unauthorized users and frequently inadequate. The use of biometric access control devices, such as signature verification systems, may represent a solution to the access control problem. This thesis looked at two dynamic signature verification systems and compared their performance in general as well as underthe different operating conditions of lined and unlined paper and morning and afternoon use. Thetwo signatureverification systemswere the CIC system and the Sign/On system. Additionally, thethesis comparedtheCICsystemunderbothsetsofoperating conditionsusingan inkingstyluspenanda non-inking stylus pen. The experimental results indicatedtherewas nosignificantdifference betweentheCIC system using an inking stylus pen and the Sign/On system and that both systems had Type I error rates of lessthan 3% and Type II error rates of less than 1%. The results also indicated that the operating conditionstest did notfavor either system. 20DISTRIBUTION/AVAILABILITYOFABSTRACT 1a. REPORTSECURITYCLASSIFICATION UNCLASSIFIED/UNLIMITED SAMEASRPT.Q DTIC Unclassified |X) 22a. NAME OF RESPONSIBLE INDIVIDUAL 22b.TELEPHONE (IncludeArea Code) 22c. OFFICE SYMBOL Gary K. Poock (408)646-2636 OR/Pk DD Form 1473, JUN Previouseditionsareobselete. SECURITYCLASSIFICATION OFTHIS PAGE S/N0102-LF-014-6603 Unclassified Approved for public release; distribution is unlimited Signature Verification for Access Control by Susan Carol Geshan Lieutenant, United7 States Navy BS, Purdue University, 1986 Submitted in partial fulfillment of the requirements for the degree MASTER OF SCIENCE IN OPERATIONS RESEARCH from the NAVAL POSTGRADUATE SCHOOL September 1991 n ABSTRACT Access control to sensitive information is a vital concern for Department of Defense agencies. Current methods employed to control access are vulnerable to unauthorized users and frequently inadequate. The use of biometric access control devices, such as signature verification systems, may represent a solution to the access control problem. This thesis looked at two dynamic signature verification systems and compared their performance in general as well as under the different operating conditions of lined and unlined paper and morning and afternoon use. The two signature verification systems were the CIC system and the Sign/On system. Additionally, the thesis compared the CIC system under both sets of operating conditions using an inking stylus pen and a non-inking stylus pen. The experimental results indicated there was no significant difference between the CIC system using an inking stylus pen and the Sign/On system and that both systems had Type I error rates of less than 3% and Type II error rates of less than 1%. The results also indicated that the operating conditions test did not favor either system. i i i t.t TABLE OF CONTENTS I. INTRODUCTION 1 II. THE EXPERIMENT 6 A. THE EQUIPMENT 6 1. The CIC System 7 2. The Sign/On System 9 B. PERFORMANCE MEASURES 10 C. SUBJECTS 11 D. ENROLLMENT 12 E. TESTING PROCEDURES 13 III. RESULTS AND DISCUSSION 17 A. DATA COLLECTED 18 B. SIGN TEST 18 . . ... 1. The CIC System vs. The Sign/On System 19 2. The CIC System with Inking Stylus vs. The CIC System with Non-Inking Stylus 21 3. The CIC System vs. The Sign/On System for Impostor Testing 22 4. The CIC System with Inking Stylus vs. The Sign/On System with Non-Inking Stylus For Impostor Testing 23 IV

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.