Location of Repository

Multibiometrics authentication in pos application

By Chunlei Yang, Gui Yun Tian and Stephen Ward


In traditional Point of Sales (POS) device, the legitimate user is mainly authenticated by PIN (Personal\ud Identification Number). PIN method has drawbacks like easy to be forgotten. Fingerprint technology,\ud as the most viable biometrics in the special and restricted hardware environment of POS device, has\ud been used to increase user convenience. However, due to inherent problems, fingerprint alone can\ud hardly replace PIN in many high secure applications. Although keystroke pattern as one kind of\ud biometrics is in research for years, no real satisfied results have been got due to its inherent great\ud variability. In this paper, we proposed an innovative method by adapting and increase keystroke\ud pattern technology to POS device and applications. Together with fingerprint system, the adapted\ud keystroke pattern recognition system constitute a multibiometric system, which helps achieve an\ud increase in performance, and provide anti-spoofing measures by making it difficult for an intruder to\ud spoof multiple biometric traits simultaneously. Since this approach is a combination of partially featurebased\ud and partially knowledge-based, it can be a more deployable alternative to strengthen existing\ud PIN and pure biometric authentication methods. Experimental results support that this approach can\ud be better trade-off of the security and user convenience

Topics: QA75, TA
Publisher: University of Huddersfield
Year: 2006
OAI identifier: oai:eprints.hud.ac.uk:3813

Suggested articles



  1. (2002). A biometric solution is ideal at the point of sale, doi
  2. (1980). Authentication by keystroke timing: some prelimary results. Rand Rep. R-2560-NSF, Rand Corporation,
  3. (2005). Biometric based smart card for security.
  4. (2004). Can soft biometric traits assist user recognition? doi
  5. (1990). Computer-access security systems using keystroke dynamics. doi
  6. (2004). FVC2004: Third Fingerprint Verification Competition, doi
  7. (1990). Identity Authentication Based on keystroke Latencies. doi
  8. (2000). Keystroke dynamics as a biometric for authentication. doi
  9. (2002). User Authentication through Keystroke Dynamics. doi
  10. (1997). Verification of computer users using keystroke dynamics. doi

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.