14.11.2014 Views

Biometric Signature Solutions

Biometric Signature Solutions

Biometric Signature Solutions

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Biometric</strong> <strong>Signature</strong><br />

<strong>Solutions</strong><br />

Presented at the Open House<br />

The Standards Institution of Israel<br />

1


WonderNet<br />

The leading provider of digital signature<br />

solutions<br />

Over 5 million current users<br />

Cutting edge technologies:<br />

& PenCheck<br />

World wide distribution and customer base<br />

Established in 1988<br />

2


<strong>Biometric</strong> Technologies<br />

Finger Print<br />

Retinal Scan<br />

Geometric Palm<br />

Voice Recognition<br />

<strong>Signature</strong><br />

<strong>Biometric</strong> <strong>Signature</strong><br />

Authentication<br />

Iris Scan<br />

Blood Test<br />

Face Recognition<br />

DNA<br />

3


Technology<br />

4


Penflow<br />

Penflow technology is a biometric<br />

signature authentication platform<br />

The Penflow engine captures the signing<br />

process as a series of unique<br />

movements, and creates a ‘Personal<br />

Profile’<br />

The proprietary algorithm enables the<br />

signature profile (not its image), to be<br />

matched automatically with a given<br />

signature<br />

Learning elements are implemented in<br />

the algorithm, ensuring that the natural<br />

changes of signatures with time are<br />

continuously updated into the learning<br />

profile<br />

5


Dynamic <strong>Signature</strong> Verification<br />

“…When I sign twice, my signature<br />

never looks the exact same”…<br />

The signature is treated as a series of movements that contain unique<br />

biometric data<br />

• Stroke order<br />

• Rhythm<br />

• Speed<br />

• Pressure<br />

• Acceleration<br />

Tracks gradual shifts of the<br />

handwritten signature over time<br />

- drifting<br />

Tracks the changes between<br />

signatures - fluctuations<br />

100% match will fail<br />

(assuming intrusion)<br />

6


How does it Work ?<br />

Secured signature verification process<br />

Enroll<br />

User<br />

enrollment<br />

Personal Profile<br />

creation and storage<br />

Secured<br />

<strong>Signature</strong> Database<br />

Daily Use<br />

Application<br />

collects the<br />

signature<br />

<strong>Signature</strong><br />

Verification<br />

7


<strong>Signature</strong> Capturing Methods<br />

8


Dynamic <strong>Signature</strong> Verification<br />

Penflow measures the pen<br />

location and pressure vs.<br />

time<br />

The data is converted using<br />

patented technology to a<br />

mathematical structure<br />

creating a Personal Profile<br />

Reverse engineering from<br />

the Personal Profile to the<br />

signature is impossible<br />

9


False Acceptance / Rejection<br />

Creation of Personal Profiles produce extremely low rates<br />

of FR (False Rejection) & FA (False Acceptance),<br />

relative to any other system<br />

FA is close to zero (0.001%)<br />

in an random independent test<br />

evaluating Penflow’s efficiency<br />

A trained perpetrator may reach<br />

up to a 3% failure rate, assuming<br />

prior knowledge of a trivial<br />

signature<br />

10


Products<br />

11


PenDocs Suite<br />

PenDocs solution suite allows secure signing of<br />

documents on Microsoft® Word and Adobe®<br />

Acrobat PDF<br />

<strong>Signature</strong> capturing and<br />

authentication<br />

Saves time & resources<br />

on signing and filing<br />

Intuitive and easy to use<br />

PenWord TM<br />

PenPDF TM<br />

12


Signed, Sealed & Secured<br />

Seals and secures your signed document before<br />

dissemination<br />

A change to a signed document will invalidate the signature<br />

13


SIGNificant<br />

A versatile electronic signature solution increasing<br />

efficiency of business approval processes, improving<br />

productivity and eliminating paperwork related tasks<br />

The SIGNificant 1, 2, 3 solution<br />

1 Define signature’s location and signers<br />

2 Upload (“print”) to SIGNificant<br />

3 Sign<br />

No more paper related work<br />

Quick and proven ROI<br />

Signed document viewed/verified using<br />

Acrobat Reader<br />

Complete & secure signature flow control<br />

including signers names and dates<br />

14


The <strong>Signature</strong> Flow<br />

The document is stored in a<br />

secured server<br />

<strong>Biometric</strong> signature<br />

Authentication / Capturing<br />

Web based application<br />

PKI compliant- works with CA<br />

Email notifications<br />

15


Applicable to most of the<br />

scanned signatures or<br />

forms<br />

Drastically decreases<br />

check forgeries<br />

High volumes - up to<br />

millions of signatures per<br />

day<br />

PenCheck<br />

PenCheck automatically<br />

authenticates static signatures<br />

16


Cleans Any Background<br />

17


Standardization<br />

18


Aligned with Various Standards<br />

Medical - FDA 21 CFR Part 11<br />

Health insurance - safeguarding citizen<br />

information – HIPAA<br />

Endorsed by the European Commission<br />

19


PKI<br />

Complies with the PKI standards<br />

(Public Key Infrastructure)<br />

Digital signatures are generated with<br />

asymmetric encryption based on a private<br />

key and a public key<br />

Access to the private key is done by using<br />

the biometric signature<br />

20


21<br />

PKI & Hashing Process<br />

Encrypt<br />

Top<br />

secret<br />

Encrypt<br />

My<br />

<strong>Signature</strong><br />

CA<br />

Private key<br />

LAN / WEB<br />

Encrypt<br />

Top<br />

secret<br />

Encrypt<br />

My<br />

Public key<br />

CA<br />

Public key


Digital <strong>Signature</strong> Law<br />

Compliance with the digital signature law<br />

Penflow uses the RSA Algorithm for the PKI technology<br />

Using the PKI technology ensures security of the signing<br />

process<br />

The PKI architecture is assimilated easily to any<br />

application<br />

22


Specifications<br />

The Penflow solution employs the RSA<br />

algorithm for its PKI cryptography<br />

User key length: 1024 bit<br />

Hash value algorithm MD5<br />

All private keys are 3DES encrypted<br />

The digital signature request is created on a<br />

secure channel between the Penflow client and<br />

server based on the RSA key exchange<br />

23


About WonderNet<br />

Among our Customers<br />

Banking & financial organizations<br />

Medical & Healthcare<br />

Governmental & Military<br />

Industrial / Commercial<br />

Points of Sale:<br />

Car Rentals, Cellular Operators…<br />

24


Thank You ☺<br />

Israel Office<br />

Shai Waisel, CEO<br />

Phone +972-3-9036860<br />

9036860<br />

Fax +972-3-9304925<br />

9304925<br />

Shai@penflow.com<br />

www.penflow.com<br />

Simply Sign<br />

25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!