Cyber-Sign gives secure feeling

CyberSign Enterprise Server 2.0 provides strong security without the invasiveness of biometrics

Looking for an inexpensive, nonintrusive and secure way to control access

to applications and data? For many agencies and departments, Cyber-Sign

Enterprise Server 2.0 may be just the ticket.

We all know the problem with passwords: They can be forgotten, guessed

or stolen. That's the rationale behind biometric security systems, such

as fingerprint and retinal scanners. Unfortunately, many users are uncomfortable

having their biological characteristics measured and stored. That's where

Cyber-Sign's dynamic signatures come in.

Unlike security systems that depend upon passwords and even such static

biometrics such as fingerprints, Cyber-Sign measures a dynamic human behavior — the act of writing. In addition to the shapes of the characters in the

signature, Cyber-Sign also measures the speed of signing, the pen pressure

and the stroke order. Even an excellent forgery wouldn't fool Cyber-Sign.

Signature profiles are stored on a single secure server. And because

Cyber-Sign employs TCP/IP, you can easily use it over the local-area network,

your wide-area network or the Internet. The Cyber-Sign Enterprise Server,

which runs on Microsoft Corp.'s Windows NT 4.0 Service Pack 4 or above,

stores signature profiles in a relational database. You have your choice

of employing either Microsoft's SQL Server (6.0, 6.5 or 7.0) or Oracle Corp.'s

Workgroup Server (7.3 or 8.0).

We found it extremely easy to register signatures, and it was significantly

easier than registering fingerprints with most fingerprint security systems.

The program prompts the user to sign his or her name three times in succession,

then reports whether the signatures registered successfully. The only trouble

we had registering signatures was that one user, whose normal signature

was an illegible scrawl, had to "clean up" his signature a bit.

Cyber-Sign strikes the right balance of flexible reading of signatures

and strong security. Even with significant variations in signing, legitimate

users were verified in each case. Test users attempting to copy signatures

were detected and flagged.

Cyber-Sign also does a good job of ensuring the security of its own

data. All communications between the server and clients — including signature

registrations — can be encrypted, and the administrator can set up to four

levels of client access, ranging from complete access to the ability to

verify only one's own signature.

For now, at least, the major weak point of Cyber-Sign is its lack of

software. If you want to use Cyber-Sign for accessing computers or operating

systems, you'll have to do some programming yourself using the Cyber-Sign

software developer's kit. The personal version of the kit and the client/server

Enterprise SDK each cost $2,750.

Similarly, little software is available for integrating Cyber-Sign with

applications. A Lotus Development Corp. Notes plug-in, which costs $100

per user, allows users to attach Cyber-Sign signatures to documents for

authentication. You can also use the plug-in to substitute signatures for

Notes passwords.

Another plug-in for Microsoft Windows ($30 per user) enables users to

attach signatures to Microsoft Office application documents. A new plug-in

for Adobe Acrobat ($100 for Acrobat itself and $50 per user for Acrobat

Capture) rounds out Cyber-Sign's offerings for integrating with other applications.

There is one other potential Achilles heel in the Cyber-Sign system:

the pen. All computers accessed through the Cyber-Sign system must be equipped

with writing tablets and pressure-sensitive pens. Simply keeping track of

the pen can, for some users, be a major challenge.

REPORT CARD

Cyber-Sign 2.0

Score: B

Cyber Sign Inc.

(800) 876-4605

www.cybersign.com

Price and availability: License fees are based on the number of stored signaturesand range from $10 per signature to $50 per signature.

Remarks: Cyber-Sign offers an easy-to-administer and nonintrusive securityoption that can be employed to control access to applications and to authenticatedocuments. Be aware, however, that the dynamic signature system works onlywith a handful of applications, so wider implementation will require in-houseprogramming.

BY Patrick Marshall
September 20, 2000

More Related Links

NEXT STORY: States clamor for civilian GPS