Skip to main content
Log in

An adaptive automated method for identity verification with performance guarantees

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

Businesses often rely on customers that access an automated resource to receive information, service or products. We present an adaptive method for automated authentication with performance guarantee of probabilistic error bounds, referred to as identity verification. A database includes a record of identifiers for each identity. The identifiers are partitioned into groups, where identifiers in the same group are correlated while identifiers in different groups are independent. A claimant requesting access into the system is probed with a sequence of identifiers. The response to an identifier can be a match, no-match, or ambiguous. Each identifier is characterized by prior response probabilities for a legitimate claimant and for an impostor. Impostor’s response probabilities are updated during a session. The method guarantees that the probabilities of accepting an impostor or rejecting a legitimate claimant do not exceed specified parameters. Once a given number of identifiers have been probed and the claimant has been neither accepted nor rejected, the session terminates with an inconclusive decision and the claimant is referred to further manual interrogation. The method computes various performance characteristics such as the probability that a session of a legitimate claimant terminates inconclusively. These characteristics are valuable in the design of an effective record of identifiers for each of the claimants.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ashbourn, J. (2000). Biometric: advanced identity verification. London: Springer.

    Google Scholar 

  2. Ben-Yacoub, S., Abdeljaoued, Y., & Mayoraz, E. (1999). Fusion of face and speech data for person identity verification. IEEE Transactions on Neural Networks, 10, 1065–1074.

    Article  Google Scholar 

  3. Bickel, J. E., & Smith, J. E. (2006). Optimal sequential exploration: A binary learning model. Decision Analysis, 3, 16–32.

    Article  Google Scholar 

  4. Black, G. R. (2006). Method for identity verification, US Patent, 7082213, issued on July 25, 2006.

  5. Boros, E., Fedzhora, L., Kantor, P. B., Saeger, K., & Stroud, P. (2006). Large scale LP model for finding optimal container inspection strategies (RUTCOR Research Report RRR 26-2006). Rutgers University, October 2006.

  6. Digital Transactions. (2004). Equifax touts a ‘Secret Question’ test for online authentication, November 18, 2004 (www.digitaltransactions.net/newsstory.cfm?newsid=425).

  7. Dorronsoro, J. R., Ginel, F., Sanchez, C., & Cruz, C. S. (1997). Neural fraud detection in credit card operations. IEEE Transactions on Neural Networks, 8, 827–834.

    Article  Google Scholar 

  8. Gunetti, D., & Picardi, C. (2005). Keystroke analysis of free text. ACM Transactions on Information and System Security, 8, 312–347.

    Article  Google Scholar 

  9. Hermmann, P., & Hermmann, G. (2006). Security requirement analysis of business processes. Electronic Commerce Research, 6, 305–335.

    Article  Google Scholar 

  10. Hornarvar, L. T., Witte, B. R., Fatigante, S. C., & Harless, G. L. (2002). User authentication system and methods thereof, US Patent Application, 10/224,564.

  11. IETF. Authentication, authorization, and accounting (AAA) working group. http://www.ietf.org/proceedings/06jul/aaa.html.

  12. Kittler, J., Hatef, M. R. P. W., Duin, R. P. W., & Matas, J. (1998). On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20, 226–239.

    Article  Google Scholar 

  13. Patton, M. A., & Josang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4, 9–21.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanan Luss.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Luss, H., Neidhardt, A.L. & Krishnan, K.R. An adaptive automated method for identity verification with performance guarantees. Electron Commer Res 9, 225–242 (2009). https://doi.org/10.1007/s10660-009-9037-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-009-9037-1

Keywords

Navigation