DynaSig technology meets the National Strategy for Trusted Identities in Cyberspace (NSTIC) Guiding Principles criteria, which was developed in 2011 to improve the privacy, security and convenience of sensitive online transactions.

Identity 01
Identity solutions will be privacy-enhancing and voluntary
Identity 02
Identity solutions will be secure and resilient
Identity 03
Identity solutions will be interoperable
Identity 04
Identity solutions will be cost-effective and easy to use

There are four authentication factors typically used to authenticate or verify a person’s identity. These include:

  • What You Know: This includes passwords, social security numbers, birthdates, personal questions, and so on. Unfortunately this information can be easily obtained and used by an unauthorized person.
  • What You Have: Such as physical items like a key, identification card, or your phone, which can be stolen or inadvertently left behind somewhere and used for identity theft as well as illegal access.
  • Who You Are: This includes fingerprints, retina scan, or even DNA. Slightly more of a challenge to obtain, but keep in mind most of this information is neither secret nor hidden.
  • What You Can Do: Also called behavioral identification. An example of this is your signature. It’s the way in which you write your name (or anything for that matter) that is unique to you.

However by signing, you are actually using all four forms of identification: (1) ‘what you know’ by knowing what to sign, (2) ‘what you have’ using the particular device and method such as a mouse on a PC or your finger on a tablet, (3) ‘who you are’ by how you hold and/or move when you write, and (4) ‘what you can do,’ which is the ability to perform the writing.

Although we think of the signature as the resulting image, the real identification is the “act of writing” itself.

DynaSig signature authentication analyzes your signing motion to verify your identity. Your signature is usually a complex image that is the result of your own unique motion sequences. You can also generate more complicated references by using complex phrases, over-lapping images, doodles, or anything that is easy for you to remember and perform, but extremely hard for someone else to copy.

For an example, if my password is “flower”, I can either write this out or draw an actual flower. DynaSig will remember not only my motion, but also the sequence in which I wrote or drew it.

Flower Signing
Flower Signing
Flower Signing
Flower Signing