Frequently Asked Questions
If you need to contact our support department for end-user questions, please click here to go to our online help desk for assistance.
Can I Use Cursive Writing For My Profile?
No, cursive writing is very difficult to duplicate with a mouse. We recommend letters, numbers, or shapes be used. Do not use dots or slashes. Pick something that has meaning to you like the last 3 digits of your telephone or your house number. You must remember this password.
How Many Characters Or Shapes Can I Draw?
Three or four numbers, letters, or shapes should be used. Using more is more difficult to reproduce and not necessary for the BioSig-ID™ software to work.
What Is Easier To Draw?
Letters or numbers seem to be easier to reproduce than odd shapes.
How Do I Use My Mouse To Draw With BioSig-ID™?
Hold the left mouse button down and draw inside the box provided. Draw with consistent speed and direction. Go slow at first until you feel comfortable with your BioSig-ID™ password. You can practice as much as you want by clicking the Clear button and trying again.
What Happens If I Cannot Enroll With BioSig-ID™?
Try different combinations of 3 or 4 letters or numbers or a combination. Make your password less complicated. Drawing with a mouse is new to most people, and it sometimes takes a little practice to feel comfortable using the mouse in this way.
What Devices Can I Use With The BioSig-ID™ Software?
A mouse, stylus, touchpad, or touchscreen can be used. Use on any PC anywhere, anytime.
What Other Hardware Is Required With BioSig-ID™?
BioSig-ID™ does not require any additional expensive hardware. It is a software only biometric.
What Is A Software Only Biometric?
Biometrics on the market today such as iris scanners and fingerprint readers require expensive hardware. They measure physical characteristics unique to an individual. Our software measures the unique behavioral characteristics of an individual by the movements they make with their pointing device.
What Happens If I Am Mouse-Challenged?
In that case, a user is directed to the alternative access method Click-ID™ (picture password) as his or her primary verification method. This is followed by Complex Security Questions as the alternative access method.
What If I Can’t Remember My BioSig-ID™ Password?
Our software allows a user to verify their identity with Click-ID™ (picture password). Our unique closed loop automatically returns a user to the BioSig-ID™ enrollment screen to reset their password.
What Is This Click-ID™ Alternative Access Method?
The BioSig-ID™ software is set up to always enroll a user in two levels of security. After enrolling in BioSig-ID™ you are directed to Click-ID™ (picture password). A user selects a picture and clicks on 3 objects in that picture. If a user forgets his BioSig-ID™ password they use Click-ID™ and then re-set their password. It is important to remember Click-ID™ for this very purpose.
What Is This Closed Loop Technology?
Our company Biometric Signature ID™ (BSI) has developed a patented technology to allow users to reset their password, without the need to contact the help desk. After failing to validate with BioSig-ID™, a user validates with Click-ID™. He or she is then redirected to reset their BioSig-ID™ password with our system, avoiding the costs associated with the help desk.
Why Do I Have To Enroll 3 Times In BioSig-ID™ And Click-ID™?
This is necessary for the software to pick up enough information to build a profile. When a user attempts to sign in, the password he or she draws is compared against the stored profile. If it falls within certain metrics, access is granted.
Who Is Biometric Signature ID™ (BSI)?
BSI is an award winning software company based in Dallas Texas. We have a suite of products in the identity management and electronic document management. Our products include: BioSig-ID, Click-ID™ and uSign Online™.
Is A Record Made Of My Activity?
The BSI audit trail logs activity each time a user signs in. No personal identifying information is collected.
BioSig-ID™ System Requirements
Supported Operating Systems
- Microsoft Windows XP, Vista, 7
- Mac OS Snow Leopard
- Ubuntu LINUX 10
- Microsoft Internet Explorer 8
- Mozilla Firefox 3
- Google Chrome 9
- Apple Safari 5
- Flash Player 9 or above
Have other questions? Please let us know, contact us here.
Products & Solutions
Jeff Maynard CEO of Biometric Signature ID Participates at IDESG Conference for Online Privacy
Jeff Maynard CEO of Biometric Signature ID Participates at IDESG Conference for Online Privacy Dallas May 10, 2013. Biometric Signature ID (BSI) CEO Jeff Maynard attended the Identity Ecosystem Steering Committee Group (IDESG) meeting this week to take part in discussions about online privacy and its continuous importance in cyberspace. The meeting held in Santa [...]
NSTIC-led ID plan earmarks $4 million to secure state government services
The two-year-old initiative to create an identity layer for the internet is backing a set of projects aimed at creating identity-based security to support state and local government services online. Read More
Gesture Recognition & Touch-less Sensing Market Worth $12.21 Billion by 2018
According to a new market research report Gesture Recognition & Touchless Sensing Market (2013 – 2018): By Technology (RFID, IR, Capacitive); Product (Biometric, Gaming, Smartphone); Application (Healthcare, Consumer Electronics, Automotive); Geography (Americas, EMEA, & APAC), the total touchless sensing and gesture recognition market is expected to reach $15.02 billion by 2018 growing at a CAGR of 34.94% from 2013 to 2018. [...]
Two-Step Verification Will End Consensual Impersonation
A couple of months back, I advocated killing your password policies and applying some other techniques instead to make existing use of passwords more effective (including my hobby horse: take the user-experience sting out of rotating ordinary static passwords by pushing them out to users on an alternate channel, à la activation codes and other [...]
Click and Go Vote: PA politician proposes online registration
HARRISBURG — It’s possible in these days of instant connectivity to monitor nearly every financial, physical and social transaction using the Internet – from banking to travel, and from dieting to dinner reservations. Read More