Presentation is loading. Please wait.

Presentation is loading. Please wait.

Josh Tate. Advanced AuthenticationIntroduction  Very broad subject and highly researched.  Focused on topics that could be quick to implement and.

Similar presentations


Presentation on theme: "Josh Tate. Advanced AuthenticationIntroduction  Very broad subject and highly researched.  Focused on topics that could be quick to implement and."— Presentation transcript:

1 Josh Tate

2

3 Advanced AuthenticationIntroduction  Very broad subject and highly researched.  Focused on topics that could be quick to implement and (somewhat) inexpensive.  Solutions that could be used at home/work/public.

4 Advanced AuthenticationWhat is Authentication:  Most common ways to authenticate today: Something you know Something you have Something you know/have ?

5 Advanced AuthenticationWhat is Authentication: Authentication Technique ExampleProperties Something you have Credit Card Car Key Badge Lost / Stolen Duplicated Shared Something you know Login ID / Password ATM PIN Forgotten Shared Guessed Something you are Fingerprint Eyes / Face Voice Cannot be lost / stolen Cannot guess / forge Cannot be shared (easily)

6 Advanced AuthenticationAuthentication Methods I will cover:  Fingerprint / Knuckle Identification  Fingerprint & smart card combinations  EyePassShape

7 Advanced AuthenticationFingerprint / Knuckle Identification  “No two fingerprints have ever been found alike in many billions of human and automated computer comparisons. Fingerprints are the very basis for criminal history foundation at every police agency on earth. Fingerprinting established the first forensic professional organization, the International Association for Identification (IAI), in 1915.” [1]  Researchers noticed that fingerprints could uniquely identify people as early as the 1800’s.

8 FeatureProperties CrossoverIntersection point CoreU-Turn BifurcationFork Ridge EndingDead End DeltaSplit IslandDual dead ends Advanced AuthenticationFingerprint / Knuckle Identification

9 Advanced AuthenticationFingerprint / Knuckle Identification

10 Advanced AuthenticationFingerprint & smart card combinations Very secure because it combines all 3 authentication techniques (are/have/know) The research paper pitched this idea as a replacement for Passports / Drivers License / Credit Cards etc. Stolen Wallet?

11 Advanced AuthenticationFingerprint & smart card combinations

12 Advanced AuthenticationEyePassShape  Public authentication is time-critical.  Authentication token should be easy to remember.  Authentication has to be secure.  Authentication methods have to be easily deployable.

13 Advanced AuthenticationEyePassShape EyePIN Not very Time-Critical Very Secure Pass ShapeNot very Secure Very Fast Both are easy to deploy and are easy to remember

14 Advanced AuthenticationEyePassShape  Fast  Easy to Remember  Secure  Deployable

15 Advanced AuthenticationEyePassShape

16 Advanced AuthenticationEyePassShape

17 Advanced AuthenticationReferences [1] The History of Fingerprints, January 2012, http://onin.com/fp/fphistory.htmlhttp://onin.com/fp/fphistory.html [2] Biometric Education » Fingerprint, http://www.barcode.ro/tutorials/biometrics/fingerprint.html http://www.barcode.ro/tutorials/biometrics/fingerprint.html [3] Pallav Gupta, Srivaths Ravi, Anand R, Kiral K. Jha, Efficient fingerprint-based user authentication for embedded systemsm DAC 2005 Proceedings of the 42 nd annual Design Automation Conference, 244-247. [4] Lionel Beauge, Andrzej Drygallo, 2010, Fully featured secure biometric smart card device for fingerprint-based authentication and identification, MM&Sec 2010 Proceedings of the 12 th ACM workshop on multimedia and security, 181-186. [5] Alexander De Luca, Martin Denzel, Heinrich Hussmann, 2009, Look Into My Eyes!: can you guess my password?, SOUPS 2009 5 th Symposium on Usable Privacy and Security, Article 8.


Download ppt "Josh Tate. Advanced AuthenticationIntroduction  Very broad subject and highly researched.  Focused on topics that could be quick to implement and."

Similar presentations


Ads by Google