Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.

Similar presentations


Presentation on theme: "Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003."— Presentation transcript:

1 Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003

2 Biometric authentication Framework for security Trust Identification Biometrics fingerprints face iris

3 Biometric authentication Framework for security Physical or logical access should be based on trusted gated actions

4 Biometric authentication Biometrics are uniquely qualified for this purpose: Individual uniqueness universality accuracy easiness permanence non-intrusiveness cannot be lost, forgotten, stolen

5 Biometric authentication Fingerprints Image Minutiaes Fingerprint –based on irregularities (minutiae)

6 Biometric authentication Face recognition Image Nodal points Face print –based on facial skin irregularities (the skull is 3-dimensional, the kin is 2-dimensional)

7 Biometric authentication Iris recognition Image Iris pattern Iris-print

8 Biometric Market

9 Market Evolution Government Law enforcement Federal Agencies DoD National ID Programs Regulated Industries POS Financial Healthcare Transportation Commercial E-commerce Transactions

10 Common Access Card DoD Common Access Card Biometric Smart Card to enable trusted identity throughout the enterprise Logical and physical access Evaluating fingerprint biometrics for military ID cards Already half way through (expected roll-out by 2005)

11 Enhanced Border Security Entry/Exit Program Protect, control & monitor access & entry into US Background check on visa applications Finger & face opportunity Visa reform Ability to check on visa applicants Biometric smartcard as new visa Worldwide reverberations

12 International ID Programs Several Foreign countries are in the process of implementing national ID programs Fingerprint, facial and iris biometrics for national ID cards Fingerprint biometrics for national healthcare programs Fingerprint biometrics for passports

13 Platform for security Enrollment & Registration Qualification Requirements of Trust Biometric Identification –Only: finger, face, iris Secure Credential Issuance Access –Physical, logical Surveillance

14 Platform for security Enrollment & Registration Qualification Requirements of Trust Biometric Identification –Only: finger, face, iris Secure Credential Issuance Access –Physical, logical Surveillance

15 Enrollment & Registration Critical step, could be costly if not done properly Data must be in vendor independent formats –Standard formats: e.g.ANSI/NIST-ITL 1-2000 Data can be very valuable

16 Qualification Answer two questions Is the identity unique? Can it be granted trusted status Requires Search in a registration database Submission to watch list & criminal database

17 Requirements of Trust State mandates –Healthcare, school workers, banking state employees insurance Federal Mandates –Transportation workers Airlines, airports –Postal workers –Government employees –Visa applicants, trusted travelers Passport and National IDs Corporate enterprise

18 Biometric Identification Only finger, face, iris Finger & face have unique position because of existing databases Finger requires live scan 10 print rolled fingers Major breakthroughs in imaging make it easier to capture high quality prints –Quicker turnaround –Low rejection & rechecks

19 Facial for Identification In many cases face is only available only finger, face, iris Performance –Rank 1 identification – 80% –Compare with single finger 90% (db size 10,000) NIST & FRVT2002 Not perfect yet delivers significant value Improving performance

20 Secure Credential Issuance Impedes tampering & forging. 1.Badging screened applicant 2.Smartcard 1.On Chip Credentials, PKI certificate, Applications 2.Secure Markings 3.Photo 4.Color Coding 5.Basic info: name, exp date, signature, etc 6.Magnetic stripe and/or Barcode data

21 Access Physical access –Buildings, offices, Safe Deposit boxes, Parking lots, etc Logical access –Authentication, Authorization, Internet, WAN, LAN, Wireless, etc Universal access –Home, office, any location, travel, etc

22 Detection Watch lists: facial & fingerprint databases Biometrics can be used to detect in real time individuals on the watch list –On demand screening –Checkpoint surveillance

23 Detection: on demand screening Fingerprint systems for INS enforcement –border checks Mobile identification –IBIS (Identification Based Information Systems) Travel document screening

24 Mobile identification -IBIS Mobile PDAs with finger sensors & Cameras. Access to –Secure wireless communication

25 ID Document surveillance Travel documents readers Watch list alarm Use standard existing travel documents Creates manifest

26 Checkpoint surveillance Security tool just like metal detectors & luggage scanners Ensures that each face passing through a checkpoint is checked against the watch-list database.

27 ID Document surveillance Travel documents readers Watchlist alarm Use standard existing travel documents Creates manifest

28 Biometric smartcards – the trust triangle Discuss Security Issues Smartcard - PK, certificate - SK - Else??? User - Password ??? - Smartcard Reader Application


Download ppt "Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003."

Similar presentations


Ads by Google