Presentation is loading. Please wait.

Presentation is loading. Please wait.

Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Similar presentations


Presentation on theme: "Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský."— Presentation transcript:

1 Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský

2  Smart Card A card-shaped portable data carrier that contains one or more integrated circuits for data storage and processing. A typical smart card chip includes a microprocessor or CPU, ROM (for storing operating instructions), RAM (for storing data during processing) and EPROM (or EEPROM) memory for nonvolatile storage of information. Biometrics The automated technique of measuring a physical characteristic or personal trait of an individual and comparing that characteristic to a comprehensive database for purposes of identification.

3 Biometrics PhysicalBehavioural Hand Face Finger Signature Keystroke Voice Retina Iris

4 Usage of the Different Biometric Characteristics (1999)

5 Fingerprint Sensors  Optical sensor  Ultrasonic sensor  E-field sensor  Polymer TFT sensor (Thin Film Transistor)  Thermal sensor  Capacitive sensor

6 T R papillary lines Ultrasonic method of acquiring fingerprint representation is based on sending acoustic signals towards the finger surface and detecting the echo. Ultrasonic Transducer short pulse ~ 20 ns Ultrasonic Receiver 0.3 - 0.9 mm ridge valey

7 = = SW1 SW2 + V CC V Ref Comparator Counter 0.......255 C Finger surface CPCP 224 288 8-bit per pixel Capacitive Sensor in CMOS Technology (infineon) 255 0 water air N

8 Fingerprint classes Plain ArchLeft LoopRight Loop Tended ArchWhorl

9 Minutiae Ridge Ending Bifurcation Island Lake Dot Back Bridge Diagonal X Trifurcation Hook Break Diversion Delta Double Bifurcation

10 How the Technology Works OriginalOrientationBinarizedThinnedMinutiaeMinutia Graph Vectors: V 1.....V n Template one way

11 Identification / Verification Identification (One-to-Many) Verification (One-to-One) Fingerprint search that compares the minutiae from a candidate fingerprint image against the fingerprint minutiae database to determine whether or not the candidate exists in the database. Fingerprint search that compares the minutiae from an individual's live fingerprint image against fingerprint minutiae stored on a card or in a specific database record to determine whether or not the individual is who he or she claims to be. ABCDEFABCDEF F, ABCDEFABCDEF

12 Smart Card - Logical Structure NPURAM CPUEEPROM ROM I/O CLK RST V CC GND NPU : numerical processing unit (cryptographic co-processor),

13 Smart Card - File Structure Container for data (cryptographic key) or “programs” Access with PIN

14 Problem & Solution    Sensor Smart Card Microprocessor

15 Problem & Solution NPURAM CPUEEPROM ROM I/O Readout Cryptography Com. “VP-Channel”

16 Conclusion Protection of the users “private keys” is very important PKI solutions store keys in a PSE (Personal Security Environment) or on smart card Access control is traditionally done by password or PIN Biometrics can replace password and PIN Access to the private keys can be controlled by a biometric characteristic Non-transferability of biometric characteristics is important for Electronic Signature There is no “real” smart card with fingerprint sensor “on board” There is no “real matching” on a smart card, existing CPU for smart card have not sufficient computing power (~20 mips needed) The existing recognition algorithms are not faulty tolerant enough f ( ) = 010......0100101


Download ppt "Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský."

Similar presentations


Ads by Google