Security Architect & BS7799 Lead Auditor

Slides:



Advertisements
Similar presentations
Biometric standards An overview of biometrics and identity management February 2010.
Advertisements

12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
FIT3105 Biometric based authentication and identity management
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by : Mahmoud Alasi UNIVERSITY.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Biometrics Authentication Technology
THE MALAYSIAN ELECTRONIC PASSPORT
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT.
THE MALAYSIAN ELECTRONIC PASSPORT
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
A Seminar Report On Face Recognition Technology
Authentication.
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Presented by: k.ramya krishna
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Security Architect & BS7799 Lead Auditor “Biometrics” Harj Singh CLAS CISSP Security Architect & BS7799 Lead Auditor harj.singh@synetrix.co.uk Nov-18 Security Seminar

What does Biometrics mean? Comes from the Greek words “Bios – life” and “Metron – to measure”. Automated methods of verifying or recognising the identity of a living person based on physiological or behavioural characteristics Nov-18 Security Seminar

Identification or Verification? There are two ways of determining if you are you… Identification Establishing a persons identity – Who are you ? One to many comparison Biometric sample presented to a system which compares it against a database of samples in the hope of finding a match Verification Involves confirming or denying a person’s claimed identity - Are you who you claim to be? One to one comparison Biometric sample captured and compared with the previously stored template for that user (Reference template) Nov-18 Security Seminar

Which Biometric? Fingerprint Hand Geometry Iris / Retina Scan Facial Scan Signature Voice Recognition Nov-18 Security Seminar

Fingerprint Variety of fingerprint devices available (silicon & optical) Template constructed by analysing patterns and/or points of interest that make up the fingerprint (minutia) Advantages Low cost Size of device and multiple choices Ease of integration Accurate – low instances of false acceptance Nov-18 Security Seminar

Hand Geometry Measures the physical characteristics of the user’s hand and fingers Low level infrared light and a camera used to capture an image Suited to applications where there is a large user base or users access the system infrequently Flexible performance tuning can accommodate a wide range of applications Disadvantages Large footprint of hand geometry devices Only used for verification Right hand use only Nov-18 Security Seminar

Iris Captures the pattern of flecks on the iris Pattern processed and encoded into 512 byte record Uses conventional cameras Average 2 seconds for identification Less intrusive than retinal scanning No physical contact between user and reader (unless very tall or very short) Disadvantages Ease of use System integration Cost Nov-18 Security Seminar

Retina Scan Unique patterns of the retina scanned by a low intensity infrared light Image constructed from de-scanned reflected light Extremely accurate Fast enrolment process Disadvantages User acceptance – intrusive technology Cost Limited to high security applications Does not perform well where user wears spectacles or has cataracts Nov-18 Security Seminar

Facial Based upon the geometric shape and position of features of the face Performs equally well on all races and both genders Resistant to changes in lighting, skin tone, facial hair, hair style, eyeglasses, expression and pose No user participation required in order to perform identification/verification Limited success in practical applications 1 – many matching Disadvantages Perceived to be invasive as covert system Nov-18 Security Seminar

2D Facial Relies on controlled lighting One photograph per facial position High failure rate Can be ‘fooled’ Nov-18 Security Seminar

3D Facial 3D technology enables the real-time capture of three-dimensional images of a subject’s face. The unique features of the subject’s cranio-facial structure are extracted and stored as a biometric template for automated human recognition. The method can be used either in identification or in verification.. Nov-18 Security Seminar

3D Facial Face Capture Reconstruction Process Uses structured light in near-infrared range A projector shoots an invisible structured light pattern onto the face The special pattern is distorted by the face’s surface geometry The video camera precisely records the pattern distortion Reconstruction Process Real-time reconstruction of the 3D facial surface The distorted pattern is input into a 3D reconstruction algorithm A 3D mesh of the face is created by means of triangulation The resulting face geometry is measurable in millimetres The 3D reconstructed image is NOT stored in the database Nov-18 Security Seminar

3D Facial Feature extraction and matching A biometric template is extracted from the 3D facial geometry (skull curvature, etc) The template is based on the unique rigid tissues of the skull which are unchanging over time The resulting numeric template is stored in an ordinary database Identification is performed by matching the biometric template against the enrolment database Verification is performed by matching the biometric template against a template stored on a smart card Nov-18 Security Seminar

3D Facial Advantages Not affected by lighting conditions, background colours, facial hair or make-up Provides higher performance at different view angles Is of higher accuracy in real-life environments Nov-18 Security Seminar

Signature Based on analysis of the dynamics of a handwritten signature e.g shape, speed, stroke order, pen pressure Generally use pressure sensitive tablets or wired pens User friendly Non intrusive – minimal public acceptance issues Captured signature can be used for digitally signing documents Disadvantages Considered to be one of the least accurate biometrics Only performs 1 – 1 verification Nov-18 Security Seminar

Voice Recognition Analyses voice patterns and characteristics of speech e.g. pitch, tone High user acceptance - perceived as least intrusive biometric technology Easy for end users to implement BUT the least secure biometric Ideal for telephone systems/ mobile environments Disadvantages:- Affected by environmental factors – background noise greatly affects system performance Problems if enrolment undertaken using mobile device then request verification from fixed land line. Nov-18 Security Seminar

Biometrics – What are the drivers? On October 26, 2001 The Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (the “USA Patriot Act”) was enacted. On May 14, 2002, the President signed into law H.R. 3525, the "Enhanced Border Security and Visa Entry Reform Act of 2002." Post 9/11… Nov-18 Security Seminar

H.R.3525 “The border security bill makes reforms to our immigration system in response to the increased awareness of America’s vulnerability to terrorism after 9/11. It provides for calls for vital improvements in technology to provide more timely information to help with the battle against terrorism. Among the key features: —Funds for increased border and State Department personnel and training, including 1,000new INS inspections personnel, and $150 million for INS border technology; —A report, a plan, and protections for an interoperable information-sharing system; —An interoperable information-sharing system with name-matching capacity; —Machine-readable, tamper-resistant biometric travel documents and passports; —Restriction on nonimmigrant visas for aliens from countries that sponsor terrorism; —Reform of the visa waiver program; —Requirement of passenger manifest information for commercial flights and vessels; —Repeal of the 45-minute time limit on INS inspections of arriving passengers; and —Enhanced foreign student monitoring program” Nov-18 Security Seminar

What Does this mean to the UK? By Oct 26th 2004 the UK must have introduced biometric enabled travel documents (or have in place advanced plans to do so). National Institute of Standards and Technology given lead to evaluate biometric technologies. International Civil Aviation Organisation laid down standard (9303). Nov-18 Security Seminar

ICAO 9303 ICAO 9303 requires a digitised facial image of the document holder to be securely attached to the travel document and recommends the use of a Contact-less RF Proximity Smart Card as the carrier. Governments MAY optionally also embed fingerprint and/or iris images. Nov-18 Security Seminar

What is UK Government Doing ? UKPS DVLA Home Office (ICU) Biometric Enabled Passport Book (and maybe Passport Card) in 2005. Establishing ‘Gold Identity’ Examining use of biometric in UK Driving Licence. Planning for a National Id Card (long term). ? Nov-18 Security Seminar

The Joint Contact Group Unprecedented co-operation and sharing of intelligence between the UK and the USA was agreed at a meeting on Tuesday (1st April 2003) between Home Secretary David Blunkett and US Homeland Security Secretary Tom Ridge. At the meeting, Mr Blunkett and Mr Ridge agreed the work should cover “closer working on the development of biometric technology such as iris and facial recognition.” Nov-18 Security Seminar

UK Law Enforcement Human identification is a key element in the reduction and investigation of crime and thus a key element in the provision of effective capabilities to assist the Police Service in meeting strategic objectives. Dr Fred Preston, Director of Identification, PITO Nov-18 Security Seminar

"... we will legislate this winter to upgrade our secure passport system, to create a new, clean database on which we will understand and know who is in or country, who is entitled to work, to services, to the something for something society which we value. As people renew their passports, they will receive their new identity card. The cost of biometrics and the card will be added to the total of passports." David Blunkett Labour Party Conference October 2004 Nov-18 Security Seminar

The Future Chip and Finger ? Facial recognition in cars ? Nov-18 Security Seminar

Questions Nov-18 Security Seminar