Biometric standards An overview of biometrics and identity management February 2010.

Slides:



Advertisements
Similar presentations
© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
Advertisements

ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
Dr. Marc Valliant, VP & CTO
Computer Literacy BASICS
2014/6/2 Giga-Tms 1 The latest Biometric Technology.
Configuration management
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
1. Documents types Visas (ID-2) ICAO standard passports (ID-3) ID cards and driving licences (ID-1) Travel and identity documents.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
ISO/IEC JTC1 SC37 Overview
By: Monika Achury and Shuchita Singh
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Chapter 10: Authentication Guide to Computer Network Security.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by : Mahmoud Alasi UNIVERSITY.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Biometrics Authentication Technology
Biometrics.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Biometrics : From Yesterday to Tomorrow
Authentication.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometric Security Fujitsu Palm Vein Technology
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Security Architect & BS7799 Lead Auditor
Seminar Presentation on Biometrics
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Biometric standards An overview of biometrics and identity management February 2010

2 The need to identify Every day we are required to identify ourselves Using a bank card with a PIN at a cash machine A password to log on to a computer Using a key to open a door Punching a code into a keypad to enter the workplace Using passwords on the Internet Providing a passport and driving licence as proof of identity We need to be able to accurately IDENTIFY an individual to minimize current issues and threats

3 Current attributes used to identify Name Address Postcode Date of Birth Account no. Passwords PINs Phone no. Mothers maiden name Passport Birth certificate Driving licence Credit cards Utility bills Membership cards Salary slip

4 Is biometrics the answer? A biometric is part of the person and is not easily compromised through: Theft Collusion Loss Simplifies user management resulting in cost savings Users do not need to remember passwords Users do not need to remember PINs User accounts cannot be shared Easy to use

5 Biometric definition The automated recognition of individuals based on their behavioural and biological characteristics The general meaning of biometrics encompasses counting, measuring and statistical analysis of any kind of data in the biological sciences including the relevant medical sciences The term is derived from the Greek words bios meaning life and metron meaning measure

6 Biological and behavioural Biological Fingerprint Face (2D & 3D) Iris Vein pattern Hand geometry DNA Behavioural Signature Gait Voice Keystroke dynamics

7 Iris Captures the pattern of flecks on the iris Uses conventional cameras Average 2 seconds for identification No physical contact between user and reader

8 Face Based upon the geometric shape and position of features of the face Resistant to changes in skin tone, facial hair, hair style, and eyeglasses No active user involvement required in order to perform identification/verification Limited success in practical applications

9 Voice Analyses voice patterns and characteristics of speech e.g. pitch, tone, etc. High user acceptance – perceived as least intrusive biometric technology Easy for end users to implement Ideal for telephone systems/mobile environments

10 Hand geometry Measures the physical characteristics of the users hand and fingers Low level infrared light and camera used to capture an image Suited to applications where there is a large user base or users access the system infrequently Systems are easy to use and robust

11 Signature Based on analysis of the dynamics of a handwritten signature e.g. shape, speed, stroke order, pen pressure Generally use pressure sensitive tablets or wired pens User friendly Non intrusive – minimal public acceptance issues Captured signature can be used for digitally signing documents

12 Keystroke dynamics Monitors rate of typing and intervals between letters Verification based on typing rhythm – intruders may guess password but fail to key in with correct rhythm Neither enrolment nor verification disturbs the regular flow of work Low cost – only hardware required is keyboard

13 Fingerprint Variety of fingerprint devices available (silicon and optical) Template constructed by analysing patterns that make the fingerprint (minutiae)

14 DNA Forensic genetics use deoxyribonucleic acid (DNA) profiling in a number of important human identity applications 0.01% of a person's entire genome is unique to each individual This represents 3 million base pairs of DNA 95% of the human genome are non-coding sequences (called junk DNA) Standard profiling systems only exploit the junk DNA to maintain the privacy and civil rights of the donor

15 Multimodal Combination of one or more biometrics Algorithmic level Results level Multimodal is the fusion of results with logic applied

16 Key multimodal facts Can be used to: Improve reliability Make forgery more difficult Make systems more flexible to user characteristics (decreases failure to enrol) Make systems more complex Promote inclusivity Input Device Matching Result Input Device Matching Result Fusion

17 Verification versus Identification Are you who you say you are? Who are you? NOT

18 Verification and Identification Verification Involves confirming or denying a persons claimed identity – Are you who you claim to be? Biometric sample captured and compared with the previously stored template for that user One-to-one comparison Are you who you say you are? I am who I say I am Identification Means establishing a persons identity from an already established list – Who are you from this list? Biometric sample presented to a system which searches the existing (enrolled) subjects One-to-many comparison Do I know you? I am not known to you already

19 Identification before verification To establish a clean database of individuals each individual first needs to be identified One-to-many match is performed against the central database to ensure the individual does not already exist under correct name or any other aliases Once identity is established it can be sufficient to verify the individual as proof of identity only One-to-one match is performed at the point of interface without the need to check back to the central database

20 Key Consideration in a biometric system Current & Future Technology Risk & Requirement Analysis Research & Development User Perception Accuracy & Throughput IntegrationPerformance Business Process Strategy

21 Considerations of adding a biometric system Not all biometrics technologies suit all people In many cases additional hardware is required User co-operation is usually necessary Privacy concerns must be addressed Cost of personal devices in large systems can be significant User education is required Biometric revocation must be considered as biometric data is not secret

22 Capture the legal and political imperatives Ask what additional considerations are there with a biometric application as opposed to any other IT deliverable Privacy? Data access considerations (who and why)? Sensitivity of data? Legislative limitations? User acceptance? Standards compliance?

23 ISO/IEC JTC1 SC 37 Biometrics Currently 25 participating countries and 7 observer countries Liaisons with: JTC 1/SC 17 Cards and Personal Identification. JTC 1/SC 24 Computer Graphics and Imaging JTC 1/SC 27 Information Technology Security Techniques. JTC 1/SC 29 Coding of Audio, Picture and Multimedia and Hypermedia Information. JTC 1/SC 31 Automatic Identification and Data Capture Techniques JTC 1/SC 32 Data Management and Interchange JTC 1/SC 36 Information Technology for Learning, Education and Training. ITU-T SG17 Telecommunication Standardization Sector Study Group on Data Networks and Telecommunications Software. BioAPI Consortium IBIA International Biometrics Industry Association (IBIA) ILO International Labour Office of the UN

24 The benefits of standards for biometrics They foster wide spread utilization of the technology They are a sign of industry maturity They reduce time-to-market They facilitate interchange and/or interoperability They reduce risk to integrators and end users They reduce vendor lock-in effect

25