Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

Labcal. © 2004 Labcal. Presented by: Mr. Gregory McConnell Partner & Director of Business Dev. Labcal. Todays Biometric Projects Need Mobile.
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
The Evolution of the Trusted Traveler Concept September 2010.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
STI, Part of Al Falasi Group UAE
Beach Park Schools Beach Park, Illinois Introduces.
Biometrics Overview. Biometrics Identification or verification of an individual based on a physical characteristic or trait.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
Government Applications of Biometric Technologies Border & Aviation Security 19 June 2003.
Morpho Introduction  40 years of focused world-class experience  World’s largest install base  Most industries & toughest environments  Consistently.
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
1 Automatic Border Passage at Amsterdam Airport Schiphol ACM ICPC, November 16th 2002 Art de Blaauw, manager projects.
By: Monika Achury and Shuchita Singh
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
Smart Card Development in Hong Kong SIMmate 2000 Product Launch 28 November 2000 Dr LM Cheng Director Smart Card Design Center Dept. of Electronic Engineering.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Certificate and Key Storage Tokens and Software
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
Hosted by: June 23-26, 2003 New York City Mobile & Handheld Readers The Need for Mobile & Handheld Readers in Today's Biometric.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
Page 1 Bernard C. Bailey President and CEO 07 September 2005.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Symbol Technologies Security Forum - Airline Security
Biometrics: Government and Public Safety Opportunities Presented by: FRANCES ZELAZNY DIRECTOR OF CORPORATE COMMUNICATIONS.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
THE MALAYSIAN ELECTRONIC PASSPORT
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Access Control / Authenticity Michael Sheppard 11/10/10.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
Biometrics Dr. Nermin Hamza
Biometrics in the Banking Industry
THE MALAYSIAN ELECTRONIC PASSPORT
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Summary Physical Access & Time and Attendance PC/Network Access
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Biometrics.
Privacy and Information
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Risk Management and Human Relations
8.02 Discuss considerations for safety and security.
Presentation transcript:

Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003

Biometric authentication Framework for security Trust Identification Biometrics fingerprints face iris

Biometric authentication Framework for security Physical or logical access should be based on trusted gated actions

Biometric authentication Biometrics are uniquely qualified for this purpose: Individual uniqueness universality accuracy easiness permanence non-intrusiveness cannot be lost, forgotten, stolen

Biometric authentication Fingerprints Image Minutiaes Fingerprint –based on irregularities (minutiae)

Biometric authentication Face recognition Image Nodal points Face print –based on facial skin irregularities (the skull is 3-dimensional, the kin is 2-dimensional)

Biometric authentication Iris recognition Image Iris pattern Iris-print

Biometric Market

Market Evolution Government Law enforcement Federal Agencies DoD National ID Programs Regulated Industries POS Financial Healthcare Transportation Commercial E-commerce Transactions

Common Access Card DoD Common Access Card Biometric Smart Card to enable trusted identity throughout the enterprise Logical and physical access Evaluating fingerprint biometrics for military ID cards Already half way through (expected roll-out by 2005)

Enhanced Border Security Entry/Exit Program Protect, control & monitor access & entry into US Background check on visa applications Finger & face opportunity Visa reform Ability to check on visa applicants Biometric smartcard as new visa Worldwide reverberations

International ID Programs Several Foreign countries are in the process of implementing national ID programs Fingerprint, facial and iris biometrics for national ID cards Fingerprint biometrics for national healthcare programs Fingerprint biometrics for passports

Platform for security Enrollment & Registration Qualification Requirements of Trust Biometric Identification –Only: finger, face, iris Secure Credential Issuance Access –Physical, logical Surveillance

Platform for security Enrollment & Registration Qualification Requirements of Trust Biometric Identification –Only: finger, face, iris Secure Credential Issuance Access –Physical, logical Surveillance

Enrollment & Registration Critical step, could be costly if not done properly Data must be in vendor independent formats –Standard formats: e.g.ANSI/NIST-ITL Data can be very valuable

Qualification Answer two questions Is the identity unique? Can it be granted trusted status Requires Search in a registration database Submission to watch list & criminal database

Requirements of Trust State mandates –Healthcare, school workers, banking state employees insurance Federal Mandates –Transportation workers Airlines, airports –Postal workers –Government employees –Visa applicants, trusted travelers Passport and National IDs Corporate enterprise

Biometric Identification Only finger, face, iris Finger & face have unique position because of existing databases Finger requires live scan 10 print rolled fingers Major breakthroughs in imaging make it easier to capture high quality prints –Quicker turnaround –Low rejection & rechecks

Facial for Identification In many cases face is only available only finger, face, iris Performance –Rank 1 identification – 80% –Compare with single finger 90% (db size 10,000) NIST & FRVT2002 Not perfect yet delivers significant value Improving performance

Secure Credential Issuance Impedes tampering & forging. 1.Badging screened applicant 2.Smartcard 1.On Chip Credentials, PKI certificate, Applications 2.Secure Markings 3.Photo 4.Color Coding 5.Basic info: name, exp date, signature, etc 6.Magnetic stripe and/or Barcode data

Access Physical access –Buildings, offices, Safe Deposit boxes, Parking lots, etc Logical access –Authentication, Authorization, Internet, WAN, LAN, Wireless, etc Universal access –Home, office, any location, travel, etc

Detection Watch lists: facial & fingerprint databases Biometrics can be used to detect in real time individuals on the watch list –On demand screening –Checkpoint surveillance

Detection: on demand screening Fingerprint systems for INS enforcement –border checks Mobile identification –IBIS (Identification Based Information Systems) Travel document screening

Mobile identification -IBIS Mobile PDAs with finger sensors & Cameras. Access to –Secure wireless communication

ID Document surveillance Travel documents readers Watch list alarm Use standard existing travel documents Creates manifest

Checkpoint surveillance Security tool just like metal detectors & luggage scanners Ensures that each face passing through a checkpoint is checked against the watch-list database.

ID Document surveillance Travel documents readers Watchlist alarm Use standard existing travel documents Creates manifest

Biometric smartcards – the trust triangle Discuss Security Issues Smartcard - PK, certificate - SK - Else??? User - Password ??? - Smartcard Reader Application