Hosted by: June 23-26, 2003 New York City www.biometritechexpo.com Mobile & Handheld Readers The Need for Mobile & Handheld Readers in Today's Biometric.

Slides:



Advertisements
Similar presentations
California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
Advertisements

RFID Access Control System March, 2003 Softrónica.
Current Technology and the TWIC Program Walter Hamilton Chairman, International Biometric Industry Association Sr. Consultant, Identification Technology.
Labcal. © 2004 Labcal. Presented by: Mr. Gregory McConnell Partner & Director of Business Dev. Labcal. Todays Biometric Projects Need Mobile.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Johan de Clerk 14 June 2012 Smart Cities from a Civil Security Perspective.
BIOMETRIC VOTING SYSTEM
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Chapter 5 p. 6 What Is Input? What is input? p. 230 and 232 Fig. 5-1 Next  Input device is any hardware component used to enter data.
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
Your Interactive Guide to the Digital World Discovering Computers 2012 Edited by : Huda Al-Omair.
Government Applications of Biometric Technologies Border & Aviation Security 19 June 2003.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
1 Automatic Border Passage at Amsterdam Airport Schiphol ACM ICPC, November 16th 2002 Art de Blaauw, manager projects.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
FIT3105 Smart card based authentication and identity management Lecture 4.
Hosted by: June 23-26, 2003 New York City ID Card Projects Large Scale ID Projects Based on Biometrics (Specifically Fingerprint)
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Liberian Registry INTERTANKO ASSOCIATES COMMITTEE MEETING March 29, 2006.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Alternative Input Devices. Digital Camcorder View recordings on a regular TV or copy them to VHS tape Send MPEG video clips by way of to a mobile.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Chapter 10: Authentication Guide to Computer Network Security.
Time2Talk Global Pte Ltd T2TG Industry Solutions – Market Segment for Authentication Platforms for Identity Management of Citizens, Drivers & Vehicles.
Infidea, a journey of discovery – that has just begun infidea, a journey of discovery – that has just begun.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
Page 1 Bernard C. Bailey President and CEO 07 September 2005.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Hosted by: June 23-26, 2003 New York City Copyright Security On The Go Ensuring Safe Transportation.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
Transportation Worker Identification Credential (TWIC) Guidance for TWIC Reader Pilot Program November 19, 2007.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
BIOMETRICS.
Smart Media Innovations & HID Corporation MOBILE SECURITY.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
THE MALAYSIAN ELECTRONIC PASSPORT
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Payment and Wireless Technologies. Engineering Services. July 2015.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Access Control / Authenticity Michael Sheppard 11/10/10.
Networking Network Classification, by there: 3 Security And Communications software.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
An Introduction to Biometrics
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
THE MALAYSIAN ELECTRONIC PASSPORT
Input Devices.
Authentication.
Summary Physical Access & Time and Attendance PC/Network Access
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Security Barriers Asset Proper Access Attack Security System
Biometric technology.
By: Julia Elder, Anna Eades, Marques Angel
A SEMINAR REPORT ON BIOMETRICS
Canadian Border security and the Multiple Borders Concept
Presentation transcript:

Hosted by: June 23-26, 2003 New York City Mobile & Handheld Readers The Need for Mobile & Handheld Readers in Today's Biometric Projects Speaker: Gregory McConnell, Partner

Hosted by: June 23-26, 2003 New York City 2 Presentation Plan 1.0Intro: Mobile biometric readers. Why? and Why Now? 2.0Applications of these handheld & Mobile biometric devices 3.0Basic functionalities of the devices 4.0Specific features and functionalities 5.0Which biometric methods are suitable for Mobile & Handheld applications? 6.0What do they look like? 6.1How much do they cost? 7.0Projects around the world who need or use Mobile & Handheld biometric readers.

Hosted by: June 23-26, 2003 New York City Introduction: Mobile & Handheld biometric readers. Why? and Why Now? With 9-11, vulnerabilities in our ID and travel documents systems are exposed. We want more security. Gone from using biometrics to protect very few and specific things/places (servers, rooms, files, etc) to authenticate a relatively small number of people. …to trying to authenticate masses of people, over large territories, in the multitude of places we may find them. In this new context: –People don’t always come to the authentication point (door,desk/PC) –The technology has to go out to them –Away from the door, the desk/PC, to the car, the boat, the gate, etc.

Hosted by: June 23-26, 2003 New York City Applications Travel documents check (fast-track passes, visa, foreign vs. domestic passport, etc): – Land boarder control (up-stream verification, from vehicle to vehicle, pre-clearance – Maritime ports (ID V&A on board the ship, in port or out at sea). – Airports (fast-track frequent or domestic travelers through customs)

Hosted by: June 23-26, 2003 New York City Applications Physical Access & Employee ID –Gate access control Airport Tarmak Military base Power plant Construction site, other restricted access area –Manned (Guard/clerk) ID check & patrol Fed. or State Gov. building access Airport restricted area access and patrol Vessel crew ID V&A and/or Time and Attendance Etc.

Hosted by: June 23-26, 2003 New York City Applications National ID (Permanent Resident, Green Card, etc) –Border entry check –Plane pre-boarding check –Proof of legal age: Voting, purchase of Alcohol or tobacco, etc Drivers License –Police verification and authentication of license/driver Healthcare card (Nominative attribution of benefits) –Card authentication in emergency rooms (Canada, France, Germany, Sweden, etc.)

Hosted by: June 23-26, 2003 New York City Basic functionalities of the devices Read credentials off a ID/Travel document or access token (not necessary if Identity profiles are stored on a server or in the reading device itself) Verify the validity of the document/token and it’s “issuing authority” Authentication of the owner of the document/token (person presenting it) through biometrics Display result of authentication + ID credentials

Hosted by: June 23-26, 2003 New York City Specific features and functionalities Validation of Origin –Digital signature (digital certificates) Verification of Data Integrity –Digital signature (DSA, DSS, RSA) Establishing Trusted Communication between the card and the reader –SAM (Security Access Module) Perform any other actions with data from card –Log transaction for later download –Send transaction or ID back to a server (Wireless) –Print transaction or related action (Find, ticket, pass, etc)

Hosted by: June 23-26, 2003 New York City Which biometric methods are suitable?

Hosted by: June 23-26, 2003 New York City Mobile/Handheld or not? Iris Scan Large size of reader is prohibitive (No reader available) Facial Scan Size (small camera) is not prohibitive Sub-optimal lighting, background noise (images/people), and cosmetics people where outdoors may cause a problem. Doesn’t require the individual’s cooperation (good for remote/mobile surveillance, not for handheld). Hand Geometry Large size device, not fit for Mobile & Handheld applications

Hosted by: June 23-26, 2003 New York City Mobile/Handheld or not? Voice recognition Fits Mobile Wireless applications (authentication with server) Environmental noise and changes (outdoors) affect accuracy Signature verification Has been integrated in handheld & Mobile devices For signature capture, not V&A May be issues with token storage

Hosted by: June 23-26, 2003 New York City Mobile/Handheld or not? Fingerprint sensing –Compact readers (particularly capacitive, thermal and digital linear sensors) –Fits Mobile & Handheld devices –In many cases weatherized (mostly Optical) –Biometric sleeves/hubs available as add-on to PDA (fits into Compact Flash card slot) –A few (3) companies currently manufacture and ship handheld mobile readers (both capacitive and optical)

Hosted by: June 23-26, 2003 New York City What do they look like? Optical fingerprint reading Contact smart card reader Optional 2D barcode card reader Alpha-numeric keypad Monochrome Graphical LCD OS: Proprietary What does it cost? MSRP: $3,000

Hosted by: June 23-26, 2003 New York City What do they look like? Capacitive fingerprint reading Contact smart card reader Alpha-numeric keypad Color Graphical LCD OS: Windows CE Optional Bluetooth and GSM modules What does it cost? MSRP: $2,500

Hosted by: June 23-26, 2003 New York City What do they look like? Capacitive fingerprint reading Contactless smart card reader: ISO ISO Optional: 2D barcode reader Navigational keypad Monochrome Graphical LCD OS: Proprietary Optional: Bluetooth connection What does it cost? MSRP: $1,025

Hosted by: June 23-26, 2003 New York City What do they look like? Capacitive fingerprint reading Contact smart card reader Navigational keypad + programmable function keys Touch Screen Graphical color LCD OS: Windows CE Ruggedized Optional: Bluetooth, GSM, desktop and car dockings. What does it cost? MSRP: $1,900

Hosted by: June 23-26, 2003 New York City Projects with Mobile & Handheld biometric readers USA Project: Common Access Card (CAC) Solicitor: The U.S DoD Project: Transportation Worker Identification Credential (TWIC) Solicitor: Transportation Security Administration (TSA) Project: Borders E&E Solicitor: Homeland Security/TSA

Hosted by: June 23-26, 2003 New York City Projects with Mobile & Handheld biometric readers Canada Project: Restricted Area Pass System Solicitor: Canadian Air Transport Security Administration (CATSA) Project: Permanent Resident Card Solicitor: Canadian Customs & Revenue Agency (CCRA) Project: NEXUS Solicitor: CCRA / Citizenship & Immigration Canada (CIC) Potential Project: Canadian National ID Card Solicitor: CIC

Hosted by: June 23-26, 2003 New York City Projects with Mobile & Handheld biometric readers World Project: Saudi National ID Card (CAFIS) Solicitor: Saudi Ministry of Interior Project: Colombian National ID Solicitor: Colombian Fed. Gov. Project: National ID Card of El Salvador (DUI) Solicitor: El Salvador Fed. Gov. Etc.