Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

1 Secure Vault Payments Girard Business Solutions, Inc.
Paychecks and Tax Forms. Where Does My Money Go? Almost 31% of an individual’s paycheck is deducted  Taxes are the largest expense most individuals will.
Paychecks and Tax Forms Take Charge of your Finances
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Basic Banking Services - Activity 1
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
FIT3105 Smart card based authentication and identity management Lecture 4.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
G1 © Family Economics & Financial Education – Revised September 2006 – Paychecks and Taxes Unit – Understanding Your Paycheck and Tax Forms Funded.
© Gene Yelle - & Prentice-Hall All rights reserved. CHAPTER 11 E-Commerce Payment Systems.
KBA 1 Korea’s Advances in Biometrics Market & Technology Alex H. Choi Korea Biometric Association.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Voice Recognition
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
©2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publically accessible website, in whole or in part.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
PAYCHECKS Personal Finance PAYING EMPLOYEES There are 3 methods employers may use to pay employees: Paycheck – payment given with a paper check.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - I October 17, 2005.
Electronic Commerce Semester 1 Term 1 Lecture 18.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
Profits, Right Before Your Eyes. Instant Image Verification.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Behavioral Biometrics October 10, 2005.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Mexican Tax Administration Service Major Developments & Results September, 2006 Mexican Tax Administration Service.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
PKI: The Key to Electronic Identity Initiatives? Overview of models and examples Stijn Bijnens, SVP Identity Management, Cybertrust.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Understanding Your Paycheck and Tax Forms Family Economics & Financial Education.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Biometrics in the Banking Industry
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Protection of CONSUMER information
Summary Physical Access & Time and Attendance PC/Network Access
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Paychecks and Tax Forms Take Charge of your Finances
Facial Recognition [Biometric]
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Data and Applications Security Developments and Directions
Colorado “Protections For Consumer Data Privacy” Law
Information system analysis and design
Presentation transcript:

Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005

Outline l Overview l Customer Facing Applications l Biometrics Vertical Markets

References l Course Text Book, Chapter 13, 14

Groups of Applications l Citizen Facing Applications - E.g., Criminal identification l Employee Facing Applications - PC/Network access, Physical access l Customer-facing applications - POS Transactions

Customer Facing Applications l Provider of goods/services provides authentication of consumers and enforces compliance with the match decisions of the biometrics system l Usually open systems based on verification l Two aspects - E-Commerce/Telephony - Retail/ATM/POS

E-Commerce/Telephony l Use of biometrics technologies to - Verify the identity of individuals conducting remote transactions l Biometrics complements passwords and traditional, authentication systems l Both e-commerce and telephony have many properties in common - Usually transaction based - Lack high degree of trust - Trusted third party authentication

Current Status l Only a few institutions enforce biometrics-abed verification l Usually finger scanning or voice scanning l B2B Transactions are expected to use more biometrics l In general merchants will use equipments already in place and will not deploy them

Future Trends l Individual and Institutional need for increased trust in remote transactions l Emergence of Transactional Revenue Model l Increased presence of acquisition devices l Entry of trusted parties into the biometric markets

Related Technologies l Finger scan will be used most often, especially when it is used for desktop applications l Iris scan, facial scan also have a role l Telephony applications will utilize mainly voice scan l Financial and healthcare are the main applications

Biometrics Solution Matrix l How urgent is the authentication problem that biometrics are solving l What is the scope of the authentication problem that biometrics are solving l How well can biometrics solve the authentication problem? l Are biometrics the only possible authentication solution? l How receptive are users to biometrics as an authentication solution

Factors considered in the Matrix l Exclusivity - Biometrics is not the only solution for e- commerce/telephony l Effectiveness - Finger scan for e-commerce and voice scan for telephony l Receptiveness - Both parties in a transaction are motivated l Urgency - Moderate urgency l Scope - Very broad, millions of potential customers

Cost and Deployment Issues l Cost is not well established for E-commerce - How much of the costs should go to the vendor? How for the different parties share profits? l Costs for telephony are more established - Institutions may provide biometrics solutions costing several thousand dollars l Issues in Deployment - Almost all users enrolled remotely - Unsupervised enrollment and therefore fraud possible - Liability for fraudulent access must be addressed - Need fallback procedures of access is denied - Compatibility with new devices, integration - Security levels

Retail/ATM/Point of Sale l Use of biometrics technologies to - Identify or Verify the identity of individuals conducting in- person transactions l Biometrics complements photo identification l Have some properties in common with e-commerce/telephony l However, Retail/ATM/POS applications usually supervised the enrollment process

Current Status l Main technology at present is PINs (e.g., ATMs) l Biometrics Used for a few applications at this time l Finger scan and face scan are expected to be used l Used in conjunction with traditional systems

Future Trends l Fraud detection will be the main motivation for using Bio9omegrcis technologies l Cost of deployment could inhibit growth - E.g., fort e-commerce and telephony the hardware is usually in place such as telephones; for ATM new hardware has to be installed l Motivation for use is to reach a large number of users

Related Technologies l Face scan, Finger scan, Iris scan will be used l Finger scan will be used most often l Balance between expense and accuracy

Factors considered in the Matrix l Exclusivity - Biometrics is not the only solution for e- commerce/telephony l Effectiveness - Issues in integrating technology into current systems l Receptiveness - Fraud detection will be motivation for merchant l Urgency - Moderate urgency; maximum that can be stolen via ATM is about $300 l Scope - Very broad, millions of potential customers

Cost and Deployment Issues l Firm benchmarks are yet to be established - How much of the costs should go to the vendor? How do the different parties share profits? l Issues in Deployment - Process flow - Integrating systems - Motivation for customers and merchants

Vertical Biometrics Markets l Law enforcement l Government l Financial l Healthcare l Travel and Immigration l Other - Education, Entertainment, etc.

Law Enforcement l AFIS l Surveillance l Mug Shots l Corrections l Home Arrest

Government l National ID l Vote registration l Driver license l Benefits distribution l Employee authentication

Financial l Account access l ATM l Online banking l Telephone transactions

Healthcare l Access to personal information l Patient identification l Disease information access

Travel and Immigration l Ai5r Travel l Passports l Border crossing l Mass Transportation