Presentation is loading. Please wait.

Presentation is loading. Please wait.

INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.

Similar presentations


Presentation on theme: "INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel."— Presentation transcript:

1 INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel

2 Biometrics (ancient Greek: bios ="life", metron ="measure") is the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.ancient Greek Biometrics are used to identify the identity of an input sample when compared to a template, used in cases to identify specific people by certain characteristics. The term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. Physical access control can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as a card access system or biometric identification.

3 Common Human biometric characteristics Classification of some biometric traits Biometric characteristics can be divided in two main classes, as represented in figure on the right: physiological are related to the shape of the body. The oldest traits, that have been used for more than 100 years, are fingerprints. Other examples are face recognition, hand geometry and iris recognition.fingerprintsface recognitionhand geometryiris recognition behavioral are related to the behavior of a person. The first characteristic to be used, still widely used today, is the signature. More modern approaches are the study of keystroke dynamics and of voice.signaturekeystroke dynamicsvoice

4

5 Biometric systems The diagram on next slide shows a simple block diagram of a biometric system. When such a system is networked together with telecommunications technology, biometric systems become telebiometric systems. The main operations a system can perform are enrollment and test. During the enrollment, biometric information from an individual is stored. During the test, biometric information is detected and compared with the stored information. Note that it is crucial that storage and retrieval of such systems themselves be secure if the biometric system is be robust. The first block (sensor) is the interface between the real world and our system;telebiometric

6

7 it has to remove artifacts from the sensor, to enhance the input (e.g. removing background noise), to use some kind of normalisation, etc. In the third block features needed are extracted. This step is an important step as the correct features need to be extracted and the optimal way. A vector of numbers or an image with particular properties is used to create a template. A template is a synthesis of all the characteristics extracted from the source, in the optimal size to allow for adequate identifiability. it has to remove artifacts from the sensor, to enhance the input (e.g. removing background noise), to use some kind of normalisation, etc. In the third block features needed are extracted. This step is an important step as the correct features need to be extracted and the optimal way. A vector of numbers or an image with particular properties is used to create a template. A template is a synthesis of all the characteristics extracted from the source, in the optimal size to allow for adequate identifiability. If enrollment is being performed the template is simply stored somewhere (on a card or within a database or both). If a matching phase is being performed, the obtained template is passed to a matcher that compares it with other existing templates, estimating the distance between them using any algorithm (e.g. Hamming distance). The matching programme will analyse the template with the input. This will then be output for any specified use or purpose (e.g. entrance in a restricted area).: If enrollment is being performed the template is simply stored somewhere (on a card or within a database or both). If a matching phase is being performed, the obtained template is passed to a matcher that compares it with other existing templates, estimating the distance between them using any algorithm (e.g. Hamming distance). The matching programme will analyse the template with the input. This will then be output for any specified use or purpose (e.g. entrance in a restricted area).:Hamming distanceHamming distance

8 Functions Functions A biometric system can provide the following two functions: A biometric system can provide the following two functions: Verification A pre-stored template is matched against a sample directly, e.g a card or known database entry. Verification A pre-stored template is matched against a sample directly, e.g a card or known database entry. Identification Identifying from all the templates which one is the closest match to the input sample. Identification Identifying from all the templates which one is the closest match to the input sample.

9 Identification and authentication (I&A) Identification and authentication (I&A) is the process of verifying that an identity is bound to the entity that asserts it. The I&A process assumes that there was an initial vetting of the identity, during which an authenticator was established. Subsequently, the entity asserts an identity together with an authenticator as a means for validation. The only requirements for the identifier is that it must be unique within its security domain.

10 Authenticators are commonly based on at least one of these four factors: Authenticators are commonly based on at least one of these four factors: Something you know, such as a password or a personal identification number (PIN). This assumes that only the owner of the account knows the password or PIN needed to access the account. Something you know, such as a password or a personal identification number (PIN). This assumes that only the owner of the account knows the password or PIN needed to access the account. Something you have, such as a smart card or token. This assumes that only the owner of the account has the necessary smart card or token needed to unlock the account. Something you have, such as a smart card or token. This assumes that only the owner of the account has the necessary smart card or token needed to unlock the account. Something you are, such as fingerprint, voice, retina, or iris characteristics Something you are, such as fingerprint, voice, retina, or iris characteristics

11 Accountability Accountability Accountability uses such system components as audit trails (records) and logs to associate a subject with its actions. The information recorded should be sufficient to map the subject to a controlling user. Audit trails and logs are important for Accountability uses such system components as audit trails (records) and logs to associate a subject with its actions. The information recorded should be sufficient to map the subject to a controlling user. Audit trails and logs are important for Detecting security violations Detecting security violations Re-creating security incidents Re-creating security incidents If no one is regularly reviewing your logs and they are not maintained in a secure and consistent manner, they may not be admissible as evidence. If no one is regularly reviewing your logs and they are not maintained in a secure and consistent manner, they may not be admissible as evidence.

12 Many systems can generate automated reports based on certain predefined criteria or thresholds, known as clipping levels. For example, a clipping level may be set to generate a report for the following: Many systems can generate automated reports based on certain predefined criteria or thresholds, known as clipping levels. For example, a clipping level may be set to generate a report for the following: More than three failed logon attempts in a given period More than three failed logon attempts in a given period Any attempt to use a disabled user account Any attempt to use a disabled user account These reports help a system administrator or security administrator to more easily identify possible break-in attempts. These reports help a system administrator or security administrator to more easily identify possible break-in attempts.

13 Access Control Techniques Access Control Techniques Access control techniques are sometimes categorized as either discretionary or mandatory. Access control techniques are sometimes categorized as either discretionary or mandatory. Discretionary Access Control Discretionary Access Control Discretionary access control (DAC) is an access policy determined by the owner of an object. The owner decides who is allowed to access the object and what privileges they have. Discretionary access control (DAC) is an access policy determined by the owner of an object. The owner decides who is allowed to access the object and what privileges they have. Mandatory Access Control Mandatory Access Control Mandatory access control (MAC) is an access policy determined by the system, not the owner. MAC is used in multilevel systems that process highly sensitive data, such as classified government and military information. A multilevel system is a single computer system that handles multiple classification levels between subjects and objects. Mandatory access control (MAC) is an access policy determined by the system, not the owner. MAC is used in multilevel systems that process highly sensitive data, such as classified government and military information. A multilevel system is a single computer system that handles multiple classification levels between subjects and objects.

14 Thank You Thank You


Download ppt "INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel."

Similar presentations


Ads by Google