Unique Identification Authority of India Aadhaar Authentication Feb’ 2016 1.

Slides:



Advertisements
Similar presentations
Card Verification Support
Advertisements

AADHAAR – India’s experiment with the Universal ID Number Anit N. Mukherjee National Institute of Public Finance and Policy (NIPFP), New Delhi Presentation.
Authentication On-Boarding
NANDAN NILEKANI CHAIRMAN UNIQUE IDENTIFICTION Authority of India
1 Presented by July-2013, IIM Indore. 2  The Unique Identification (AADHAAR) is a 12 digit Number, which identifies a resident, will give individuals.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Jeevan Pramaan (Digital Life Certificate for Pensioner)
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Chapter 10: Authentication Guide to Computer Network Security.
Aadhaar Seeding What is seeding? It is a process whereby UID is added to the database of beneficiaries. In simple words, each beneficiary is identified.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Creating Unique IDs for 1.2 Billion Residents of India Unique ID Authority of India Identity Management – A National Perspective.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Introduction to Aadhaar. 2 What it is: A number (12 digits) For every individual Enables identification, and is for every resident Will collect and record.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Team 16 : MedFRS Device Diagnostic Software Misha DowdProject Manager Delnaz GundeviaLife Cycle Planner Anfal Abdul JaleelSystem Architect Nanda Kishore.
1 Training Program on. 2 Objectives of the Programme Explain the usage of the different functions of the child enrolment client lite -CEL Explain the.
Technology as enabler for electronic benefit transfer – Case of Micro ATM, BC, Aadhaar Authentication System November 29,
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal. What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.
PRESENTATION ON BIOMETRICS
Biometric for Network Security. Finger Biometrics.
Aadhaar Enabled Applications December 2015
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Module 1 4 th November, Module 1 4 th November, 2010 Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Use of Aadhaar Card to facilitate the process of Job and Admission Applications. Use of Aadhaar Card to enforce Pollution Checks on vehicles. Use.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Financial Inclusion. 2 Indian Demographics Population demographics APL (71%) BPL(29 %) Mobile subscriber penetration has reached 80% of population 970mn.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Success stories – Social security pensions Andhra Pradesh & Telangana.
Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain the UIDAI Eco-system Interpret the benefits of Aadhaar.
The Aadhaar project 26th February 2013
Enrollment to Authentication Client and Station Overview UIDAI Sanjay Jain Jagadish.
The Aadhaar project Unique Identity and Its Positive Externalities for Inclusiveness 16 th January 2013 UIDAI
Module 1 Version:1.3_ Release date:
Installation of Software and Registration of Device After successful registration of a retailer in mFMS, the retailer is ready to use POS device. The retailers.
Importance of Aadhaar Seeding & Validation Methods
PoC Learnings Jai Bannur. PoC Goals Capture biometrics of rural Indians Capture biometrics of rural Indians – Assess the best biometric quality and accuracy.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Transfer of digitized enrolment data from the enrolment station to the CIDR of the UIDAI. Currently through memory sticks via India Post. At a later stage:
SMART PULSE SURVEY USER MANUAL.
Biometrics in the Banking Industry
Digital Payments STEP BY STEP INSTRUCTIONS FOR VARIOUS MODES OF PAYMENT: Cards, USSD, AEPS, UPI, Wallets.
A National e-Authentication Service
AADHAAR CARD.
NATIONAL ACADEMIC DEPOSITORY
Using Technology to provide an innovative sustainable model for delivery of Cashless Health Insurance                              r r r r r y y g s s.
ESign Aashutosh.
Authentication.
NAME:NASHTE AJAYKUMAR KALYAN
EMV® 3-D Secure - High Level Overview
NATIONAL ACADEMIC DEPOSITORY
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Basic Knowledge of UIDAI and Aadhaar
Aadhaar Authentication - Introduction
Beneficiary Identification System (BIS)
Giovanni Carnovale – Regional Sales Manager Central & Eastern Europe
Presentation transcript:

Unique Identification Authority of India Aadhaar Authentication Feb’

Agenda Aadhaar Authentication DefinitionAuthentication Eco SystemAuthentication ModalitiesCompliance Parameters: BFD and Fusion Finger AuthenticationApplications using authenticationAuthentication Best PracticesAuthentication User Agencies (AUA’s)

What is Authentication? Authentication answers the question ‘Are you who you say you are?’ What you know?– user id/password, PIN, mother’s maiden name, etc. What you have? – a card, a device such as a dongle, mobile phone, etc. What you are? – a person’s biometric markers such as fingerprint, iris, voice etc. The ‘what you are’ biometric modes captured during Aadhaar enrolment are fingerprints, iris scans and face. Of the 3 modes, fingerprint biometric happens to be the most mature biometric modality. Authentication answers the question ‘Are you who you say you are?’ What you know?– user id/password, PIN, mother’s maiden name, etc. What you have? – a card, a device such as a dongle, mobile phone, etc. What you are? – a person’s biometric markers such as fingerprint, iris, voice etc. The ‘what you are’ biometric modes captured during Aadhaar enrolment are fingerprints, iris scans and face. Of the 3 modes, fingerprint biometric happens to be the most mature biometric modality.

Aadhaar Authentication Digital Platform 4

… authenticate IDs online, real-time Central UID database 1:1 check, no ID fraud Only YES/NO response, no details – no invasion of privacy Person can see self-details, no one else can Authentication - ‘Are you who you claim to be?’

Authentication Supports answering the question “is a person s/he claims to be Authentication User Agencies (AUA) Services eKYC User Agencies (KUA) Services Verifies resident information (demographics and/or biometrics) for a given Aadhaar biometrics (fingerprint, Iris) One time pin (OTP) and combinations thereof Supports multi-factor authentication using GPRS, EDGE,3G, Wi-fi, LAN, WAN, Broadband etc Personal computer, mobile, PoS terminals, etc. Works with assisted and self-service applications Works on all widely used networks, platforms and devices Authentication Services – Any time, Any where, Any network

Authentication Ecosystem (Overview) Aadhaar Holder Auth Server Leased lines ASA AUA UIDAI Data Centre Sub-AUA Authentication Devices

Aadhaar Authentication – Participants & Transaction Aadhaar Holders Residents who have obtained their Aadhaar number Authentication Devices Point of initiation of Aadhaar authentication transaction e.g., PCs, kiosks, handheld devices etc Authentication User Agency (AUA) Agency that uses Aadhaar authentication to enable its services Aadhaar Holder Authentication Devices AUA ASA UIDAI’s CIDR Authentication Request Service DeliveryNecessary Updates & Confirmation Yes / No Response Authentication Service Agency (ASA) Agency that has secured leased line connectivity with CIDR (BSNL etc.) Unique Identification Authority of India Offers online authentication Sub Auth. User Agency (Sub AUA) Agencies that access Aadhaar authentication through an existing AUA

Aadhaar Authentication Modalities 1:1 Match YES *** OR NO **OTP – One Time Pin *and/or – Single or multi-factor authentication ***Yes/No – Would enable service provider to take business decision CIDR and/or* and/or OTP OTP Request

 Accurate Seeding is important for Auth. Success  Quality of Biometric (both at enrolment & capture) matters; ex. 70% FP quality has definite chance of passing authentication  Critical Success factors: – BEST FINGER DETECTION (BFD) – Fusion Finger – Re-attempt (needed)  Approach plan for BFD camps: On average, max of 1000 benf. per village or per operating device. At the maximum, effort of 1-2 weeks for BFD saturation. Dept to complete this one-time activity before launch. Authentication Features- Key Success Factors

Best Finger Detection (BFD)

BFD- Sample output

Fusion Finger (Two-finger) Capture first best finger of the resident If No, Step2 Step 1 1 st Best Finger Single Finger Authentication using 1 st best finger YES Capture second best finger of the resident Step 2 2 st Best Finger Two Finger Authentication Using 1 st best and 2 nd best fingers YES If No, Repeat Step1

Fusion finger- Usage types Implicit way of Fusion Auth – App takes care of the feature in backend, in case of 1 st failure, if coded for Fusion; – User is asked to put his 2 nd and 3 rd Best fingers in case of failure. Explicit mode

Inter-linked Success Factors Fusion Finger Re- Attempt Best Finger usage

Why BFD, Two-finger features? Based on a study by UIDAI for accurate and easy authentication

Single Function Optimized Multi Function Capable Versatile MicroATM, PDS POS Terminals Diverse Usages Authentication Devices

Authentication devices perform the following key functions: – Collect PID from Aadhaar holders – Perform basic checks on the information collected for completeness and compliance – Prepare the authentication data packet for transmission as per Aadhaar authentication APIs – Transmit the authentication packets for authentication – Receive the authentication results along with instructions for next steps if any Authentication Devices

Authentication – Best Practices Use Wet Clothes/Sponge to Wet Fingers during Authentication, if fingers are Dry BFD and Two Finger Authentications- Improves the success rate for authentication. This needs to be planned at device UI level and proper operator training needs to be ensured. BFD is advised to be done before any authentication attempt Mechanism for Aadhaar Seeding verification - Authentication could be rejected because of Aadhaar seeding issues. It is highly recommended to have a mechanism to verify/correct Aadhaar in database when resident comes for availing service for the first time. Appropriate Error Code handling at all levels -Clear and actionable messages should be configured at client level Fraud Monitoring and Analysis - Fraud monitoring mechanism required to ensure there is no misuse of exception handling mechanisms

Poor Finger Print Quality – Use IRIS (or) OTP Connectivity – Identification of best network service provider ASA Failures – Alternate ASA (preferably) Training & Capacity gaps – Training Sessions & IEC Device Issues – Field Support by Device Vendors Authentication Issues- UIDAI Auth support (24 x 7) How to Address Issues? A few suggestions

Who is using Authentication? -Authentication User Agencies India Post F&CS Govt. of A.P SBICSCNICKVBBOI CBIICICI Indian Bank DoIT-Gof- Jarkhand Directorate, Income Tax CANARAPNB CORPORA TION IOB Allahaba d Bank OBCMEADENAVIJAYA UBI SYNDICAT E BANK DIT GofMaha rashtra GBAHDFCAxisIDBI Pallavan Grama Bank Pandhyan Grama Bank List goes on……. For Complete list, pls. visit ‘

Applications using Aadhaar Biometrics Authentication Service delivery agencies authenticate residents using one of the biometric, either iris or fingerprint at the point of delivery. Biometric authentication is used for: Providing Ration at PDSPension PaymentsMGNREGS Payments Managing AttendanceAdding New BeneficiariesFinancial Transactions

THANK YOU... Questions?