Sectoral operational programme „Increase of economic competitiveness” „Investments for your future” Project co-financed by the European Regional Development.

Slides:



Advertisements
Similar presentations
MQ Series Cross Platform Dominant Messaging sw – 70% of market Messaging API same on all platforms Guaranteed one-time delivery Two-Phase Commit Wide EAI.
Advertisements

Cultural Heritage in REGional NETworks REGNET Project Meeting Content Group
Handheld Contact Wireless syncing ACT! Blackberry and Windows Mobile 5/6.
Power BI Sites and Mobile BI. What You Will Learn Sharing and Collaboration Introducing Power BI Exploring Power BI Features and Services Partner Opportunities.
Futures – Alpha Cloud Deployment and Application Management.
Secure Lync mobile Authentication
High Performance Computing Course Notes Grid Computing.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
SmartER Semantic Cloud Sevices Karuna P Joshi University of Maryland, Baltimore County Advisors: Dr. Tim Finin, Dr. Yelena Yesha.
Faith Allington Program Manager Microsoft Corporation Session Code: WSV304.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
SG EUROPEAN PHARMACEUTICAL PRICING NERVE CENTRE. ABOUT SIGYN R&D Sigyn R&D is a Croatian company based in Zagreb, established in Tailor made software.
Uniqueness of user names is enforced Customer information logged to database Require contact information as well as address address will.
Chapter 5 Database Application Security Models
© 2009 IBM Corporation ® IBM Software Group Introduction to Cloud Computing Vivek C Agarwal IBM India Software Labs.
Business Intelligence Dr. Mahdi Esmaeili 1. Technical Infrastructure Evaluation Hardware Network Middleware Database Management Systems Tools and Standards.
Project Centric Solutions Page 1 Swaziland Electricity Board Magsoft e-Tendering Solution Magsoft International LLC
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Capacity Planning in SharePoint Capacity Planning Process of evaluating a technology … Deciding … Hardware … Variety of Ways Different Services.
Presented By: Shashank Bhadauriya Varun Singh Shakti Suman.
Enterprise Reporting with Reporting Services SQL Server 2005 Donald Farmer Group Program Manager Microsoft Corporation.
April 6, 2009 Ted Lesher - NexPrise, Inc..  Introduction/NexPrise Background  What is Software as a Service and how can it benefit my school?  Data.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
First Look Clinic: What’s New for IT Professionals in Microsoft® SharePoint® Server 2013 Sayed Ali (MCTS, MCITP, MCT, MCSA, MCSE )
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Cloud Testing Speaker : Mrityunjaya Hikkalgutti Date : 3 rd July 2010.
CGW 2003 Institute of Computer Science AGH Proposal of Adaptation of Legacy C/C++ Software to Grid Services Bartosz Baliś, Marian Bubak, Michał Węgiel,
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
Module 7: Fundamentals of Administering Windows Server 2008.
material assembled from the web pages at
Database Application Security Models Database Application Security Models 1.
EXPOSE GOOGLE APP ENGINE AS TASKTRACKER NODES AND DATA NODES.
X-Road – Estonian Interoperability Platform
Eric Holtel.  Introduction  Project Description  Demonstration  Deliverables  Conclusion.
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Module 13 Implementing Business Continuity. Module Overview Protecting and Recovering Content Working with Backup and Restore for Disaster Recovery Implementing.
Microsoft Azure SoftUni Team Technical Trainers Software University
ArcGIS Server for Administrators
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
1 Chapter Overview Performing Configuration Tasks Setting Up Additional Features Performing Maintenance Tasks.
1 European eGovernment Awards 2007 European eGovernment Awards 2007 Workshop for Finalists July, Brussels LIMOSA Belgium Reference project number.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Windows Role-Based Access Control Longhorn Update
INFSO-RI Enabling Grids for E-sciencE EGEE is a project funded by the European Union under contract INFSO-RI Grid Accounting.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
Module 9 Planning and Implementing Monitoring and Maintenance.
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
State of Georgia Release Management Training
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
Vending machine monitoring system Industry&Business &Government IT transformation.
Instantly Deliver and Track Training to Learners Anytime, Around the World and on Any Device Within Your Office 365 Environment with LMS365 OFFICE 365.
Kentico Enterprise Marketing Solution Petr Palas.
Energy Management Solution
SQL Database Management
Sponsored by Portakal Technologies
Cloud Management Mechanisms
Grid Computing.
Power BI Security Best Practices
Energy Management Solution
Alarm Extension Pack from Wonderware Finland (Klinkmann)
Cloud Management Mechanisms
IP Control Gateway (IPCG)
Presentation transcript:

Sectoral operational programme „Increase of economic competitiveness” „Investments for your future” Project co-financed by the European Regional Development Fund “The content of this material does not necessarily represent the official position of the European Union or the Romanian Government” ATHOS Team July 15, 2013 Automated system of authenticating through biometric signature - ATHOS

ATHOS Introduction Overview Technical Description Slides before 1st Section Divider Demo

pptPlex Section Divider Introduction The slides after this divider will be grouped into a section and given the label you type above. Feel free to move this slide to any position in the deck.

Motivation Considering that virtual attacks take place more and more often, with increasing damage, there is a need to increase the safety degree of applications representing targets for the attackers.

The project objective the inclusion of the signature based authentication procedure, to increase the security degree of on-line authentication the reduction of the implementation time allotted to execute the authentication system by the developers for this type of solution

Where did we start from? ATHOS bases Patent for signature authentication system BIOACSSISEB

What have we reached? Project eligible expenses financed from public funds : RON New jobs created due to the project: 3 Patent applications resulted from the project: 1 Scientific publications resulted from the project: 3 Private financial contribution of the applicant: RON Project eligible expenses made by SOFTWIN: RON

pptPlex Section Divider Overview The slides after this divider will be grouped into a section and given the label you type above. Feel free to move this slide to any position in the deck.

System functions Security Authorization, confidentiality, integrity Disponibility Over 99% uptime Acuracy Performances of the signature authenticating methods FRR (False Rejection Rate) FAR (False Acceptance Rate) Capacity Maintaining system efficiency when processing a large number of applications in real time using limited resources Nvidia CUDA solution– high processing power at a reduced price

System functions Modifiability Treating a high number of requests from customers in different geographical regions – replication Interoperability Modifiable architecture– multiple biometric technologies can be used Scalability Optimal distribution of tasks by resources Reduced time to design and implement the solution

Workflow – the developer License acquisition+ SDK Creating application instance Developing application Activating application

Workflow – the final user Create system account RegistrationAuthentication

Licensing mode Requirement of SLA (Service Level Agreement) Maximum response time Maximum number of requests per minute Maximum number of users registered in the system Example: E-banking application vs timesheet application

Commercial package 1) Selling authentication services to developers: Subscription fee 2) Pay-per-use: Fee for each authentication Package content: Client SDK User manuals Development licenses + production

Performances* Security level FRR: max % FAR: max. 1% Response time: 1-5 seconds Number of requests per minute: thousands- tens of thousands** * only with the purchased license and while the system is not overloaded ** depending on hardware configuration

pptPlex Section Divider Technical Description The slides after this divider will be grouped into a section and given the label you type above. Feel free to move this slide to any position in the deck.

Security Module Security Module Notifier Load Balancer System architecture ATHOS Service Computing Service Worker n Worker 2 Worker 1 Data Service Error Logging Service Aplications Users Specimens Logs PROXY Inspector ATHOS Portal License Administration Module PROXY Client 1 application Client 2 application PROXY Client m application

ATHOS Service Reverse PROXY Receiving and validating requests For authentication For data Security – TSL, HTTPS, mutual authentication (certificates) System architecture – Server components Load Balancer ATHOS Service Computing Service Worker n Worker 2 Worker 1

System architecture – Server components Computing Service Configuring tasks Return the application and user data Assigning priorities Taking the template from the database Monitoring Tasks System loading level Statistical information management and storage of Workers Load Balancer ATHOS Service Computing Service Worker n Worker 2 Worker 1

System architecture – Server components Load Balancer Task distribution by resources License requirement compliance optimization Resource usage optimization Processing capacity optimization ATHOS Service Computing Service Worker n Worker 2 Worker 1 Load Balancer

System architecture – Server components Worker Authentication process optimization Biometric authentication API Processing on multi-core (CPU) şi many-core (GPU) computer units Load Balancer ATHOS Service Computing Service Worker n Worker 2 Worker 1

System architecture – Server components Data Service Authorizing and serving data requests Data validation and storage Aplications Users Specimens Components Security Module Hashing Encryption Notifier Error Logging Service Logs Security Module Security Module Data Service Aplications Users Specimens

System architecture – Server components Error Logging Service Registration of component events Notification via on application and system level Periodic On demand Generate reports on application and system level Periodic On demand Notifier Error Logging Service Log-uri Security Module Security Module Data Service Aplications Users Specimens

System architecture – Server components ATHOS Portal Application management User management (partial) Management of system components Template storage Configuration of auxiliary services (logging, reporting) PROXY Inspector ATHOS Portal License Administration Module

System architecture – Server components PROXY Inspector Enables processing tasks to the client Monitors the subtask processing modules License Administration Module ATHOS module or third-party Management of commercial use licenses PROXY Inspector ATHOS Portal License Administration Module

Funcționalități specifice integrării ATHOS Modul achiziție semnături System architecture – Client components PROXY Communication module with ATHOS Interoperability Secured access Forwarding subtasks Client application Signature acquisition module ATHOS specific integration code Application specific code Client Execution Module PROXY Aplicație client Client Execution Module

Workflow - authentication Security Module Security Module Load Balancer ATHOS Service Computing Service Worker Signature in BIR format Data Service PROXY Client application Signature acquisition module Authentication request generated by application Authentication request in ATHOS standard format Application/User data request Template request Encrypted template Decrypted template Authentication task Processing request Processing result Task result Response to authentication request

Scheduling algorithm Algorithm developed by SOFTWIN team, patent pending (US PTO) Authentication task distribution by available resources SLA compliance Efficient resource usage Uniform decrease of performances when loading

Scheduling algorithm Specific auxiliary modules Data structure for storing tasks Distribution/Scheduling module Monitoring module State/performances estimating module Configuration task module Prioritization sub- module Classification sub- module

Scheduling algorithm Prioritization scheme based on SLA Determining the proportionality between urgent and non-urgent tasks Resource classification based on task proportionality Capacity Processing power Confidence level

Security Secured connection between clients and ATHOS core (TSL) Template encrypted storage(AES) Authentication and authorization on ATHOS service level

Technologies

Performances SLA compliance Performance decreasing „Stress testing” 14% standard deviation of performance decrease per applications LoadingSLA conditionCompliance degree NormalGuaranteed number of requests per minute100% Guaranteed response time100% HighGuaranteed number of requests per minute99.6% Guaranteed response time90%

Performances Processing capacity of Workers Hardware configurationNumber of authentication processes Number of requests/ 60 seconds Average response time (miliseconds) Intel Core 2 Duo CPU Intel Core i5-3320M Intel Core 2 Duo E7400 GPU (2 x nVidia GeForce GTX 275) Intel Xeon X Intel Xeon E Intel Core i GPU (3 x nVidia GeForce GTX 570)

Performances Scalability

Performances Resource loading Tasks / minuteSolved tasks on resource 1 (%) Solved tasks on resource 2 (%) 20050%50% (50%-0%) 40050%50% (48%-2%) 60050%50% (30%-20%) 80052%48% (23%-25%) %54% (27%-27%) %59% (29%-30%)

Performances Up to 5000 requests per minute(7,2 million requests/day) Data server Intel Xeon E5-2407, CPU: 2.40 GHz, 2 proc. x 8 core x 1 thread Central server Intel Xeon E7302, CPU: 2.13GHz, 4 core X 4 threads Workers Intel Core 2 Duo CPU 3 x Intel Core i5-3320M Intel Core 2 Duo E7400, GPU (2 x nVidia GeForce GTX 275) Intel Core i5-2500, GPU (3 x nVidia GeForce GTX 570)

Additional information A. Salinca, S. M. Rusu, Ș. Diaconescu: An approach to data collection in an online signature verification system, 8th International Conference on Web Information Systems and Technologies, Porto, Portugal 18 – 21 April 2012, WEBIST A. Salinca, S. M. Rusu, A. M. Pricochi: SOA–Based Authentication System for Dynamic Handwritten Signature, Advances in Information Systems and Technologies, , Springer Berlin Heidelberg, 2013 A. M. Pricochi, A. Salinca, S. M. Rusu, B. Ivașcu: A Dynamic Load Balancing Strategy for a Distributed Biometric Authentication System, 9th International Conference on Web Information Systems and Technologies, Aachen, Germany 8 – 10 May 2013, WEBIST

pptPlex Section Divider Demo The slides after this divider will be grouped into a section and given the label you type above. Feel free to move this slide to any position in the deck.

Demo ATHOS Athos Portal HomeBank- type Demo

ATHOS Workflow Demo HomeBank-type demo Dynamic handwritten signature authentication using ATHOS Application development according to SDK Adding user in the application from ATHOS Adding application in ATHOS Purchase license Insert into the systemActivate application Adding subject in ATHOS Create accountActivate account

Demo – facilities ATHOS RegistrationAuthentication User Management Sync app users Sync app data Event notification Reports and statistics Security Management SDK

Q & A Thank you!