Biometrics in the Banking Industry

Slides:



Advertisements
Similar presentations
What Are the Functions of ATM Machines?
Advertisements

AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
2.7.1.G1 © Family Economics & Financial Education – December 2005– Get Ready to Take Charge of Your Finances – Electronic Banking Bonanza – Slide 1 Funded.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
1.2.2.G1 © Take Charge Today – Revised May 2010 – Electronic Banking Bonanza – Slide 1 Funded by a grant from Take Charge America, Inc. to the Norton School.
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
By: Monika Achury and Shuchita Singh
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
BATCH TRANSACTION PROCESSING Option 1: Transaction Processing Systems.
Checking Accounts 6° PERIOD – SHUMATE. What is a Checking Account? A transactional deposit account held at a financial institution that allows for withdrawals.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
2.7.1.G1 © Family Economics & Financial Education – December 2005 – Get Ready To Take Charge of Your Finances – Electronic Banking Bonanza Funded by a.
Chapter 10 Section 3.  Service 1: Customer Can Store Money  Banks store currency safely  Insured against failure  Safety deposit boxes  Service 2:
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
7.2.G2 Electronic Banking Trivia. 7.2.G2 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Access Control / Authenticity Michael Sheppard 11/10/10.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
ATM with Biometric Technology Group 7 Priyanka Hulsurkar. Suryadevara Sai Krishna. Adwait Mulye.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Electronic Banking 7.3. EFT  Electronic Funds Transfer Banks ability to move money from one account to another by computer  Advantages to Banks (Cost.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
BioIdentity Fraud Elimination & Verification System.
Take Charge of your Finances
Banking.
Take Charge of Your Finances
SECURITY FEATURES OF ATM
Summary Physical Access & Time and Attendance PC/Network Access
Discover the Boom in Electronic Banking!
By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Discover the Boom in Electronic Banking!
Financial Institutions and Services
Depository Institution Essentials
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Chapter 10 Consumer Education.
Financial Institutions Electronic Banking Checking Accounts
Paychecks and Tax Forms Take Charge of your Finances
Seminar Presentation on Biometrics
Margaret Brown 3rd period October 14, 2007
Bank On It.
Depository Institution Essentials
Welcome To Money pad November 23, 2018 Sample footer.
A SEMINAR REPORT ON BIOMETRICS
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Take Charge of Your Finances
Depository Institution Essentials
Discover the Boom in Electronic Banking!
BY: Michael Etse and Maverick Fermill
Take Charge of Your Finances
Presentation transcript:

Biometrics in the Banking Industry PPT BY D.SINDHUJA B.RAJESWARI

Gateways for Biometrics Transaction Security Securing client transactions and protect their privacy either remotely or onsite Network Security Security of the bank’s infrastructure, controls what activities specific individuals or job functions have access to Access Control Protecting the physical security of facilities (vaults, safety deposit boxes) Background Checks Protect against internal fraud and illegal transactions with applicant background checks

Fingerprints Most commonly used biometric in the banking industry Used in all areas of the banking industry Transaction security Network security Access control Background checks Advantages Equipment is cheap Highly accurate Disadvantages Criminal stigma Universality

Fingerprint (Transaction Security) Goal: enable clients to authenticate themselves before any transactions are made on their account Enroll customers when the account is created with their fingerprint When wishing to access their account, they must first provide their fingerprint to be verified No ID card is needed Provides non-repudiation Uses In bank, ATM, kiosk, online

Example Banco Azteca: the first bank to be opened in Mexico since 1995 Allow people with limited incomes that live in poor and rural communities to establish a bank account for the first time. Sparseness of banks No form of authentication (driver’s license) Account ID cards were often lost or stolen Digital Persona technology was used to protect accounts using fingerprints 1.2 million customers of Grupo Electra are enrolled Many customers were farmers and construction workers whose prints were damaged and worn 1 out of 4 people failed to enroll because of low quality prints

Fingerprint (Network Security) Protect against internal fraud (employees tampering with the system) Enroll and authenticate bank employees before they can access the bank’s network to perform a transaction

Example Bank of Central Asia (BCA) in Indonesia has around 8 million customers throughout the country Incorporated Identix fingerprint systems to secure the processing of high-value electronic fund transactions If a large transfer is initiated, the teller and possibly a supervisor need to be authenticated by the system before the teller can finalize the transaction Non-repudiation: the teller cannot deny performing the transaction Duress finger If under duress, the teller can authenticate with a duress finger (alerting the police)

Fingerprint (Access Security) Instead of using a key or card to for access, use a fingerprint Access to the bank, vaults, safety deposit boxes

Example Deutche bank is a European financial service provider with ~65,000 employees Installed AC Controls security to establish biometric access to their building Fingerprint readers determine who can enter their offices and also restricts what areas each person can access Problem: A one day visitor would need to enroll with the bank, to gain access to parts of the building Consumers may be reluctant to enroll their biometrics with multiple organizations Morpheus technologies: develop a network of secure, licensed enrollment facilities Standardization + Interoperability

Fingerprint (Background Checks) Submit requests for backgrounds electronically Background checks ensure the integrity of the employee base

Example ING Direct installed live-scan fingerprint readers that channel electronic submissions to the FBI IAFIS database (Identix) Before background checks took 4-5 weeks While waiting, the prospective employee would be trained If the results effect the hiring, much money was wasted during training Now, checks can be done in 4-5 days Able to wait this period before training

Voice Main advantage over fingerprints: Works remotely (by phone), without special readers Used for transaction security Verifying the customer is the rightful owner Disadvantage Can be affected by outside noise

Vein Pattern Recognition Advantages Highly unique to every individual Patterns are formed at birth and remain constant throughout one’s lifetime Rapid, non-invasive enrollment and verification procedures Works only on living, vascularized hands

Vein Pattern Recognition Disadvantages Injuries or deformations to the hand may cause failure to enroll Systems which require contact may be considered invasive/unhygienic Some systems still require PIN or other identification

Vein Pattern Recognition At Work Southeast Asia Several international financial institutions have implemented vein pattern recognition systems from VeID Ltd.

Hand Geometry

Hand Geometry Based on measurements of the hand Robust to environmental changes Easy to use Ageing, deformities may affect verification

Hand Geometry At Work First Bank Puerto Rico Installed IR Recognition System HandPunch terminals at all branches Employees must swipe an ID card and verify with a hand scan to punch in and out of work Attendance and tardiness have been cut down, as well as labor devoted to monitoring these problems

Conclusions Biometrics are already being used in banks around the world: North and South America, Europe, and Asia Biometrics being used include: Fingerprints Signature Vein Pattern Hand Geometry These systems can be applied to virtually every aspect of the banking industry: Transaction Security Employee attendance Network and Database Security Access to facilities The banking industry is very reluctant to change its existing infrastructures It is expected that biometrics will take longer to be incorporated into the banking practices

References http://www.eyenetwatch.com/biometric_users/Bank_Hapoalim_Case_Study.htm http://www.penflow.com/ http://pr.fujitsu.com/en/news/2003/03/31.html http://www.veid.net/Product/default.htm http://www.findbiometrics.com/Pages/financial_articles/financial_3.html http://www.recogsys.com/news/casestudies/cs08.htm http://www.tml.hut.fi/Opinnot/Tik-110.501/1998/papers/12biometric/biometric.htm