BIOMETRICS Libraries have begun to see the value of biometrics M. G

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Emerging Biometric Applications Expectations and Reality (in 29 minutes or less!) (C) Mr David Heath of Triton Secure.
Marjie Rodrigues
Security-Authentication
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Biometrics.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Physical security By Ola Abd el-latif Abbass Hassan.
BIOMETRICS.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Unit 32 – Networked Systems Security
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Biometrics in the Banking Industry
Biometrics Security in Banking Systems Image processing in ATM
Trend Micro Consumer 2010 Easy. Fast. Smart.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
Authentication.
FACE RECOGNITION TECHNOLOGY
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
© Copyright 2008 FingerTec Worldwide. All Rights Reserved.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Depository Institution Essentials
Use of Biometric Technology in Payments to avoid Frauds
Seminar Presentation on Biometrics
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Biometrics , Computer & Network Security 1
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Faculty of Science IT Department Lecturer: Raz Dara MA.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
BY: Michael Etse and Maverick Fermill
Ones Technology Products & Solutions
Presentation transcript:

BIOMETRICS Libraries have begun to see the value of biometrics M. G BIOMETRICS Libraries have begun to see the value of biometrics M.G. SELVI Assistant Librarian Center of Advanced Study in Crystallography and Biophysics, University of Madras Chennai.

INTRODUCTION Biometrics is the Science and Technology of Measuring and Analyzing Biological data.

It is an Automated Method of recognizing a person based on a It is an Automated Method of recognizing a person based on a Physiological or Behavioral characteristics The Features measured are, face finger print hand geometry hand writing iris voice blood vessels in the retina coloration in the cornea of the eye DNA from tissue samples

Biometric-Based Authentication Dr. S.R. RANGANATHAN, Father of Library Science said, “ The Right Book to the Right Reader at the Right Time ” At present distinguishing “The Right Person” from an imposter is the key to security and trust. Biometric based solution provide Personal data privacy Confidential financial transaction

Biometric-base authentication applications include Workstation Network and Domain access Single Sign-on Application logon Data Protection Remote access to resources Transaction security and Web security.

Biometric Device – Fingerprint Finger Print is not easily borrowed, lost stolen forgotten falsified or guessed.

Biometrics and Libraries In libraries, finger print identification has the additional benefits of Convenience Customer confidence Prevent theft and vandalism Prevent unauthorized & fraudulent use Improves safety Accuracy and Security

Biometric Finger Scanners It consists of A reader or scanning device Software that converts the scanned information into Digital form and compares match points A Database that stores the Biometric data for comparison

Biometric System Finger print identification process consists of two essential procedures Enrollment Authentication No person’s finger prints are identical to those of another individual!

Comparison for identification A Verification System It conducts a one-to-one comparison (1:1) to determine whether the identity is true. eg. Accessing an online secure data source. An Identification System It conducts a one-to-many (1:N) comparison to establish a subject’s identity. eg.Front counter check-in

Benefits of Biometrics in Libraries From LIBRARY POINT OF VIEW Recurring cost for Library card eliminated Easy and foolproof verification of end user Rack management for book retrieval Dynamic & easy searching of books Online budget and account maintenance Instant reports No misuse of authority Full inventory control

From Student/ Member point of view          Problems due to library card will be eliminated.          No misuse of library card is possible due to fingerprint.          Searching of complete library on a fingertip without scanning whole manual register.          No time wastage in issuing/returning of books        Control in Library Internet Access, Self check out systems and Electronic media control (DVDs, CDs).

Diagram explaining biometric needs for employees & members in libraries

MEMBER – I.D. Theft Prevention for Employees and Members ACCESS – Interior and/or Exterior Door Access EMPLOYEES CENTRAL SERVER AND MANAGER TIME – Employee Time and Attendance MEMBERS TELLER – File Cabinet and Drawer Access NON-MEMBERS PASSWORD – Password management & Control for Computers,Websites, Application & Corporate Networks

BIOMETRICS IN PC ACCESS, NETWORK ACCESS, PASSWORD ELIMINATION IN LIBRARIES ·        Protects individual PCs and Network Access. ·        Reduce IT helpdesks calls for password resets. ·        Authenticate who is accessing what PC, Network, and application with exceptional accuracy. ·        Associate a single fingerprint with as many or as few passwords or PINs on a system. Single sign or convenience for application and websites. ·        Logon automatically without having to type in another password.

·        Eliminate the security risks of written down passwords. ·        Protects passwords from most key logging viruses. ·        Prevent stolen or Borrowed passwords. ·        Easy to use and enroll fingerprint profiles. ·        Easy installation.

Web-Based Biometric Authentication System (WBAS)

The authentication can be done by: · Fingerprint only (needs a fingerprint reader) · Face only (needs a webcam/camera) · Fingerprint and Face (needs a fingerprint reader and a webcam/camera)

Biometrics and smart card system Biometrics add an additional layer of security to a smart card system Smart cards provide the “something you have”factor. The “Something you know”is usually a PIN Integrating a finger print scanner into a smart card reader increases security by adding “something you are”

Biometrics in INDIA India which is perpetually under the threat of terrorism and security breach, is gearing up to adopt various biometric methods. It is used in Defense and Security Industry Police Administration Finance Ministry (PANs) Home Affairs (IDs) Libraries

The Biometric Consortium The 2011 conference will be two and an half days of presentation, seminars and panel discussions. with the participation of internationally recognized experts in biometric technologies, system and application developers, IT business strategists and government ad commercial officers. Information regarding this conference can be found @ http:/biometricconference.com

Biomertic Smart Card to replace Ration card Tamil Government has proposed to issue biometric smart cards during 2012-2013. Chief Minister Selvi J.Jayalatitha informed regarding this in the assembly on 19 August 2011. The director of census operations under national population registry was conducting Biometric Capturing of 10 fingerprints and Irises of citizens to issue Unique Identification numbers. On completion of this process it was proposed to adapt the data for issue of Biometric Smart Family cards.

CONCLUSION Technology is growing rapidly, but at the same time security breaches and transaction frauds are also in the increase world over. All agencies including Libraries who are in need of security, surveillance and safety have to adopt biometrics. “THE FUTURE DEPENDS ON WHAT WE DO IN THE PRESENT” -MAHATMA GANDHI Let us hope for a safe and secure future!

THANK YOU