Biometrics 6.857 6.857, Computer & Network Security 1 Basics Warnings Fingerprint Example 1 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometric Authentication: technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. 2 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric Authentication: technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. voice facial patterns irises typing patterns gait photo 3 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 4 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 5 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 6 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 7 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 8 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 9 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 10 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 11 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 12 6.857
Biometrics But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 13 6.857
Biometrics But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 14 6.857
Biometrics But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 15 6.857
lossy image compression Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice lossy image compression facial patterns irises typing patterns gait photo 16 6.857
lossy image compression Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice lossy image compression facial patterns irises typing patterns gait photo 100101010110010001010101… 17 6.857
Biometrics But databases make it interesting… Connecticut DMV 6.857, Computer & Network Security Basics Warnings Fingerprint Example Connecticut DMV hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 18 6.857
Biometrics But databases make it interesting… Connecticut DMV 6.857, Computer & Network Security Basics Warnings Fingerprint Example Connecticut DMV hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 19 6.857
Biometrics But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice facial patterns irises typing patterns gait photo 20 6.857
Biometrics ? = But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice = ? facial patterns irises typing patterns gait photo 21 6.857
Biometrics ? = But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice = ? facial patterns irises typing patterns gait photo 22 6.857
Biometrics 6.857 6.857, Computer & Network Security 23 Basics Warnings Fingerprint Example 23 6.857
Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! 24 6.857
Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! You brazenly trot your face, eyes, hands, fingerprints, gait, and signature out in public on a daily basis. (unless you are a hermit) 25 6.857
Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password 26 6.857
Biometrics Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access 27 6.857
Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access Faxing a signed consent form to tell me password over phone 28 6.857
Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access Faxing a signed consent form to tell me password over phone Problem with Connecticut DMV 29 6.857
Biometrics Biometrics are UIDs 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs 30 6.857
Very useful with trusted path from subject to verifier… Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… 31 6.857
Biometrics Biometrics are UIDs 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… requires (probably) human observation… 32 6.857
Biometrics Biometrics are UIDs 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… requires (probably) human observation… no longer very automated. Oh well. 33 6.857
Case Study: Fingerprint Authentication Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Case Study: Fingerprint Authentication 34 6.857
Biometrics 6.857 6.857, Computer & Network Security 35 Basics Warnings Fingerprint Example 35 6.857
Biometrics capture 6.857 6.857, Computer & Network Security 36 Basics Warnings Fingerprint Example capture 36 6.857
Biometrics capture optical 6.857 6.857, Computer & Network Security 37 Basics Warnings Fingerprint Example capture optical 37 6.857
Biometrics capture capacitive 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture capacitive 38 6.857
Biometrics capture ultrasonic 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture ultrasonic 39 6.857
Biometrics capture “Live and Well” Sanity Check 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture “Live and Well” Sanity Check 40 6.857
Biometrics capture feature extraction 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction 41 6.857
Biometrics capture feature extraction Pattern matching 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction Pattern matching * Keep (oriented) image 42 6.857
Biometrics capture feature extraction or Minutia vectors 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction (type, x, y, θ, W) … or Minutia vectors 43 6.857
Biometrics capture feature extraction or Minutia vectors bifurcation 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction (type, x, y, θ, W) … or Minutia vectors bifurcation ridge ending short ridge 44 6.857
Biometrics capture feature extraction compare or 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … or 45 6.857
Biometrics capture feature extraction compare or Pattern matching 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … or Pattern matching 46 6.857
Biometrics capture feature extraction compare or Vector comparison 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … (type, x, y, θ, W) … or Vector comparison * e.g., 7-20 out of 10-100 are close. 47 6.857
Biometrics capture feature extraction compare result or 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … result or 48 6.857
Biometrics Enrollment capture feature extraction or 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example Enrollment capture feature extraction (type, x, y, θ, W) … or 49 6.857
Risk Analysis (from Matsumoto Paper) Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger Other stuff (hack the software, blind the sensor, walk in behind someone else, kick in the door…) 50 6.857
Risk Analysis (from Matsumoto Paper) Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger Other stuff (hack the software, blind the sensor, walk in behind someone else, kick in the door…) 51 6.857
Risk Analysis (from Matsumoto Paper) Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, “Impact of Artificial ‘Gummy’ Finders on Fingerprint Systems.” Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV. 52 6.857
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, “Impact of Artificial ‘Gummy’ Finders on Fingerprint Systems.” Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV. Slides from Matsumoto talk showing the construction of a ‘gummy finger’… 53 6.857
Biometrics Conclusion 6.857 6.857, Computer & Network Security 54 Basics Warnings Fingerprint Example Conclusion 54 6.857
Biometrics Conclusion 6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. 55 6.857
Biometrics Conclusion 6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. Hard to remember a secret random sequence of 20 digits…but easy to analyze its security. 56 6.857
Biometrics Conclusion 6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. Hard to remember a secret random sequence of 20 digits…but easy to analyze its security. Easy to stick your finger on a scanner and have it extract 20 digits worth of information…but hard to analyze its security. 57 6.857