Biometric transaction confirmation with ComBiom.

Slides:



Advertisements
Similar presentations
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Advertisements

                      Digital Audio 1.
PHONEXIA Can I have it in writing?. Discuss and share your answers to the following questions: 1.When you have English lessons listening to spoken English,
By: Travis Walton.  Podcast- a series of digital media files (either audio or video) that are released episodically and often downloaded through web.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
Web Resources Andrew Corallino Feb. 3, 2009 Andrew Corallino Feb. 3, 2009.
Thwarting Attacks Dr. Pushkin Kachroo. Introduction Biometrics can help convenience and security Might remove or strengthen some weak points but get new.
: is a web site, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or.
Make a phone call and use CALL Ben McMurry
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Karthiknathan Srinivasan Sanchit Aggarwal
Web 2.0: Concepts and Applications 3 Syndicating Content.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
IPNexus Briefing Instant Messaging and Collaboration.
Basic Computer Technology Online Education Solutions© (773)
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
CLEAR 2003 Annual Conference Toronto, Ontario Technology, Service, and Delivery Stephen Greenfield Product Services Manager.
Creating Multimedia Interaction with Windows Media Technologies 7.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Customer Dr. Beigi, Recognition Tech., Inc Hugh Eng, DPS ‘16 Dr. Tappert, CSIS Vinnie Monaco, PhD’15 Smartphone/Laptop Security Acceptability/Ease-of-Use.
Login on Laptop, Server or Internet Platform: The user will get a display on his screen of a randomized series of figures. He will subsequently.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
Publishing Adobe Opportunities 2007 Grants.gov System Grantor December 20, 2007.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
By: Sambit Pulak XI-IB. Authenticity means establishing a user ’ s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Live Meeting Overview Proclaim. Proclaim Login Proclaim Portal URL: Username: xxxxxx Password: xxxxxx.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Computer Basics SystemsViruses Alternative Input Speech.
Physical security By Ola Abd el-latif Abbass Hassan.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
Login on Laptop, Server or Internet Platform: The user will get a display on his screen of a randomized series of figures. He will subsequently speak.
Computer Applications I I dentify alternative input devices and techniques.
Input Devices. Input devices allow us to enter data into the computer system –Mouse –Keyboard –Graphics Tablet –TrackPad –Touch-sensitive screen - Scanner.
This is the software we will use to load our html page up to the server. You can download a copy for home if you want to.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Information Systems Design and Development Security Precautions Computing Science.
© University of Reading 2006www.reading.ac. uk 18 June 2016 Streaming and Podcasting Laura Bennetto and Guy Pursey.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
IT Vocabulary Basics Review Sit at tables. Need pencil/pen.
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
CSCE 522 Identification and Authentication
A device tat transfers data from the outside world into a computer
CSCE 522 Identification and Authentication
HARDWARE The hardware is the part you can see the computer, ie all components of their physical structure. The screen, keyboard, and mouse tower of the.
The OSI Model and the TCP/IP Protocol Suite
Authentication.
Technology Literacy Hardware.
Point of Sale Sell by UPC, vendor code or unlimited UPC code with case price  Search by description or sub-department  Multiple discount method 
                      Digital Audio 1.
` Roku Com Link Roku site: For more information about website
The OSI Model and the TCP/IP Protocol Suite
The Computer Work Stations
Adobe Connect: Web Conferencing, Collaboration, and Teaching Online
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
The OSI Model and the TCP/IP Protocol Suite
Internet and Community Resources
The OSI Model and the TCP/IP Protocol Suite
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Chapter 10 Video.
Management Application for all segments
The OSI Model and the TCP/IP Protocol Suite
COEN 351 Authentication.
HOW TO PLACE MY ORDER ?.
Presentation transcript:

Biometric transaction confirmation with ComBiom

Start Login to server (sso ComBiom) Random challenge (4 x digits 2708) Response (4 x digits 2708) Transaction incl. modification trojan Content calculation = 4 digits Biometric Transaction Confirmation Different digits = refuse transaction Use Checksum, or different Procedure Alternating the different procedures 2708 2708 2500 00 Checksum of 40 633452 0 = 27 Checksum of 2500,00 = 07 ComBiom digits: 07 27 ComBiom digits: 07 27 0727 0727 Transfer Confirmed + Stop

Multimodal, Simultaneous Biometrics, with Random, Challenge Response

Face Lips Voice Word Password 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 Login on Laptop, Server or Internet Platform: The user will get a display on his screen of a randomized series of figures. He will subsequently speak the figures. The resulting templates are compared with reference and access is granted on match. Enrolment Procedure: User will be asked to speak all figures from 1,2,3, … 0. As usual WebCam records and software establishes reference templates for all figures Technology: ComBiom is using Biometric Face, Voice, Lip Movement and Word Recognition Simultaneously. WebCam records video and audio, our software transforms in small biometric data files (templates)