Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Slides:



Advertisements
Similar presentations
Penetration Testing Biometric System
Advertisements

GCSE ICT Networks & Security..
2014/6/2 Giga-Tms 1 The latest Biometric Technology.
Working with the Internet
Copyright © Anviz Global Inc. USA Anviz Online Training Lesson 9 Anviz International Technical Support Team Facepass Pro.
ICT at Work Banking and Finance.
Department of Labor HSPD-12
General Management Information Team
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
By: Monika Achury and Shuchita Singh
Biometric Devices/standards/technology. Outline: Overview Overview Biometric market growth Biometric market growth Architecture of a Fingerprint Identification.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
LP 400. General Issues faced by Business Organizations:  Attendance Proxy through “buddy punching”  Errors when computing time  Cost of paper time.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Fire Officer Strategy and Tactics (FOST) State Certification Practical Examination PART “A” May 2009.
ET3100 BioFlex TimeClock. What is fingerprint scanning?  It is a pattern acquisition and recognition established on a person’s.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
FACTS Management Business Solutions For Catholic Schools.
Computing Fundamentals Module A Unit 2: Using Windows Vista LessonTopic 8Looking at Operating Systems 9Looking at the Windows Desktop 10Starting Application.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Chapter 5 Input By: Matthew D McCoog What Is Input? Any data or instructions entered into the memory of a computer.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
1.Overview 2. Hardware 3. Software Interface 4. Triggering 5. Installation 6. Configuring.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
1 OPOL Training (OrderPro Online) Prepared by Christina Van Metre Independent Educational Consultant CTO, Business Development Team © Training Version.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Symbol Technologies Security Forum - Airline Security
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
Biometrics Authentication Technology
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
© 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential VeriFace 3.6 disclosure a software makes.
Biometrics.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
AL A. LAURIO Teacher Microsoft Windows Vista. DESKTOP is the main screen area that you see after you turn on your computer and log on to Windows. it serves.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Module 2 Short Including preparation for ECDL testing.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Electronic Banking & Security Electronic Banking & Security.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Enterprise Software Solutions Lab Pvt Ltd X990 – Fingerprint Time Attendance with Access Control terminal.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
enterprise Software Solutions Lab Pvt Ltd
Biometric Time & Attendance Solutions + Access Control
A device tat transfers data from the outside world into a computer
Module 2 Short Managing files continued.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Information on Types of Electronic Banking
GSBS IT Resources and Security
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
X7– Fingerprint Access Control terminal
Presentation transcript:

Confidential Iris Authenticati on System Optics and Digital System

Confidential R&D TeamWork Optics, Camera Module Application, System Solutions IRIS System Algorithm 1

Confidential Protection Function on PC 1. Lon on Only the authorized person can turn on PC (Log on) - No access except Iris Identification 4. Screen saver 5. Internet on/off 2. File lock 3. Folder lock Internet connection or disconnection by ‘Icon’ click Only the authorized person can go into ‘work station’ - No access except Iris Identification Only the authorized person can lock or unlock ‘File’ - No access except Iris Identification - Locked file can not be copied, moved and deleted Only the authorized person can lock or unlock ‘Folder’ - No access except Iris Identification - Locked file can not be copied, moved and deleted 2

Confidential Iris Authentication Mouse Characteristics 1. Users : 10 Persons (Max. number of persons could be registered in the one mouse) 2. Illumination : (Registration) 50 Lux, (Identification) 10 Lux ~ 10,000 Lux 3. Process Speed : (Registration) 8 ~15 sec., (Identification) 0.1~1.0 sec. 4. Method of Identification Process : Match-on Type. Iris Data exist only in the mouse 5. Algorithm : Embedded. Self-learning function  the more use, the better perform ⇒ None Contact Iris Identification system  durability & longevity Common mouse + Iris identification Module ⇒ Reliability, Security and Commercialization 3

Confidential 4 Biometrics comparison Iris Finger Printer FaceVoice Error Rate ~0.1 Speed0.2-1 sec.1 sec. 18 sec. ContactNoYesNo ForgeryImpossiblePossible TechnologyHighCommonUnstable Biometric Identification OURS ; FAR = 1 ÷ 2 25 (Standard level, Algebraic value in Algorithm) FRR =< 0.01% (Experience) * FAR can be adjusted according to the requested security level. ↑ On base of theory

Confidential Using the individual characteristics (Biometrics) Maximizing the convenience, safety and security Iris Identification System built-in Mouse 5 Image Capture, Analysis, Encode, Register, Storage, Comparison ⇒ Identification 【 Flow Chart 】 (IRIS) (MOUSE) (PC, Terminal) ① ② Communication Summary of Product

Confidential Customizable Application 6 Module - Portable Devices Access Control * Network / PC Login Protection * Web Site Protection * Employee Recognition * Time Attendance / Leaving Systems * Gate (Door) Access Control * Voting Solutions * Handheld Devices * Home and Office Security Systems * Debit / Credit Card Payment * Missing Child / Senior Identification * Vehicle Anti-Theft / Starting System * Weapon Operation Control * The others – Various Solutions # OEM Products / Solution Available Recognizer - Banking ; Internet, ATM - Immigration Control Mouse type - PC, Terminal

Confidential Appendix-1 Technical Characteristics “ Match-On” Type to protect the personal Iris Data Under the current data base system, the information data to differentiate a person from the others should be stored in data base of a PC as so called ‘Store-on Type’. For example, Fingerprint data should be stored in DB of the PC. The fingerprint data input from terminal should be compared with the one in the DB. However, this system still has bunch of risks to lose the personal data by illegal access like hacking. In order to protect the personal Iris Data safe, we introduced ‘Match-on’ technology in Iris Identification Mouse. All the processes to identify the iris are done only in the Mouse and the Iris Data should be stored and compared only in the mouse without being processed in the PC. The personal Iris Data could be created, compared and transacted only in the Mouse so that the Iris data would not fall out. 7

Confidential Appendix-2 Technology (Patents) Oriented for ‘Iris’ related works and holds many Patents and technologies on the Iris recognition. - Iris Identification System : Patent Register (KR, UK, DE, CN, US) Pending (JP) - Iris Health Analysis System : Patent Register (KR) - Iris Cameras and Device : Patent Register (KR) 8 Items - Iris Identification Mouse : Patent Register ( ) PCT (on Apr.06) 8

Confidential Appendix-3 Network System (ex.) Application ServerRepository Existing Methods ID / Password Cookie Official Certification Card Key But … Password Open Copy Missing Key ☞ Network system (Group ware) would be customized according to the requirements. 內部職員 統計,Reporting 私設公認機關 協力社 代理店 公認 認證機關 顧客 外部使用者

Confidential i Mouse samples 10