AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.

Slides:



Advertisements
Similar presentations
© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
Advertisements

Janice Kephart Director of National Security Policy, Center for Immigration Studies Heritage Foundation July 14, 2009.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Tuesday, 29 April 2014 Ministry Of Interior MOI In addition to traditional peace keeping and civil defense duties, the Saudi Arabian Ministry Of Interior.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
By: Monika Achury and Shuchita Singh
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
FIT3105 Biometric based authentication and identity management
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Identity Cards: Strategy, Implementation & Challenges A Melodrama in Three Parts Simon Davies Director, Privacy International Visiting Fellow, London School.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Chapter 10: Authentication Guide to Computer Network Security.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Identity verification in the private sector Chris Gration 30 March 2006.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
Page 1 Bernard C. Bailey President and CEO 07 September 2005.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
DIGITAL SIGNATURE.
THE MALAYSIAN ELECTRONIC PASSPORT
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Intelligence Reform: The Process Begins National Association for Public Health Statistics and Information Systems June 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain the UIDAI Eco-system Interpret the benefits of Aadhaar.
Unit 32 – Networked Systems Security
Module 1 Version:1.3_ Release date:
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Biometrics in the Banking Industry
The Solution SSIVS.
THE MALAYSIAN ELECTRONIC PASSPORT
Smart Data infrastructure
ESign Aashutosh.
Authentication.
Summary Physical Access & Time and Attendance PC/Network Access
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Biometrics.
Legal Framework for Civil Registration, Vital Statistics
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
E-identities (and e-signatures)
Introduction to key terms and concepts of legal identity
RECORDING AND DOCUMENTING IMMIGRATION CONTROLS
Presentation transcript:

AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries and organizations. The discussion has been: What and which profile is behind from these threats? How can we reduce and minimize the risks from those threats? How can we prevent those threats and be proactive in our actions? How is technology dealing with those threats? How can we take advantage from technology to reduce risks? The world has changed! Since the end of the cold war the menaces know come from different directions and from knew ways. Globalization in its all dimensions (cultural, financial, trade, information) is unbalancing our lifes. My presentation is the outcome, at this moment, of our experience on field projects regarding the usage of technology and information systems to enhance Security Rui Ribeiro Pereira AFCEA PORTUGAL Capítulo 226 Madrid 5th June 2009

Global Challenges Globalization Terrorism Cultural Financial Trade Information …. Terrorism Enable Information Sharing Across Boundaries Protection of Infrastructures Mass Migration Flows Provide better service to citizens I think there is no doubt in this room the world has changed! The globalization has narrowed the world but also brought along with it new challenges and new threats creating a world with different speeds of economical and cultural development. Today information can be accessed from any part of the world, from anybody at any place our breaking down walls and overcome borders. The threats against countries sovereignty and its people are coming today from terrorism and the challenge is how to prevent such actions. Terrorism as put us another challenge: a challenge of cooperation enabling Information and sharing it across country boundaries. The different regional economical development speeds created mass migrations flows of people looking for new opportunities, and sometimes for an opportunity of survival. Citizens are looking for better services from its Governments there is new challenge to improving Public Administration.

Automated Fingertip Identification System Global Answers Real Time Identity Verification Document Authentication Electronic Passports National Identity Cards Centralized Biometric Data Bases Centralized Event Data Bases Government intelligence and law Enforcement information interoperability World globalization implies more people mobility and a need for more VISA Control Implementation of Frequent Travel Programs Automatic document authentication for secure borders (“watch lists”) Monitoring, record and mass migration flows More Efficiency, Effectiveness in CITIZEN AUTHENTICATION Centralized Biometric Data Bases Interoperabilility Between agencies and institutions Regarding these challenges there are already some answers: The Electronic Passports to control monitor univocally each person in mass migration and visa issuing National Identity Cards to provide a better service from Governments to citizens Centralized Biometric Data Bases and Centralized Event Data Bases for sharing information across countries and agencies to increase countries security Government intelligence and law Enforcement information interoperability to analyze patterns of behavior World globalization implies more people mobility and a need for more VISA Control Implementation of Frequent Travel Programs to credentialing good citizens Automatic document authentication for secure borders (“watch lists”) to prevent identification fraud Monitoring, record and mass migration flows for security reason More Efficiency, Effectiveness in CITIZEN AUTHENTICATION making sure that you are who you claim to be Efficiency, Effectiveness in Identity Verification and Documental Authentication AFIS Automated Fingertip Identification System Increase Security, Reduce Threats, Minimize Risk

WHAT IS THE REAL PROBLEM? What is behind? What problem are we trying to solve?

World Questions Should I grant this individual with a credential? Has for this individual already been issued a credential? Is this person authorized to access the information? Is this person authorized to access the building Is this person authorized to access to this service? Has this person the privilege to access these citizen rights? If we take a look at the challenges we have been trying to answer these questions arise: Should I grant this individual with a credential? With National ID card? Is he trustful? Has for this individual already been issued a credential? Is he faking multiple Identities? Is this person authorized to access the information? How are we verifying its identity and authenticate is documents? Is this person authorized to access the building? Is this person authorized to access to this service? Has this person the privilege to access this citizen rights? Is he in a “watch list” database? And has granted authorizations and access privileges?

How Do I know Who You Are? Did You Know : The nineteen 9/11 hijackers had a total of 63 valid driver licenses There are approximately 5 million identity thefts yearly in US 7 million victims of credit card fraud only in US People do not protect their credentials Methods based on credentials, passwords and Identities based on external reference number are not currently adequate. Another question crucial question is: How Do I know Who You Are? Or do you claim to be? Did You Know : The nineteen, 9/11 hijackers had a total of 63 valid driver licenses There are approximately 5 million identity thefts yearly in US There are 7 million victims of credit card fraud only in US People do not protect their credentials The Conclusion is: Methods based on credentials (ID documents), passwords and Identities based on external reference number is not currently adequated anymore!

Types Identification Fraud Changing Identity How? Assume someone else’s Identity Faking Multiple Identities How? As we have seen there are 2 different types of ID fraud: Changing identity, assuming other persons’ identity forging and using credential as their own such as: passport, id card, drivers license (like the 9/11 hijackers), military card, property registration… Or Faking multiples identities changing their look and producing different cards for several different names Issuing Several Documents

Biometric Recognition Personal recognition based on: Who you are What you Know (PIN Card) What you have (ID Card) IS NOT ENOUGH !!!!!..... We need a more powerful tool: Biometrics! Biometric Recognition - recognition of a person by his own characteristics and then link that body to an external trustful established identity Biometric Credentialing – documents with univocally identifiable, i.e., documents linked to the individual unique characteristics (biometric) We have seen that Personal recognition based on Who you are; What you Know (PIN Card), What you have (ID Card) it is simply not enough! We have to search for other answers adding technology to Personal Recognition We need a more powerful tool: Biometrics! Combined and mixed with Personal Recognition model. We need: Biometric Recognition – which is the recognition of a person by his own characteristics and linked that body and to an external trustful established identity We need also, Biometric Credentialing – which are documents linked to a unique individual through its own characteristics (biometric)

Biographical Identity 3 Elements of Identity Biometric Identity Fingertips, voice, facial structure, DNA profile, hand geometry, heat radiation, etc… Attributed Identity Full name, date and place of birth, parents’ names and addresses, etc… Biographical Identity (Life Events) Registration of birth, details of education/qualifications, electoral register entries, details of benefits claims, taxes paid, employment history, registrations marriage, property ownership, mortgage account information, insurance policies, history of interaction with organizations (banks creditors, utilities, …) Biometric Identity – Attributes that are unique to an individual Identity Attributes – Components of a person that are given at birth Biographical Identity – Build up of the identity over time, life events that cover how an identity , a person interacts with the society But a good Identity Management System has to deal with the 3 elements of Identity: Biometric Identity – Attributes that are unique to an individual Examples; Fingertips, voice, facial structure, DNA profile, hand geometry, heat radiation, etc… Identity Attributes – Components of a person that are given at birth and remain unchanged during lifetime Examples; Full name, date and place of birth, parents’ names and addresses, etc… Biographical Identity – Are life events of a person interaction with the society Examples; Registration of birth, details of education/qualifications, electoral register entries, details of benefits claims, taxes paid, employment history, registrations marriage, property ownership, mortgage account information, insurance policies, history of interaction with organizations (banks creditors, utilities, …)

Identity Challenges Challenges Is the applicant presenting “authentic” documents? Does the document belong to the applicant? Real Time identity verification with external party databases? Solutions Enable officers to check and file proofing documents Verify if applicants exist in the database Verify identity biometric features Ensure accurate data collection at the front end External DB: Documents Watchlists Document Identity The front end identity challenges are: Is the applicant presenting “authentic” documents? Does the document belong to the applicant? Real Time identity verification with external party databases? And the Solutions are: Enabling officers to check and file proofing documents Verifying if applicants exist in the database Verifying identity biometric features Ensuring accurate data collection at the front end Documents Authentication Identity Verification Identity Analyses Security Management

Identity Management System Requirements One Person One Identity One Document Establishing a trusted identity Prevent document fraud Easy identity verification Establishing a reliable identity authentication Provide convenient access to services Prevent misuse Reduce identity management costs Avoid identity theft The requirements for an Identity Management Systems are to manage in a integrated way the: Establishing of a trusted identity Prevention of document fraud Easy identity verification Establishing a reliable identity authentication Provide convenient access to services Prevent misuse Reduce identity management costs Avoid identity theft To manage all this we have to have an AFIS - Automatic Fingertip Identification System and ABIS - Automatic Biometric Identification System as the backbone of an IDMS AFIS ABIS Automated Finguerprinter Identification System Automated Biometric Identification System

ROI Identity Technology Biometrics Fingerprint scan Hand geometry Retina scan Iris scan Facial recognition Voice recognition Signature recognition Access cards Magnetic swipe cards Proximity cards Smart cards Keypad entry systems Access barriers (turnstiles/revolving doors) Accurate Cost Speed Ease to Use Robustness Security Privacy ROI There are several technoligies available in the market Biometric Access Cards Keypads Access Barriers The good system is the combination of these tech that make and ID Autentication Management Systems The answer are soltion that manage id life complete life cycle The biometry is the identity technology used in now days. And good IDMS has to connect and link to several and different biometric technologies in order to create a “strong” identity for any individual…for authentication a verification purposes. … and of course in costs matter…. there is biometric technology more costly than other…for example the iris is more expensive (for the moment) more enduring and more accurate than fingertips….

Identity Lifecycle Proofing Identity Usage Lifecycle Enrollment Identity verification: document, live capture and source database information Proofing Enrollment Digital capture and storage of multiple pieces of data, images and biometrics Identity Lifecycle Usage Verification of identities Usage Enrollment Issuance And good IDMS has also to manage the identity life cycle: Proofing Identity verification: where document are live capture and the information read sourced in a external database Enrollment : Is the collection and digital capture and storage of multiple pieces of biometrics data Issuance: Is the phase of production ID credentials Usage: Is the ID verification using e ways of biometric authentication or through credentialing (like e-passports) Issuance Production of tamper-proof ID credentials

HOW CAN TODAY TECHNOLOGY HELP? We have seen that biometric technology as the ability to help? But how can we use it in a integrated way that we may to manage identity?

ID Management Systems Solution Biometric Attributes Fingertips, voice, facial structure, DNA profile, hand geometry, heat radiation, etc… External Identity DB FBI, Interpol, Intelligence, Law Enforcement, Forensic Analyses… Identity Management Systems Credentialling Criminal Record, National Id Card, Immigration, Property, Drivers License,… The Identity Management Systems have to integrate and manage: Biometric Attributes – to create a unique identity Credentialing – for producing authenticate documents Business Process - to manage the identity lifecycle and customer requirements External Identity DB – for sharing information with other organizations A thus we have a system that is suitable for any market requirements and purposes. Business Process Proofing, Enrollment, Issuence, Usage… Confidential © 2007 Sinfic All rights reserved.

Credential and Biometric Interoperable Platform Identity Life Cicle Drivers License Mortgage Account Identity Passport ID Proofing Taxes Biographical Data Full Name Date and Place of Birth Parents Name Biometric Data Fingertip Face Signature Iris Biometric Identity and Credential Interoperability Platform ID Enrollment National ID Card ID Credentialing Issuance Social Security Card The Identity Management Systems are also build in Interoperable Biometric Platform that allows to manage: Several biometric technologies independently Different types Identity verification and document authentication Produce and manage several credentials for different purposes Electoral Register Entries ID Credencialling Usage ID Authentication ID Verification Marriage Register Health care Benefits

One Person, One Identity, One Document Identity and Credential Interoperability Center Biometric Attributes Fingertips, voice, facial structure, DNA profile, hand geometry, heat radiation, etc… External Identity DB FBI, Interpol, Intelligence, Law Enforcement, Forensic Analyses… Efficiency, Effectiveness in Identity Verification and Documental Authentication Mortgage Account Identity Management Systems Credentialling Criminal Record, National Id Card, Immigration, Property, Drivers License,… Drivers Licence Business Process Proofing, Enrollment, Issuance, Usage… This way IDMS can: Reduce Implementation and development COSTS Choose the best and most suitable biometric technology for a certain purpose and also to combine it into an identity Be more Efficient, Effective in Identity Verification and Documental Authentication National ID Card Passport Electoral Register Entries Taxes Paid Marriage Register Health care Benefits Social Security Card

Summary Biometric Technology is not the panacea for the global threats Technology Cannot Compensate for Human Failure or Ineffective Security Processes The Capabilities of Security Technologies Can Be Overestimated The Use of Several Security Technologies Continues to Generate Concerns about their Potential Violation of Expectations of Privacy Biometric Technology is not the panacea for the global threats as we have learned from past experiences…but can help us reducing fraud and increasing access security Technology Cannot Compensate for Human Failure or Ineffective Security Processes The Capabilities of Security Technologies Can Be Overestimated The Use of Several Security Technologies Continues to Generate Concerns about their Potential Violation of Expectations of Privacy…but we still have to balance between what we want to protect and our privacy

Summary An Identity Management Systems has to be able to manage the 3 elements of the ID: Biometric Identity Identity Attributes Biographical Identity (Events) … and also able to manage: The identity lifecycle Linked to external databases Usage of access cards Connected to access “barriers” Video streaming from surveillance cameras An Identity Management Systems has to be able to manage the 3 elements of the ID: Biometric Identity Identity Attributes Biographical Identity (Events) … and also able to manage: The identity lifecycle Linked to external databases Usage of credentials Connected to access “barriers” Video streaming from surveillance cameras

Summary Identity Management Systems have algorithms for Identity: Biometric data quality control Real-time searches Duplicate analyses AFIS ABIS Biometric data quality control to provide the usage and interoparabilyt to other departments or extenal users Real-time searches with godd perfoemences for identity verification, for example law enforcements and building security Duplicate analyses Identity Management Systems have to have algorithms for Identity: Biometric data quality control Real-time searches Automated Finguerprinter Identification System Automated Biometric Identification System

Are You Who You Claim To Be? Summary Identity Management Systems Can Enhance Security: Enabling information sharing Database Integration among agencies and organizations Law Enforcement Intelligence Agencies Border Crossing Homeland Departments Provide Intelligence to counter terrorism Monitoring mass migration flows Identity Management Systems gives answers to the questions: Who are you? Where you able to go? What are you entitled to do? Are You Who You Claim To Be? Identity Management Systems Can Enhance Security: Enabling information sharing Database Integration among agencies and organizations Law Enforcement Intelligence Agencies Border Crossing Homeland Departments Provide Intelligence to counter terrorism Monitoring mass migration flows Identity Management Systems gives answers to the questions: Who are you? Where you able to go? What are you entitled to do? Or Are You Who You Claim To Be? Finally I only would like to mention that this work is based on our field experience in IDMS project , where we are building and developing a database with 50 million of biometric and identity records and giving the citizens with 8 million cards for voting purposes with fingertip crypt inside the card for identification at the electoral process. Thank You Very Much for your attention! “For terrorists, travel documents are as important as weapons” Source: 9/11 Commission Report