Biometrics = Proof of Identity? consistently accurate, continuously reliable, completely compatible. This information is strictly for use by Ideco and.

Slides:



Advertisements
Similar presentations
For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
Advertisements

© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
BIOMETRIC VOTING SYSTEM
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Biometrics Overview. Biometrics Identification or verification of an individual based on a physical characteristic or trait.
XProtect® Expert 2013 Product presentation
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Morpho Introduction  40 years of focused world-class experience  World’s largest install base  Most industries & toughest environments  Consistently.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
PIV Data Model Testing Ketan Mehta March 3, 2006.
Introduction to Fingerprint Biometrics By Tamar Bar.
FIT3105 Biometric based authentication and identity management
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Biometrics and Authentication Shivani Kirubanandan.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Equipment Equipment for preventing unauthorised access to data & information.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Chapter 10: Authentication Guide to Computer Network Security.
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
·
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Advanced Secure Technologies Secure Document Technologies.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
THE MALAYSIAN ELECTRONIC PASSPORT
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
Implementing and Managing Azure Multi-factor Authentication
THE MALAYSIAN ELECTRONIC PASSPORT
Authentication.
Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain
FACE RECOGNITION TECHNOLOGY
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
BOMGAR REMOTE SUPPORT Karl Lankford
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Azure Multi-Factor Authentication (MFA)
Presentation transcript:

Biometrics = Proof of Identity? consistently accurate, continuously reliable, completely compatible. This information is strictly for use by Ideco and its Associates. Reproduction and distribution is strictly prohibited. Copyright Ideco Group Ltd.

An Identity Crises?

CIPC Bank Accounts Identity Trust Scale ID Validation Marital Status Credentials Credit Accounts Employment Biometric Verification Identity Certification Qualification Vehicles Property

Bridging the Identity Gap RecognitionRecognitionResponseResponse Tentative Definitive Reactive Proactive Identity Gap Cards PINs Passwords

Building Identity Chains /11/12 10:30400 Application login: User authenticated succesfully., Internet Explorer\Connect to , ({8159E1B8-245E-4932-BB9B /11/12 10:31204Profile,Cache,v3,0mssmitd /11/12 10:31405 Declare opened, Login, /11/12 10:31401 Account add, Login, /11/12 10:31203Profile,Save,16mssmitd /11/12 10:31203Profile,Save,v4smitd /11/12 10:31400 Application login: User authenticated succesfully., \Login, ({3ED482E /11/12 10:31400 Application login: User authenticated succesfully., \Login, ({3ED482E C3A-AC }) Who? When? Where? What?

Agenda Biometric 101 Next generation applications DHA & National Identity Solutions Key success factors An integrated approach Chain of evidence

The Practice of Biometrics Fingerprint Retina Iris Facial Vein Voice Hand geometry Body odour Tongue

International dependence on fingerprint for forensics ICAO – 3 approved technologies (Fingerprint, Face & Iris) SA Law only accepts Fingerprint, Face & Signature 10 fingers per person means high enrolment probability compared to other techniques Biometric Technology Options

Technology Life Cycle

Technology Adoption

The practice of Biometrics

Unique features in a fingerprint pattern area True minutia points Ridge ends Ridge splits Average 80 minutia per finger

True minutia points?

Injury Foreign object Moisture Dirt Working with Fingerprints Treated

Filtering process Extracting True Minutia Binarisation and skeletonisation

Minutiae Comparison and Fusion Enrolment templateTransaction template

False minutia or missing minutia Distorsion Scale adaptation / rotation Different overlapping Minutia Comparison and Fusion Matching threshold configurable

F1 m F2 f F3 c Real World Scenarios

Identification vs Verification

Automated Fingerprint Identification System Real-time classification, segmentation, feature extraction and quality assurance Comparison against some or all references in the enrolment database, producing a comparison score for each transaction Ensure one unique identity profile per customer Back ground de-duplication process Assist in the reduction of fraud and risk Be able to positively identify a person Valid digital signature Full audit of identity trail Interoperability between other entities Integrity in database

Evolution of Identity Control Changes in the Market Place

DHA SmartID & OFV Changes in the Market Place

Online Fingerprint Verification Live Demo

Advancement in Biometric Applications Multi-functional Terminals Asset & infrastructure PCs & IT

Advancement in Biometric Equipment

GreenBox Multifunction input device Enables paperless transaction Document process automation Integrated FICA/RICA station Fast system integration Small desktop footprint No storage of paper records USB Powered

MobiCheck Fully configurable Multiple input fields / devices Online ID checks against NCCI Verification or identification Records on secure cloud servers Business rule driven Identity based transactions Secure online access to records

World Leading Biometric Solutions Compliancy (FBI, NIST) Interoperability AccuracySecurity with True Fake Finger Detection – FFD CapacityMatching Speed Failure to enrolErgonomic Design Integration & Multiple application Local support A world class Biometric Solution

An Integrated Approach Direct integration to business systems Aligned with current business processes AFIS functionality scalable to business requirements All development tools and integration support Windows, Linux and Android support Fully compliant to industry standards Best in class at affordable pricing Full maintenance and support program        

A viable business case

Critical Success Factors FTE, FAR, Speed, db Size Image and / or Template Protecting customer identities Comply to International standards Compatible to civil systems Expert use in court of law Clear growth path       

Some risks to consider

Risk of false acceptance ± 20% false minutia added

Risk of non-compliance Image Capturing Image Filtering Minutiae Extraction Template Store Biometric Server FIPS201 & ISO/IEC Image Store WSQ Gray-scale image compression ISO/IEC ANSI 378 & ISO FBI IQS App. F&G PIV (HSPD-12) ISO Part1 ISO ANSI Morpho ISO/IEC for On-card biometric comparison”

Risk of chromatic aberration

Risk of inferior algorithms Failure to Enrol (FTE) <0.1% False Acceptance Rate (FAR) to Breach of security False Rejection Rate (FRR) Denial of access Comfort and Security –Low FRR = Comfort –Low FAR = Security –Morpho Default EER  FAR = 0.01% & FRR = 1%

Risk of inferior optics

Extent of biometrics within SA More than terminals in South Africa, 2.5 million employees primarily through a network of Certified Partners SABS SC71Q – adoption of ISO/IEC standards Market leader with certified repair centre Major projects: Pensions & social grants (> 7 million records) SAPS (PCEM Forensics & Criminal booking stations) AFISwitch – (> 7 million records - exclusive 15 year license) IJS – 5000 PC’s Secure Login DoI (All Illegal Immigrants) DrLic (> 9 million records) HANIS (>32 million records ) Certified repair centre NCCI (Integrated Identity Management)

@ your service Thank you

Benchmarking Key Success Criteria

Benchmarking

Benchmarking

Enrolment Verification Possible Architecture User Interface Layer Transaction Authorisation Central Identity Repository External Identity Verification GSM Biometric Verification Server Biometric Template Store Biometric Identification Server (AFIS) Biometric Image Store Inter Organisation DHA HANIS Biometric Store NCCI Certified Identities Identity consolidation / de- duplication Dimensioned according to performance & DB size. Images for Interbank operability Open standards for compatibility Secured Matcher server vs Template store Proprietary protocols for improved performance Online transaction based identity verification Centralised authorisation / audit Typical take on device Image and template extraction Template loaded on transaction Embedded verification Full control over quality, accuracy and security Acquirer Mobile A/C & TA

Ideco’s Value Proposition In depth understanding of Governmental IDM systems Focussed expertise in identity management solutions National database of identities (Juristic & Natural / Criminal & Commercial) Glue to various other statutory and commercial datasets Technology platform for advancing Identity Profiling A comprehensive range of “best in class” Biometric Technologies Public sector relationship, networks and lobbying National network of certified partners / Customer support network Scanning and digitisation infrastructure and processes Ongoing investment in integration and support Marketing expertise