Brent Kennedy.  Overview  Security Issues  Usability Issues  Bring it all together  Discussion.

Slides:



Advertisements
Similar presentations
Tool Mark Analysis Mrs. Ashley.
Advertisements

Computer Parts There are many parts that work together to make a computer work.
Pinch Pots Fabergé Eggs
Brian Stanton, Mary Theofanos, Shahram Orandi, Ross Micheals, Nien-Fan Zhang These tests were performed for the Department of Homeland Security in accordance.
 What is MOLDING? (Not biology).  What is Casting?
Chapter 7 Other Requirements Good Fast Cheap Pick any two. 1CS John Cole.
Biometrics and Usability The User and Biometric System Uncertainty Mary Theofanos International Workshop on Usability and Biometrics June , 2008.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
What Is A Computer System?
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Biometrics and Authentication Shivani Kirubanandan.
Your Interactive Guide to the Digital World Discovering Computers 2012.
CPR. Course Goal Course Goal The American Heart Association designed the Heartsaver AED Course to prepare a wide variety of people who, as first responders.
How Fossils Form How fossils show that life on Earth has changed.
BornholmsTrafikken April 2004 Peter Havskov Christensen, M.Sc.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Authentication Approaches over Internet Jia Li
The Impact of Physical Security on Network Security
INPUT DEVICES. KEYBOARD Most common input device for a computer.
COMPUTER PARTS There are many parts that work together to make a computer work.
BIOMETRICS IN RETAIL Ben McDaniel Paul Acken Wesley McAhren.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Usability Research: Unexpected Results. Overview User feedback and user performance Unexpected results in research/usability Small scale research accuracy.
Fingerprinting. Fingerprints Fingerprints are created because of the friction ridges (epidermal ridges) on our fingers. The friction ridges increase surface.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Biometrics and Usability Influence of Height and Angle on Fingerprint Collections Charles Sheppard.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Guard Sets for Onion Routing JOSHUA FREE. Tor Most popular low-latency distributed anonymity network Controversial decisions of guard selection strategies.
PRESENTATION ON BIOMETRICS
Biometric for Network Security. Finger Biometrics.
Throwin’ Caution Masking Tape Throwin’ Caution Position graphic exactly where you want it on surface using tape, make sure to tape The middle section securely.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Computer Parts There are many parts that work together to make a computer work.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Fingerprints. Fingerprinting System of identification based on the classification of finger ridge patterns System of identification based on the classification.
Taking Steps to a Suspect.  For years, fingerprints have been used to determine identity.  Recently, footprints have been discovered to be an equally.
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Tribology Andy Lin Engr 540x Tribology Friction and Wear of Silicon Nitride Exposed to Moisture at High Temperatures.
Computer Applications I I dentify alternative input devices and techniques.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
PoC Learnings Jai Bannur. PoC Goals Capture biometrics of rural Indians Capture biometrics of rural Indians – Assess the best biometric quality and accuracy.
Fingerprinting.
Fingerprint Analysis What is a Fingerprint? Orangutan A fingerprint is the impression left upon any surface with which the finger comes in contact under.
3D Password.
Computer Parts There are many parts that work together to make a computer work.
Introduction to Computers
A device tat transfers data from the outside world into a computer
Part 1: Classroom Rules and Concepts
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
Computer Parts There are many parts that work together to make a computer work.
Introduction to QR Codes
Computer Parts There are many parts that work together to make a computer work.
Computer Parts There are many parts that work together to make a computer work.
Troubleshooting Steps for HP LaserJet Pro Scanner Error 22.
Computer Parts There are four main equipment functions of a computer system: Input, Processing, Storage and Output. Input: the transferring of information.
How Fossils Form How fossils show that life on Earth has changed
Biometric technology.
Detecting and Lifting Prints
How the Biometrics Works
Computer Parts There are four main equipment functions of a computer system: Input, Processing, Storage and Output. Input: the transferring of information.
Tribology Friction and Wear of Silicon Nitride Exposed to Moisture at High Temperatures.
Computer Parts There are many parts that work together to make a computer work.
Computer Parts There are many parts that work together to make a computer work.
Ch 14 Fingerprints part 2.
Computer Parts There are many parts that work together to make a computer work.
Computer Parts There are many parts that work together to make a computer work.
A system for automatic animation of piano performances
Presentation transcript:

Brent Kennedy

 Overview  Security Issues  Usability Issues  Bring it all together  Discussion

 Sequence of ridges and valleys  No two fingerprints can be exactly the same  Even two imprints from the same finger are different  Reliable and efficient biometric  Still are cons  Scanners work by imaging the print and using an algorithm to compare images

 Storage  How are the fingerprints stored?  Who can access them?  Privacy  Can fingerprints lead to more information?  Device  Is it susceptible to over the shoulder peeks?  Does it leave a trace?  Can it be spoofed?

>

 Small experiment done at W&J College  January 2006  Aimed to spoof fingerprints using common household items  Total Cost: $12.82  Cast:  Play-Doh  Gummy bears  Model Magic  Silly Putty  Modeling clay  Tac N’ Stik  Mold:  Paraffin wax

 Devices  Microsoft Fingerprint Reader  APC Biometric Security device

 What failed…  One-step method of taking a print directly from the source (no cast)  Gummy bears: Myth busted! ▪ Wouldn’t even hold a fingerprint  Tac N’ Stik worked too well ▪ Picked up old prints from the scanner  Silly putty stuck to the device  Play-Doh was too soft to withstand pressure

 Success!  Very soft piece of wax flattened against hard surface  Press the finger to be molded for 5 minutes  Transfer wax to freezer for minutes  Firmly press modeling material into cast  Press against the fingerprint reader  Replicated several times

 Modified approach on the APC device  Requires less pressure so Play-Doh can be used  Form the Play-Doh around the scanner surface  Then place the flat surface in the cast  More patience required to get authorized  After time, the mold becomes too soft to use

 Caveats  Molding material becomes firm and brittle quickly ▪ Hard to make a cast ahead of time  Very high quality mold is required ▪ Attacker may need more advanced materials  All molds were of the thumb ▪ Smaller prints may cause additional problems

 The main usability factors for fingerprints:  Scanner height/angle  Training conditions  Age  Habituation  Supervision

 Height/Angle  Efficiency (time) not significantly affected by height or angle  Quality significantly affected by height but not angle ▪ Still hard to determine optimal height  Overall satisfaction affected by height, angle, and user height

 Age  age range gave consistent good prints  Prints get worse as age increases  Men overall better than women  Habituation  No trend to print quality over time  Users didn’t know how to fix bad prints

 Training/Supervision  Poster had worst success rate: 56%  Verbal vs. video instruction had equal success  Assistance significantly increased success rate ▪ 78% without assistance ▪ 98% with assistance

 Can better usability solve the spoofing problem?  It can help  Smaller scanning area  Slap vs. roll  Better algorithms with better feedback