What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.

Slides:



Advertisements
Similar presentations
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Advertisements

Beach Park Schools Beach Park, Illinois Introduces.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Introduction to Fingerprint Biometrics By Tamar Bar.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Marjie Rodrigues
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
“Fingerprint Recognition based on Silicon Chips”.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
1 Information Systems CS-507 Lecture Types of Controls Access Controls – Controlling who can access the system. Input Controls – Controls over how.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Challenge/Response Authentication
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
BSC Biometric Security System
Biometrics.
Margaret Brown 3rd period October 14, 2007
BSC Biometric Security System
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
BY: Michael Etse and Maverick Fermill
Ones Technology Products & Solutions
Presentation transcript:

What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies are becoming the foundation of highly secure identification solutions. –Examples of biometric technologies include fingerprint, face, retinal, and iris recognition. Why the fingerprint 1 ? –Fingerprinting is the oldest & most mature biometric science. –Fingerprint technology provides the most cost effective biometric solution on the market. 1 M2SYS Biometrics

How Biometrics Works Enrollment process –During student enrollment, the software extracts a unique fingerprint pattern from the scanned image. This data is referred to as the Biometric Identity Template. –The unique fingerprint pattern is made up of minutiae points. The orientation of these points within the pattern is what differentiates one fingerprint from another. Meal Service –As students pass through the lunch line, their scanned finger is recognized by the biometric identification system to access their meal account.

Biometric Privacy Concerns What are the real risks? –Essentially, there are no real risks. –The M2Sys solution does not store an image of the student/adult fingerprint. –The captured data is secured using a 128-bit encryption scheme. –It is impossible to recreate a fingerprint image. What are the perceived risks? –Parents or guardians may object to having their child “fingerprinted” relating to privacy infringement. –Parents may be concerned that the biometric ID can be stolen or shared with other authorities. –Parents may create a public relations issue for the district if not given an option for an alternative method of identification with the POS system.

Things to consider: –15 seconds to enroll a student/adult (240 people/hour). –Enroll students in batches – similar to school pictures. Be sure to communicate the enrollment plan to all faculty. –Have alphabetized printouts of all students & adults (and their ID #s) at each enrollment location. –Instructing each student on how to properly place their finger on the reader will cause some delay. –All students should use the same finger (index finger) when enrolling. –Provide an alternative method of identification for the students whose parents do not want their fingerprint scanned. (Pinpads, Barcode scanners, Name Search, etc.) Biometric Enrollment

Integrating Biometrics at the Serving Lines –Identifying students can take anywhere from 1-5 seconds (depending upon quality of print). Identifying Elementary students may take a few seconds longer compared to Middle/High school students. Biometrics is not a faster method to identify students. –Computer Speakers at the Serving Line are highly recommended for positive/negative read feedback. –Student Pictures can be incorporated for additional identification –Misidentification at the Serving Line is almost non-existent due to the sensitive nature of the Biometric reader. –Dry, coarse hands are very difficult to identify. Some fingers may never be able to be read. Biometric Identification

Community acceptance –Notification to families should be communicated early. Media coverage? Network connection not required while serving breakfast/lunch –If network connectivity is lost, system still operates stand alone. A very small percentage of prints may not be able to be enrolled There is room for human error during enrollment process Enrollment can be time consuming –An enrollment schedule needs to be created and communicated to coincide with roll out of system. Miscellaneous Information

System Requirements –Windows ® 2000 (Hamster Only), XP –512 MB Ram or greater –1.2 GHz CPU or greater Network Requirements –Windows Domain User Authentication –Hard-wired Connection Technical Specifications

Sample Notification Letter to Parents Page 2Page 1

Any Questions?