2003 1 Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Aloaha protects Mobile M2M Communication with secureSIM.
Ramanuj Banerjee Director Technical Consultancy. ActivCard, Inc. Headquartered in Fremont, CA Headquartered in Fremont, CA Over 12 years of experience.
Department of Labor HSPD-12
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Introduction to Fingerprint Biometrics By Tamar Bar.
FIT3105 Smart card based authentication and identity management Lecture 4.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
“Electronic Payment System”
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Information Security for Managers (Master MIS)
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Secure Electronic Transaction (SET)
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Internet Security for Small & Medium Business Week 6
How can the SMART card help in new channels?
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
Biometrics Authentication Technology
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Access Control / Authenticity Michael Sheppard 11/10/10.
ITU K ALEIDOSCOPE 2013 October 18, 2012 G RIFFIN – A PRIL 2013 IEEE Global Communications 2015 Conference IoTAAL Workshop - Sunday, December 6, 2015 Security.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Electronic Banking & Security Electronic Banking & Security.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
ESign Aashutosh.
Authentication.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Lecture 4 - Cryptography
Faculty of Science IT Department Lecturer: Raz Dara MA.
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics

I will talk about... Precise Biometrics (very brief) Biometrics..? Smart Card & Smart ID Card Fingerprint matching on card ”Increased Security, while protecting Privacy? True or False?

This is Precise Biometrics World leading security solutions based on fingerprint Holds world’s first patent within “Match-on-Card” Founded in 1997 in Lund, Sweden Offices in Lund (40), Stockholm (2) and Washington DC (6) Listed on the Stockholm Stock Exchange O-list since 2000

What we do We create fingerprint-based security solutions for companies, organizations, authorities and private individuals that replaces PIN:s, passwords and keys.

Biometrics....?

Trends that fuel the need for biometrics Market trends: –Globalization –Mobility and flexibility –Digitalization Technology enablers: –Internet –Wireless –e-business and smart cards All driving a cumbersome growth of PIN-codes and passwords

Problems Concern that sensitive data is accessed by unauthorized users e-business without trust – who’s at the other end of the Internet? Passwords, PIN-codes, keys, etc are a hassle => security is often cheated, or upheld at high admin cost

Solutions Confidentiality – encryption Authentication – digital certificates Non-repudiation – digital signatures Convenience + personal security – biometrics Digital identity management, smart cards and biometrics enables security and convenience by making the digital identity personal

Why biometrics? Uniquely linked to a person, who is present Secure and convenient –“No more passwords” (or “Post-It” stickers…) –Convenient = it will be used –Cannot be borrowed, stolen or forgotten Saves money –Less fraud –Less cost for password administration

What is biometrics?

Market share by technology

What biometrics, and how ? Surveillance vs. Access to a service Identification vs. Authentication 1-to-many vs. 1-to-1 Enrollment & Verification Fingerprint Image vs. Biometric Template Traditional Feature (Minutia) Matching More advanced pattern or hybrid matching Match-on-Server, Match-on-PC or Match-on Card Security or Privacy or Both ?!

What is Smart Card ?

Smart Cards - A small computer and a crytographic token Contains and handles sensitive data transactions / e-cash / identity / health profiles secret codes and keys biometric templates Performs cryptographic computations for authentication / digital signatures confidentiality by encryption key management protocols biometric match-on-card

Smart ID Card = Smart Card + ID Card Johnson, Jane Marie Social Security NumberDate of Birth JAN09 Issue DateExpiration Date 1999SEP032003SEP01 Pay GradeGeneva Conv. Cat. LTCOLVI Rank A1 Geneva Conventions Identification Card Active Duty U.S. Navy DMDC

Privacy or Security

Factors affecting privacy in ID systems Amount of data Sensitivity of data Low High Very High Privacy concerns

Unique security solutions PIN, Password Something You Know Solutions Relative Security Level Something You Have + Something You Know + Something You Are + Something You Have + Something You Know + Something You Have + Something You Are + Biometric ID Card + Something You Have Key or Card

Fingerprint matching on card

Match-On-Card technology Fingerprint matching on smart cards and SIM / WIM cards Brings biometrics and PKI together Make digital signatures and encryption of e- mails or documents more secure and convenient Makes it possible to replace PIN:s with fingerprints and to store and match the fingerprint on a smart card instead of a less secure computer

PKI & Fingerprint Match On Card Secure INTERNET PKI with PIN-codes PKI with Biometrics Secure INTERNET

Match-On-Card CaptureEnrollment Verification PC Hard Drive Network Server Smart Card Reference Storage UNSECURE Not Scalable

Match-On-Card Verification PC Hard Drive Network Server UNSECURE Not Scalable Smart Card Matching to reference template Reference template is exposed during verificationReference template is exposed during verification Card independentCard independent Sensor independentSensor independent Compatible with DoD Common Access CardCompatible with DoD Common Access Card Available for Java Card and MultosAvailable for Java Card and Multos Reference Storage Best practices require template to be encrypted and signedBest practices require template to be encrypted and signed —Secret shared by all workstations

Why Match-on-Card? Scalability The matching is performed locally on the card – the system scalability doesn’t have any limit – the matching is fast and independent of open networks Security Two factor authentication – demanding both a valid smart card, where fragments of your fingerprint are securely stored – and your fingerprint Privacy The template never leaves the secure environment – it cannot be copied or stolen – the privacy issue is radically resolved

How it works Match-on-Card™

Privacy and Security !

Thank you! Increased Security, while protecting Privacy ? True !