Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - I October 17, 2005.

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

Computer Security Computer Security is defined as:
VOTER REGISTRATION AND IDENTIFICATION
The Evolution of the Trusted Traveler Concept September 2010.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Office of Research and Information Technology International Border Crossing Program Electronic Screening Transportation Border Working Group November 1,
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Paychecks and Tax Forms. Where Does My Money Go? Almost 31% of an individual’s paycheck is deducted  Taxes are the largest expense most individuals will.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Electronic Commerce Semester 1 Term 1 Lecture 22.
Driver Safety Program.  Address Safety  Achieve Accountability  Meet ORM and LPAA Requirements.
Security Controls – What Works
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
FIT3105 Biometric based authentication and identity management
SEVIS Student Exchange Visitor Information System The Final SEVIS F-1 Student Immigration Regulations Effective January 1, 2003.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics: Identity Verification in a Networked World
Your Interactive Guide to the Digital World Discovering Computers 2012.
Electronic Permitting Initiative Update Alan Doniger, Energistics CTO 2 nd Annual Standards Summit & Reception 6 November 2007 Houston, Texas.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
GOVerify Business Center. Improper Payment Initiative 2 The purpose of this order was to reduce improper payments by intensifying efforts to eliminate.
Industrial Control Security & Access Control Facilities Management UNECE International Forum on Trade Facilitation Geneva, Switzerland May
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
Massachusetts Digital Government Summit / Session - Smile You're On CameraPage 1.
Hosted by: June 23-26, 2003 New York City Copyright Security On The Go Ensuring Safe Transportation.
Hosted by: June 23-26, 2003 New York City Copyright Managing Multiple Access & Entry Points.
Customs and Border Protection (CBP) Uses of Criminal History Valerie Isbell Executive Director Passenger Systems Program Office Office of Information.
BIOMETRICS.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
1 Information Systems CS-507 Lecture Types of Controls Access Controls – Controlling who can access the system. Input Controls – Controls over how.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Biometric Technologies
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Access Control / Authenticity Michael Sheppard 11/10/10.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Access Control Jeff Wicklund Computer Security Fall 2013.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Biometrics in the Banking Industry
What Is Enterprise Computing?
Privacy of Client Data.
Summary Physical Access & Time and Attendance PC/Network Access
BIOMETRICS Libraries have begun to see the value of biometrics M. G
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Federal Agencies + Travel = Quality Control
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Welcome To Money pad November 23, 2018 Sample footer.
Privacy and Information
A SEMINAR REPORT ON BIOMETRICS
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Session 1 – Introduction to Information Security
Presentation transcript:

Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - I October 17, 2005

Outline l Types of Applications l Example Government Applications l Grouping of Applications l Plan for next few lectures

References l Course Text Book, Chapter 10 l l

Types of Applications l Identification Systems - Biometrics are increasingly integrated into large-scale systems for drivers’ licensing, surveillance, health and identity cards, and benefits issuance. - The need for singular identification and transactional verification has emerged in various public and private sector environments. l IT/Network Security - As more and more valuable information is made accessible to employees via LAN and WAN, the risks associated with unauthorized access to sensitive data grow larger. - Protecting your network with passwords is problematic, as passwords are easily compromised, lost, or inappropriately shared.

Types of Applications (Continued) l e-Commerce and Internet - Biometrics are being positioned as a solution for e- Commerce and Internet security, designed to ensure that only authorized individuals can access sensitive data or execute transactions. l Access Control - Biometrics have proven to be an effective solution for high-security access control, ensuring that only authorized individuals can access protected or secure areas. - Biometric systems require controlled and accurate enrollment processes, careful monitoring of security settings to ensure that the risk of unauthorized entry is low, and well-designed interfaces to ensure rapid acquisition and matching

Types of Applications (Concluded) l Smart Cards - Biometrics are an authentication technology; smart cards can be a storage, processing, and/or authentication technology. - In certain applications, the two technologies compete, such that an institution may deploy smart cards instead of biometrics for access control, or vice versa. - Increasingly, the two technologies are deployed in conjunction, strengthening each other’s capabilities.

Some Government Applications l Immigration and Naturalization Service's (INS) Passenger Accelerated Service System (INSPASS) - INSPASS was designed as a means to provide prompt admission for frequent travelers to the US by allowing them to bypass the personal interview/inspection part of the entry process. It uses hand geometry to verify the identity of the traveler at an automated inspection station. l CANPASS - It is the Canadian version of INSPASS, except that it uses a fingerprint biometric, rather than hand geometry, for traveler verification. The goal of CANPASS is to ease the transfer of goods and people between the US and Canada

Some Government Applications (Continued) l PORTPASS - It is another INS initiative similar to INSPASS except that people in vehicles at borders are being monitored and it uses a voice recognition biometric, instead of hand geometry. - PORTPASS is used at a US/Canadian vehicle border crossing and is planned for use at US/Mexican border crossings. - One version of PORTPASS (the Automated Permit Port) requires the vehicle to stop. It will also have a Video Inspection Service, allowing a driver to conference with an Inspector should the biometric fail. - Another version, known as the Dedicated Commuter Lane, uses a radio frequency tag affixed to the vehicle in order to obtain the biometric as the vehicle is moving.

Some Government Applications (Continued) l Federal Bureau of Prisons - The Federal Bureau of Prisons is using hand geometry units to monitor the movements of prisoners, staff, and visitors within certain Federal prisons. - Visitors must enroll upon arrival and are given a magnetic stripe card containing information that points to his/her identifying information in a central database. This card must be carried with the visitor at all times - Staff and inmates must also enroll. Staff are enrolled to reduce the possibility of mistakenly identifying them as an inmate or for positive identification in the event of a disturbance. - Prisoners are enrolled for access control to places such as the cafeteria, recreation lounges, and the hospital. The system also allows for the tracking of prisoners' movements.

Some Government Applications (Continued) l Automated Fingerprint Image Reporting and Match (AFIRM) - The fingerprints of new applicants for welfare benefits are checked against a central database of prior claimants. l Spanish National Social Security Identification Card (TASS) - The TASS program is a smart card initiative employing fingerprint technology to eliminate enrollment duplication and provide secure access to personal information upon retrieval. l The Colombian Legislature - The Colombian Legislature uses hand geometry units to confirm the identity of the members of its two assemblies immediately prior to a vote.

Some Government Applications (Concluded) l Some Other Applications - California, Colorado, Florida, and Texas Departments of Motor Vehicles, Government Accounting Office's Electronic Benefits Transfer (EBT) Task Force, FBI's Integrated Automated Fingerprint Identification System (IAFIS), National Crime Information Center 2000 (NCIC 2000) l Other Agencies - The Defense Advanced Research Projects Agency, Drug Enforcement Agency, Department of Defense, Department of Energy, Department of Public Safety, Department of State, Federal Bureau of Investigation, Federal Reserve Bank, Hill Air Force Base, the Pentagon, and the US Mint have several biometric devices with numerous users for access control applications

Grouping Biometrics Applications l Three Categories of Applications l (1) Logical Access Applications l (2) Physical Access Applications l (3) Identify or Verify the Identity of Individuals

Additional Criteria for Understanding Biometric Systems l In what manner does the user interact with the system? l Does the use claim identity before interacting with the system? l What are the applications requirements for accuracy, enrollment and response time? l Is the user motivated to comply with the biometrics systems? What sanctions are in place for misuse? l What is the value of the data or material protected by the system? l With what non-biometrics technologies do biometrics compete?

Seven Horizontal Classifications l Criminal Identification - Identify or verify the identity of a suspect or criminal l Retail ATM Point of Sale - Identify/verify individuals carrying out transactions l E-Commerce/Telephony - Identify/verify individuals carrying out remote transactions l PC/Network access - Replace passwords and PINs

Seven Horizontal Classifications (Concluded) l Physical access / Time Attendance - Verify identity of individuals entering and leaving the building l Citizen identification - Identify and verify individual entering and leaving the building l Surveillance - Verify the identity of individuals present in a given space

Biometrics Solution Matrix l How urgent is the authentication problem that biometrics are solving l What is the scope of the authentication problem that biometrics are solving l How well can biometrics solve the authentication problem? l Are biometrics the only possible authentication solution? l How receptive are users to biometrics as an authentication solution

Groups of Applications l Citizen Facing Applications - E.g., Criminal identification l Employee Facing Applications - PC/Network access, Physical access l Customer-facing applications - POS Transactions

Plan for Remaining Lectures (Tentative) l October 19, 2005: Biometrics Applications - II l October 24, 2005: Guest Lecture l October 26, 2005: Biometrics Applications - III l October 31, 2005: Privacy I l November 2, 2005: Privacy - II l November 7, 2005: Standards and Interoperability - I l November 9, 2005: Guest lecture l November 14, 2005: Standards and Interoperability - II l November 16, 2005: Secure Biometrics - I l November 21, 2005: Secure Biometrics – II l November 23, 2005: Review for Finals l November 28, 2005: Misc. Topics, Review for Finals