Intelligent Access Control System Based On User behavior youtube.com/watch?v=W3rJVaBky9Y CIVABIS Matjaž Gams Boštjan Kaluža, Erik Dovgan.. +10 Jožef Stefan.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

A Study on Assistive Methods for the Visually Impaired BIOMETRIC ACCESSIBILITY Brian Stanton.
Introduction to IRRIIS testing platform IRRIIS MIT Conference ROME 8 February 2007 Claudio Balducelli.
BioSENSE I introduction
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
ZKAccess3.5 Introduction
NEDAP AEOS Security Scenarios. © Vitani A/S, 2007 Vitani primary business area Non-propritary, customized and scalable security systems Integrated systems.
Detection of Deviant Behavior From Agent Traces Boštjan Kaluža Department of Intelligent Systems, Jožef Stefan Institute Jozef Stefan Institute Jožef Stefan.
Enterprise Software Solution Lab Pvt Ltd
Access Control ( Software ) June 25, 2010 Created by Castaly / Andy Chen.
ZKTeco”pull”Access Control Function Introduction
PRESENTED BY : DUA RAZA CLASS IX. FINGERPRINT IDENTIFICATION Among all the biometric techniques, fingerprint- based identification is the oldest method.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
CM-707 Standalone Fingerprint Access Control System CM -707 is biometrics fingerprint recognition standalone access control system.It can store up to 800,1500.
Base Protection Lab (BPL) December 12, 2007 ONR Program Officer: William “Kip” Krebs, , Alternate POC: Annetta Burger.
SRX-Pro Server VMS Software Review. VMS Software Reviews Installing new analog cameras onto the system Installing new IP cameras onto the system Set cameras’
SG EUROPEAN PHARMACEUTICAL PRICING NERVE CENTRE. ABOUT SIGYN R&D Sigyn R&D is a Croatian company based in Zagreb, established in Tailor made software.
FIT3105 Smart card based authentication and identity management Lecture 4.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
Company Overview 1/2 Controllers Overview Software Readers References.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
ECG INTEGRATION QRS Universal ECG – InPS Vision Intelligent Integration QRS Universal ECG.
A Framework for Detection of Anomalous and Suspicious Behavior from Agent’s Spatio-Temporal Traces Boštjan Kaluža Depratment of Intelligent Systems, Jožef.
Access Control Solution Seamless Video Integration GV Series IP Cam GV Series Access Control Controller GeoFinger Series Single Door 4 Doors Elevator Coming.
May, Agenda  What is SAMS Pro?  Features of SAMS  What can SAMS do?( Based on data and control flow )  Register card  Monitoring event 
Hospital Asset Tracking
Use Case Description Hospital Asset Tracking. Introduce the scenario – This scenario prototypes tracking valuable assets leaving the hospital building.
ICP Architecture: Execution and Control Bostjan Kaluza, Damjan Kuznar, Erik Dovgan, Jernej Zupancic, and Matjaz Gams Jozef Stefan Institute, Slovenia.
SoMac Software All about Access Control & Attendance
Discovery of Cellular Automata Rules Using Cases Ken-ichi Maeda Chiaki Sakama Wakayama University Discovery Science 2003, Oct.17.
Behavior analysis based on coordinates of body tags Mitja Luštrek, Boštjan Kaluža, Erik Dovgan, Bogdan Pogorelc, Matjaž Gams Jožef Stefan Institute, Department.
E-Turist: Intelligent electronic tourist guide Mitja Luštrek, Boštjan Kaluža, Božidara Cvetković, Hristijan Gjoreski Department of Intelligent Systems,
Software Aspects of PQ in a DG Context By Dr. Siri Varadan.
Implementing and Integrating AI Systems. What Is Implementation? Implementation can be defined as getting a newly developed or significantly changed system.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
1.The Nature, Impact and Issues of Information Technology 1.6Strategies used to Prevent Deliberate and Accidental Illegal Actions.
Academic and pedagogical options in CIM laboratory CIM in universities.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
IPower: An Energy Conservation System for Intelligent Buildings International Journal of Sensor Networks Yu-Chee Tseng, You-Chiun Wang, and Lun- Wu Yeh.
1. In industrialized nations, up to 30 percent suffer from food contamination In the US, 76 million people suffer and 5,000 die annually from food contamination.
Dan Fakulteta elektrotehnike i računarstva Sveučilišta u Zagrebu, 25. studenoga Conclusion 3. ISEMIC application 2. Goal of the project Intelligent.
Biometric for Network Security. Finger Biometrics.
Lesson 4-Access Control Solution
Inheritance of Automata Classes Using Dynamic Programming Languages (Using Ruby as an Example) Kirill Timofeev
©Spectra Technovision (India) Pvt. Ltd.
A Blackboard-Based Learning Intrusion Detection System: A New Approach
A service of the U.S. National Institutes of Health Module 2: Searching and Interpreting Results Posted on ClinicalTrials.gov.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
Access Control Hardware IXP20TOUCH System Controllers iTRT Door Controller 125kHz Antenna Readers FINGKEY Access Plus I mpro provide a wide.
Resilient Technologies
CREATED BY THE JOINT INTELLIGENCE UNIT. CRIME PREVENTION TIPS GOAL To make security companies and business owners aware of some safety tips and crime.
Vehicle Management System Adopted successfully with I.D., wireless Vehicle Management Systems (VMS) for Parking, Residential Societies.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Flame & Smoke Detection System Flame & Smoke Vision Detection is an intelligent vision-based analytics system which can timely detect suspicious fire or.
GraphiCon 2008 | 1 Trajectory classification based on Hidden Markov Models Jozef Mlích and Petr Chmelař Brno University of Technology, Faculty of Information.
enterprise Software Solutions Lab Pvt Ltd
SmartCatch Systems Putting Intelligence into Surveillance
COSEC ARC IP based Access Control Panel.
BioLock (Biometric Home Entry System)
Security module SB-DN-SEC250K.
City Police Departments and Santa Barbara Sheriff
Confidence: Ubiquitous Care System to Support Independent Living
Engineering Agent Systems for Decision Support
Security companies: processors Personnel training Confidentiality
Security of Data  
Matjaž Gams Jozef Stefan Institute, Slovenia
01 SIP Door Entry 01 Push Button Access Solution.
Exit Management Module
X7– Fingerprint Access Control terminal
Presentation transcript:

Intelligent Access Control System Based On User behavior youtube.com/watch?v=W3rJVaBky9Y CIVABIS Matjaž Gams Boštjan Kaluža, Erik Dovgan Jožef Stefan institute, Slovenia

Presentation Motivation Experimental environment Entry events Architecture Modules Integration Verification Discussion

Motivation (security project) Terrorist attacks – bypass sensors Malitious employee – drunk, angry... intercept unusual events based on intelligent experience 2 people entering, one registered employee “afraid”

Experimental environment Door sensor Card reader Fingerprint reader Camera

Entry event 1)Card identification 2)Fingerprint verification 3)Door opens 4)Door closes Unusual behavior ̴ 10 additional scenarios in advance Bomb attack – only door opens A terrorist steals a card and a finger

Architecture

Access sensors and Time&Space software Card reader Fingerprint reader Door sensor Time&Space controller Intelligent system Camera Camera module Videos TCP/IP ODBC

Module 1: Expert system A set of ̴ 10 predefined types of rules Verifies if the events are “legal” None of user behavior learning is used Examples of generic rules: 1)alarm / warning if event between time1 and time2 2)alarm / warning if more than N events in time 3)alarm / warning if no exit before time 4)alarm / warning if no exit in time

Module 2: Micro learning Learns user behavior on micro level – micro timing Algorithm: Local outlier factor Classification and explanation

Module 3: Macro learning Learns user behavior on macro level – macro timing / classification and explanation

Module 3: Vision Learns user behavior from video

Integration Regular eventAlarm event Main thread Expert systemMicro learningMacro learningCamera Displaying final result

Explanation

Measurements Our tests with our employees Our “simulated” tests with our employees Joint tests by security experts perform several of them

“Simulated” Measurements Tested modules: Expert rules, micro learning and macro learning Create regular accesses: Five people, each 40 learn and 10 test accesses – Create irregular accesses: Fake-identity experiment – generate entries with identification card of another person

Measurements - results okwarningalarm rules100%0% micro98%2%0% macro90%10%0% together88%12%0% okwarningalarm rules100%0% micro36%15%50% macro14%25%62% together13%18%69% Statistic for regular accesses Statistic for irregular accesses Ok – 88% of regular accesses Alarm – 69% of irregular accesses

Conclusion Designed and tested an original ambient- inteligence system for entry control based on user behavior It integrates arbitrary (currently four) independent modules and sensors Significant increase in security Patent pending, real-life application