28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.

Slides:



Advertisements
Similar presentations
HiPath SIcurity Card Manager Smartcard Management and Personalization System Sales Presentation.
Advertisements

For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
NexSentry Imaging Solutions
Mobile phone based real time solution to track completed / in progress work The programme officer initiates the work by capturing the site image, GPS.
Digital Certificate Installation & User Guide For Class-2 Certificates.
RFID Access Control System March, 2003 Softrónica.
Card and Reader Overview Gerald Smith Sr. Consultant ID Technology Partners.
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Lecture 6 User Authentication (cont)
Digital Certificate Installation & User Guide For Class-2 Certificates.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Review of Patents Agenda Item 3: Report of the New Technologies Working Group.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
STI, Part of Al Falasi Group UAE
European Electronic Identity Practices Country Update of …………… Speaker: Date:
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Department of Labor HSPD-12
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
PIV Data Model Testing Ketan Mehta March 3, 2006.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
National Smartcard Project Work Package 8 – Security Issues Report.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Chapter 10: Authentication Guide to Computer Network Security.
Secure Electronic Transaction (SET)
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Special Publication : Interfaces for Personal Identity Verification Jim Dray NIST NPIVP Workshop March 3, 2006.
New Technologies and Travel Documents ICAO 12 th Meeting of the Facilitation Division Cairo March 23, 2004.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Module 9: Fundamentals of Securing Network Communication.
Symbol Technologies Security Forum - Airline Security
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
DIGITAL SIGNATURE.
THE MALAYSIAN ELECTRONIC PASSPORT
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
Technical Devices for Security Management Kathryn Hockman COSC 481.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Challenge/Response Authentication
Ketan Mehta March 3, 2006 PIV Data Model Testing Ketan Mehta March 3, 2006.
THE MALAYSIAN ELECTRONIC PASSPORT
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
PCI-DSS Security Awareness
Challenge/Response Authentication
Authentication.
New Technologies and Travel Documents
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
State of e-Authentication in Higher Education Bernie Gleason
Welcome To Money pad November 23, 2018 Sample footer.
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
A Framework of Remote Biometric Authentication on the Open Network
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Presentation transcript:

28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida

28 th International Traffic Records Forum Document- holder Document Data Identification Technology Authentication Domains Verification of all three elements X

28 th International Traffic Records Forum General Principles Document Authentication Is this a genuine document? Addressed by anti-counterfeit technologies Was it issued legitimately Unique personalization security Authenicatable data

28 th International Traffic Records Forum General Principles Data Authentication Has data been altered? Classical card security techniques Tamper evident features Authenticatable data

28 th International Traffic Records Forum General Principles Data Authentication – Machine-readable data Digital signatures/certificates Encryption Not covered, but not simple Reliance upon machine authentication requires high level of system control over data protection Encryption Keys

28 th International Traffic Records Forum Data - Logical Security Highest security: chip-based Smart Card PKI implementation Crypto-processor cards +Increase security of off-line transaction +Increase privacy +Reduce paperwork +Reduce the probability of: Data alteration Data substitution –Increased card & reader costs

28 th International Traffic Records Forum General Principles Cardholder Authentication Biometrics preferable

28 th International Traffic Records Forum General Principles Reader Authentication (Who authenticates the authenticator?) Real device or, A device to capture document, document holder information Authentication requires logic within document Cryptographic authentication best, but requires key infrastructure

28 th International Traffic Records Forum Enrollment Capture Processing Client Access Control Card Issuance Identification System Server(s) HOST(S) CENTRAL SERVER ARRAYS RDBMS Network Management Communication Network Point-of-Use Verification CARD READER & PROCESSING APPLICATION TELEPHONE Identification System – Key Components

28 th International Traffic Records Forum Smart Card Alliance – White Paper Smart Cards and Biometrics in Privacy- Sensitive Secure Identification Systems” “Smart Cards and Biometrics in Privacy- Sensitive Secure Identification Systems”

28 th International Traffic Records Forum MatrixID Platform Identification Card Applications: ICAO Travel Documents State / National Drivers License National ID Corporate ID

28 th International Traffic Records Forum Range of Data Input Formats Text Digitized Images Facial Signature/usual Mark Fingerprint Image Biometric Templates Fingerprint, Facial, Iris, Hand Geometry

28 th International Traffic Records Forum Output Options Data Structure - accommodates range of formats, including: Visual Information (Visual Inspection Zone) OCR-B (Machine Readable Zone) 2-D Barcodes High density Magnetic Stripe Smart Cards (Contact and Non-Contact)

28 th International Traffic Records Forum MatrixID Interfaces Designed for distributed system environments: Interface to Cryptographic facility Digital signatures Secure IC loading XML Data Structure Local Document Issuance Remote Document Issuance

28 th International Traffic Records Forum Enrollment Screen

28 th International Traffic Records Forum Verification

28 th International Traffic Records Forum

After the card is read, the MatrixID display shows the following: 1. The date/ time and method used to verify the cardholder. 2. The date the card was issued and the Issuing Authority. 3. That the document passes the integrity checks built into the MatrixID Data Structure 4. The card holder’s photo, signature and fingerprint image. 5. The MatrixID will prompt the cardholder to verify their identity by comparing a live scan with the stored image.

28 th International Traffic Records Forum This page depicts the case where the presented fingerprints do not match. The cardholder is not validated.

28 th International Traffic Records Forum This page depicts the ca This page depicts the case where the presented fingerprints match and the cardholder is validated. rd matches the presenter and the cardholder identity is validated.

28 th International Traffic Records Forum Better technology not sufficient without strategy Balance Risk, Privacy, Personal Convenience… And Cost

28 th International Traffic Records Forum Technology Changes New Paradigms to create Transparent Trust Dynamically updateable ID Negotiated disclosure Virtual handshake

28 th International Traffic Records Forum THANK YOU Tate Preston