Russ Ryan, Vice President National Biometric Security Project The Importance of Biometric Testing.

Slides:



Advertisements
Similar presentations
System Integration Verification and Validation
Advertisements

1 Assessment: Norms and Accreditation. Assessment: Norms and Accreditation-Module 11 2 Learning Objectives At the end of this module, participants will.
Systems Analysis and Design Feasibility Study. Introduction The Feasibility Study is the preliminary study that determines whether a proposed systems.
ISO 9001 : 2000.
Biometrics.
Security Controls – What Works
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Software Quality Engineering Roadmap
Biometrics and Authentication Shivani Kirubanandan.
NVLAP Overview and Accreditation Process March 2006.
Software Quality SEII-Lecture 15
Software Project Management Fifth Edition
Commercial Database Applications Testing. Test Plan Testing Strategy Testing Planning Testing Design (covered in other modules) Unit Testing (covered.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Model Bank Testing Accelerators “Ready-to-use” test scenarios to reduce effort, time and money.
Outsoursing in Banks. Traditional Reasons for Outsourcing.
Data Administration & Database Administration
Information Systems Security Computer System Life Cycle Security.
PowerPoint Presentation by Charlie Cook Gordon Walker McGraw-Hill/Irwin Copyright © 2004 McGraw Hill Companies, Inc. All rights reserved. Chapter 7 Partnering.
1 Software Quality CIS 375 Bruce R. Maxim UM-Dearborn.
What is a life cycle model? Framework under which a software product is going to be developed. – Defines the phases that the product under development.
A2LA IT Program Update 2008 Assessor Conclave. A2LA IT Accreditation Scope - Any aspect of a hardware and or software environment that is under test Scope.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
This chapter is extracted from Sommerville’s slides. Text book chapter
OpenSG Conformity IPRM Overview July 20, ITCA goals under the IPRM at a high level and in outline form these include: Organize the Test and Certification.
© Mahindra Satyam 2009 Decision Analysis and Resolution QMS Training.
Other Quality Attributes Other Important Quality attributes Variability: a special form of modifiability. The ability of a system and its supporting artifacts.
Together.Today.Tomorrow. The BLUES Project Karen C. Fox, PhD Chief Executive Officer.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Software Methods Mö/ slide 1 Methods and Techniques of Software Quality Management ICEL Quality Management Systems: Methods and Techniques of Software.
Assessing the influence on processes when evolving the software architecture By Larsson S, Wall A, Wallin P Parul Patel.
1 Russ Ryan National Biometric Security Project Presentation SM03: Biometrics & Access Control.
1 Chapter 1 Introduction to Databases Transparencies.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
1 Recommendations Now that 40 GbE has been adopted as part of the 802.3ba Task Force, there is a need to consider inter-switch links applications at 40.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
1 Software Testing Strategies: Approaches, Issues, Testing Tools.
1 Object-Oriented Analysis and Design with the Unified Process Figure 13-1 Implementation discipline activities.
Requirements Management with Use Cases Module 2: Introduction to RMUC Requirements Management with Use Cases Module 2: Introduction to RMUC.
1 IEEE interim, Orlando, Florida, March, 2008new-nfinn-fast-chains-rings-par5c-0308-v1 Fast Recovery for Chains and Rings Proposal for PAR and 5.
Systems Development Lifecycle
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 9 CH 8 ISO MEASUREMENT, ANALYSIS AND IMPROVEMENT INTERNAL AUDITS.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
1 Acquisition Automation – Challenges and Pitfalls Breakout Session # E11 Name: Jim Hargrove and Allen Edgar Date: Tuesday, July 31, 2012 Time: 2:30 pm-3:45.
Technology Services – National Institute of Standards and Technology Conformity Assessment ANSI-HSSP Workshop Emergency Communications December 2, 2004.
Dec. 6, 2010 Gum-Ho Choe Accreditation of Software Testing Working Group, APLAC Technical Committee.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Royal Scientific Society Eng. Nael Almulki. Royal Scientific Society FunctionsAbout RSS RSS was established in 1970 as an independent, not-for- profit.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
ISO Certification Consultancy Information regarding various International management systems and certification consultancy offered by Punyam Management.
IS YOUR ORGANISATION’S INFORMATION SECURE?
An assessment framework for Intrusion Prevention System (IPS)
System Design and Modeling
Multimodal Biometric Security
Service Organization Control (SOC)
Deploying CIM to Bridge the Modeling Gap Between Operations and Planning Mike usa.siemens.com/digitalgrid unrestricted © Siemens AG 2017.
UNIT II.
Chapter 13 Quality Management
METHODS FOR ANALYZING AND SUPPORTING A SUSTAINABLE PRODUCTION SYSTEM
ISO/IEC Systems and software Quality Requirements and Evaluation
COMPONENT BASED SYSTEMS: A CLASSIFICATION OF ISSUES
Implementation Business Case
Presentation transcript:

Russ Ryan, Vice President National Biometric Security Project The Importance of Biometric Testing

 Biometrics for National Security (BiNS)  National Signatures Project  National Energy Technology Lab (NETL)  NIST  International Organization for Migration (IOM)  Office of Presidential Affairs (UAE)  International Labour Organization (ILO)  BioAPI Consortium  State of West Virginia NBSP National Biometric Security Project National Biometric Security Project

Biometric Applications Biometric Applications HSPD-24 GAO ?  Robust biometric passports  Financial and medical services authorizations  Border and travel services  Drivers’ licenses  Physical and Logical access

 Increasing reliance on biometrics to secure access, transactions & identity  Equally increasing demand for accurate, unbiased evaluations  Testing can provide accurate metrics on how the technology will perform in the real world  Alleviating unfounded concerns about operational performance Understanding Biometric Performance Understanding Biometric Performance

 Universal  Unique  Permanence  Collectable  Performance  Acceptance  Spoof Resistance Attributes of an Ideal Biometric Attributes of an Ideal Biometric

Biometric Testing Today Biometric Testing Today  Performance of biometric systems is a function of:  strength of the underlying biometric.  quality and information content of the input  configuration and architecture of the system  the relationship of accuracy and throughput  error rates, the nature of failures and their cost, and system vulnerabilities which contribute to an overall assessment of system performance  Increasingly, biometric devices are components of larger systems imposing external variables that impact biometric system performance in the field

Biometric Testing Today Biometric Testing Today  Three major considerations in testing biometric products  dependence of measured error rates on the application  need for a large test population  necessity for a time delay between enrollment and testing

Comparison of Testing Types Comparison of Testing Types  Technology Testing  Goal: Produce a repeatable and scalable assessment of an algorithm/sensor using offline data processing  Scenario Testing  Goal: Determine overall system performance (both algorithmic & human factors performance measures)  Operational Testing  Goal: Determine biometric system performance in a specific environment with a specific target population * Best Practices in Testing and Reporting Performance of Biometric Devices, by A. J. Mansfield, National Physical Laboratory and J. L. Wayman, San Jose State University. Published 2002 by The Centre for Mathematics and Scientific Computing,National Physical Laboratory, Queens Road, 88, Middlesex, England.

Technology Testing Technology Testing  Understand/compare software techniques used to acquire, process and compare biometric data  Main focus is on the pattern matching technique used to compare biometric data  Evaluates different classification and matching methods on efficiency, speed and performance  Offline processing of data carried out in laboratory  Evaluation compares competing algorithms  from a single type of technology  carried out on a standardized database  collected by a universal sensor  results determine the relative effectiveness of the tested algorithms

Scenario Testing Scenario Testing  Evaluates performance across biometric devices  Each system has its own acquisition sensor and receives different data inputs than those tested in technology (algorithm) evaluation  Data collected for all tested systems must come from same environment and same population  Test results are only considered repeatable under identical control variables & environment Scenario evaluation helps an end user decide which biometric device has the potential to work best for his/her needs

Operational Testing Operational Testing  Determine performance of a biometric system in a real application environment  Population and environment are not controlled  System vulnerability can also be performed Helps determine how system as a whole will perform by testing a live system in its native environment for its intended application

Conformance Testing Conformance Testing  Determines conformance with relevant published ISO/IEC standards  Utilizes conformance test suites designed for specific standards  Evaluations will expand to include additional standards as the software modules are written and field tested Standards Evaluated Target Value INCITS Pass/Fail INCITS Pass/Fail ISO Pass/Fail INCITS Pass/Fail INCITS Pass/Fail INCITS Pass/Fail ISO Pass/Fail INCITS Pass/Fail INCITS Pass/Fail ILO SIDPass/Fail ICAO LDS 1.7Pass/Fail BioAPIPass/Fail

Vulnerability Testing Vulnerability Testing  Impersonation attempts (disguises) or spoofing (artifact substitution for live feature)  Database attacks (exchanging or corrupting references)  Tampering with threshold settings  Network-based attacks Product “vulnerabilities” must be defined in the context of the operating environment and proper usage within the design parameters of the product

Interoperability Testing Interoperability Testing  Multi-modal systems demand acceleration of biometric interoperability  Interoperability testing assesses  ability to exchange and use information on a single system in a multi-modal environment  interface of the biometric component with the holistic security program

Interoperability Trade-offs… Interoperability Trade-offs… Lowers complexity of the application - Re-use - Future Proofing - Vendor independence - Upgrade path - Simplifies CM - Simplified integration -Product optimization - Better performance -Lower level control - More sophistication -Can be faster to market (due to standards development time) May incur additional overhead - May not be able to take advantage of vendor unique capabilities - Interfaces are generic and consensus based, so may not be optimized for a particular use -Custom interfaces for each proprietary product to be interfaced - Increased cost/complexity - Added CM - Product changes affect application - Can result in vendor dependence Standard Proprietary Advantages Disadvantages Courtesy of Cathy Tilton, VP Standards & Technology, Daon

Usability Testing Usability Testing  Intuitiveness of the system interface with the user community  Is the transaction an inviting and positive experience?  Is consistent instruction and feedback built into the process?  Is the performance reliable for operational staff as well as users?

Qualified Product List Testing Qualified Product List Testing  First initiated and commercialized by NBSP  Utilizes comprehensive scenario test capability  Initially used to identify products that successfully passed common performance thresholds  Increasingly tailored to the application

QPL Testing Benefits QPL Testing Benefits  Catalog of commercially available products that meets minimum standards for a specific application  Significant reduction in duplicative pilot tests  Acceleration of acquisition process by identifying a field of suitable products  Opportunity for vendors’ to demonstrate general or specified performance capabilities

Factors Affecting Biometric Performance Factors Affecting Biometric Performance  Variations in:  biometric pattern  the way users present the biometric  the way the sensor reads the biometric  System scalability  the transmission process (including noise introduced by compression & expansion)  User acceptance/application- specific limitations

Additional Measurement Parameters Additional Measurement Parameters  Reliability, availability, scalability, maintainability  Security, including vulnerability to spoofing  Human factors, including user acceptance  Cost/benefit in comparison to existing security processes and systems  Privacy regulation compliance

Laboratory Certification Laboratory Certification  BSI awarded ISO/IEC Accreditation  specifies requirements for competency to conduct biometric tests  covers testing performed using standard methods, non- standard methods and laboratory-developed method  laboratory customers, regulatory authorities and accreditation bodies use it to confirm the competency of laboratories.  NIST  NIST Handbook with technical requirements and guidance for accreditation of laboratories under the NVLAP Biometrics Testing program released Sept. 2009

Russ Ryan, The Importance of Biometric Testing