L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.

Slides:



Advertisements
Similar presentations
Keystroke Authentication Its All in How You Type John C. Checco, CISSP bioChec.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
BioLynx, Inc.™ Biometrics and Enrollment. Overview Biometrics Hand Geometry and templates Enrollment Command Mode.
Biometrics.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By: Navid Bahrani, Niloufar Azmi, Majid Mafi
Voice Based Autonomous Access Control Terminals HEXIUM Technical Development Co., Ltd
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Behavioral Biometrics October 10, 2005.
BIOMETRICS.
Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Seminar Presentation on Biometrics
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometrics Do you really know who is on the other side of Your connection? Individual Authentication can Be achieved utilizing stored data: Physiological Characteristics Behavioral Characteristics Physiological Characteristics Iris, Fingerprint, Facial, Hand Geometry (Static Characteristics) Behavioral Characteristics Voice Prints, Keystroke Dynamics, Handwritten Signatures (Dynamic Characteristics) UNTIL NOW ! All Biometric Measurements Require Special Hardware To Acquire Data That Computers Can Read…UNTIL NOW ! Except BIOPASSWORD® Which Deploys The Only“Software Only” Biometric Solution. See Patent #

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Physiological Characteristics Fingerprints Iris Facial Handwriting

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Behavioral Characteristics Voiceprints Keystroke Dynamics Handwriting

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Which Biometric Is Best Robustness Distinctiveness Accessibility Acceptability Availability Repeatable; No Large Changes Wide Differences In Pattern Of The Population Easily Presented To An Imaging Sensor Perceived As Non-Intrusive By The User Some Number of Independent Measures Can Be Presented By The User

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Factors Of Authentication What You Know What You Have Who You Are

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Value Chain Computer Based Security Before Keyboard Dynamics Biometric Keyboard DynamicsUsername/Password Relative Level RobustnessDistinctivenessAccessibilityAcceptabilityAvailability High Low

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Commercial Companies 1999 Automated Biometrics Behavioral Biometrics Physiological Biometrics Fingerprint – 80 Hand – 2 Eye, Iris, Retina – 3 Face – 12 Signature – 15 Voice – 32 Keystroke Dynamics – 1 (BIOPASSWORD® ) Number is the commercial companies competing in Source: Overview of Biometric Identification Technology Industry, Bowman 1999

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® “Fist of the Sender” During WWII The Army Signal Corps Identified Individual Keying Rhythm As Unique. So ‘Senders’ Could be Identified by Rhythm, Pace, and Syncopation of Taps. Reconfirmed by NSF and NBS in the 1980’s When They Determined Typing Patterns have Unique Distinctive Characteristics. “Keystroke Dynamics”

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Keystroke Dynamics Key Hold Down Time Flight Time Between Key Travel Time Dwell Time

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Keystroke Dynamics Profile Key Hold Down Time Flight Time Between Key Travel Time Dwell Time Keystroke Rhythm User Keystroke Dynamics Profile

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® BIOPASSWORD® LogOn Integration SAM DATABASE BIOPASSWORD®Profiles Password Authentication Password Verification User Algorithm Authentication User Algorithm Verification

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Common Measurements Failure To Enroll Rate (FTR) FalseAcceptance Rate (FAR) FalseRejection Rate (FRR) Equal Error Rate (ERR) Ability of the Biometric To Enroll a Biometric User The Rate an Imposter Could Be Verified or Identified The Rate a Legitimate User Is Rejected Cross Over Point When FRR = FAR

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Test Results NBS – National Bureau of Standards SRI – Stanford Research Institute Strength of the Technology (FAR = FRR) Rate an Intruder is Rejected Rate a Legitimate User is Accepted

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Government Computer News (GCN) Lab Review – March 2001 BIOPASSWORD® Rating A- Reviewers Choice + Highest Level of Security + Software Only Solution + Incredibly Competitive Pricing - Young Technology

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Unique Statistics To illustrate the unique statistics of keystroke dynamics, the following formula may be used: If "P" equals.01% or.0001 then the following table shows the tries vs. the probability of a security breach based on the binomial distribution of P=.001.

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Security Breach Scenario The proper design of a keystroke dynamics security system can provide additional deterrents to an impostor. An example of the effectiveness of a keystroke dynamics device can be assessed using the following assumption: Every 6 attempts result in a probability of 1 in.0006 of successful access or 6 times in 10,000 tries! The system locks for 5 minutes every sixth try, or must be released by the system administrator. The system would be locked for (10,000/6) x 5 minutes or approximately 140 Hours before a successful keystroke dynamics match. BIOPASSWORD® is Certainly a Deterrent.

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Some Opportunities

L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® BIOPASSWORD® Benefits Biometric Keystroke Dynamics is a Patented Technology Available Only in This Product Suite. Software Only Product. (No Additional Hardware except a Keyboard) Unobtrusive, Non-Invasive, and Cost Effective Simple To Deploy and Use (username & passwords) No Other Biometric Technology can Bind the User to a Digital Signature or Transaction NBS, SRI, and IBG Confirmed BIOPASSWORD® Technology Effectiveness at >98% No End-User Training * International Biometrics Group (IBG)