Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Access to a security vault granted by a retinal scan  A door unlocks as someone approaches, activated by facial recognition  My car door unlocks as.

Similar presentations


Presentation on theme: " Access to a security vault granted by a retinal scan  A door unlocks as someone approaches, activated by facial recognition  My car door unlocks as."— Presentation transcript:

1

2  Access to a security vault granted by a retinal scan  A door unlocks as someone approaches, activated by facial recognition  My car door unlocks as I touch the door handle  Accessing a computer system by presenting a fingerprint Sound like Hollywood?

3 The security field uses three different types of identification: Something You Know — a password, PIN, or piece of personal information (such as your mother's maiden name); Something You Have — a card key, smart card, or token (like a Secur ID card); and/or Something You Are —a biometric. Of these, a biometric is the most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten, and forging one is practically impossible. (Replacement part surgery, by the way, is outside the scope of this presentation.)

4 Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioral characteristic Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odor/scent. Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, and voice. Some researchers have coined the term behavior metrics for this class of biometrics. Strictly speaking, voice is also a physiological trait because every person has a different vocal tract, but voice recognition is mainly based on the study of the way a person speaks, commonly classified as behavioral.

5 A biometric system can operate in the following two modes: Verification – A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smart card, username or ID number. Identification – A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. The identification only succeeds in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold.

6

7 Characteristics of a biometric that must be present in order to use the system for authentication purposes Uniqueness - The same trait will not appear in two people Universality - The trait has to occur in many people as possible Permanence - The trait does not change over time Measurability - The trait can be measured with simple technical instruments User friendliness - The trait is easily measured with minimal discomfort

8

9 Biometric-based authentication applications include workstation and network access, single sign-on, application logon, data protection, remote access to resources, transaction security, and Web security and more. Biometric Needs Model Physical Security: Access to a physical location such as a building or room. Cyber Security: Access to an organization’s network through a biometrically authenticated login schema. Transactional Security: Any monetary transaction which biometrically authenticates, accesses, and atomically debits or credits the user’s account

10 Biometrics can also be defined as either Passive, or Active. Passive biometrics do not require a users active participation and can be successful without a person even knowing that they have been analyzed. Active biometrics however, do require a person cooperation and will not work if they deny their participation in the process. Active All finger print technologies, Hand geometry technologies, Retina scanning technologies, Signature recognition technologies, ……… Passive Voice recognition technologies, Iris recognition technologies, Facial recognition technologies, …………..

11 Fingerprint Recognition: Identification by using patterns of friction ridges and valleys on an individual's fingertips are unique to that individual. By far the most widely accepted biometric. Face Recognition: The identification of a person by their facial image characteristics Voice Recognition: Identification using the acoustic features of speech that have been found to differ between individuals Iris/Retinal Recognition: This identification method uses the unique characterizes of the eye Hand and Finger Geometry: Identification by measuring either physical characteristics of the fingers or the hands Signature Verification: Identification using the dynamic analysis of a signature to authenticate a person Venial Recognition: A system for Identification using a persons unique vein patterns Palm Print Recognition: Uses the lines on one's palm to identify an individual (similar to fingerprint recognition)

12 Multimodal biometric systems are those that utilize more than one physiological or behavioral characteristic for enrollment, verification, or authentication. Multi-modal biometric systems are looked to as a means of (1) reducing false non-match and false match rates, (2) providing a secondary means of enrollment, verification, and identification if sufficient data cannot be acquired from a given biometric sample, and (3) combating attempts to spoof biometric systems through non-live data sources such as fake fingers.

13  Convene for users.  Control for businesses.  Inexpensive implementation.  Price/Performance curves dropping.  Saves money (i.e., no need for producing keys, etc.)  Accountability/Non-Repudiation  Improved identification (i.e., authentication, verification, impersonation).  Improved audit trail.  Less administration (i.e., paperwork, cards, etc.)  More security??

14  Biometric Door entry  Secured Safes  Computer/Network Logon  Employee Time cards  Schools and Universities  Voter Registration / Management  Driver Licensing  Border Control  Passport / VISA  Welfare / Government Insurance (WIC)  Criminal ID / Wanted Persons Lookup  Jail Management  Airports / Frequent Traveler / Passenger Tracking  Check Cashing  E Commerce & Financial Services

15 DNA matching : The "ultimate" biometric technology which would produce proof-positive identification of an individual. This technology is still not considered a "biometric" technology and is years away from any kind of implementation. It is also very intrusive for the user. Active Advertisement :Advertisements based on who you are National Biometric Database (NBDb) :National Database of citizens used for multiple purposes Automobile Security: No more keys, just you

16 Users may become uncooperative if systems limitations are not tested  Simple Hygiene of users may create problems with authentication  If the person has arthritis, long fingernails, is wearing hand cream or has circulation problems then this will not produce a good reading  Around half the population wears glasses or contact lenses.  People age

17  Personal Privacy  Physical Privacy  Religious Objections  System attack vulnerabilities (e.g. denial of service)  Insider threat  Hacking  Spoofing  Operational vulnerabilities (e.g. distraction and vigilance)  Face  Skin texture and reflectance  Speaker ID  DNA  Template aging  Simulation, e.g., synthetic aging

18 United States - The United States government has become a strong advocate of biometrics with the increase in fear of terrorism since September 11, 2001. The FBI is currently spending $1 billion to create a new biometric database, which will store DNA, fingerprints, and other biometric data. The computers running the database will be contained in an underground facility about the size of a football field. The Information Processing Technology Office, ran a program known as Human Identification at a Distance which developed technologies that are capable of identifying a person at up to 500 ft by their facial features. The US Department of Defense (DoD) Common Access Card, is an ID card issued to all US Service personnel and contractors on US Military sites. This card contains biometric data and digitized photographs.

19 Germany - The biometrics market in Germany will experience enormous growth until 2009. “The market size will increase from approximately 12 million € (2004) to 377 million €” (2009). “The federal government will be a major contributor to this development”. In particular, the biometric procedures of fingerprint and facial recognition can profit from the government project. In May 2005 the German Upper House of Parliament approved the implementation of the ePass, a passport issued to all German citizens which contain biometric technology. The ePass has been in circulation since November 2005, and contains a chip that holds a digital photograph and one fingerprint from each hand

20 Brazil - Since the beginning of the 20th century, Brazilian citizens have had user ID cards. The decision by the Brazilian government to adopt fingerprint- based biometrics. Iraq - Biometrics are being used extensively in Iraq to catalogue as many Iraqis as possible providing Iraqis with a verifiable identification card, immune to forgery. During account creation, the collected biometrics information is logged into a central database which then allows a user profile to be created. Even if an Iraqi has lost their ID card, their identification can be found and verified by using their unique biometric information. Additional information can also be added to each account record, such as individual personal history. Australia - Visitors intending to visit Australia may soon have to submit to biometric authentication as part of the Smartgate system, linking individuals to their visas and passports. Biometric data are already collected from some visa applicants by Immigration. Australia is the first country to introduce a Biometrics Privacy Code. The Code includes privacy standards that are at least equivalent to the Australian National Privacy Principles (NPPs) in the Privacy Act and also incorporates higher standards of privacy protection in relation to certain acts and practices.

21 India India has planned an ambitious mega project. To provide a unique identification number to each of its 1.25 billion people. The Identification number will be stored in a central databases. consisting the biometric information of the individual. If implemented. This would be the biggest implementation of the Biometrics in the world.

22 Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

23 Queries if any…….

24 Presented by Renjith. S. Thank you for one & all ………..


Download ppt " Access to a security vault granted by a retinal scan  A door unlocks as someone approaches, activated by facial recognition  My car door unlocks as."

Similar presentations


Ads by Google