Download presentation
Presentation is loading. Please wait.
Published byGwendolyn Hunt Modified over 8 years ago
1
Sectoral operational programme „Increase of economic competitiveness” „Investments for your future” Project co-financed by the European Regional Development Fund “The content of this material does not necessarily represent the official position of the European Union or the Romanian Government” ATHOS Team July 15, 2013 Automated system of authenticating through biometric signature - ATHOS
2
ATHOS Introduction Overview Technical Description Slides before 1st Section Divider Demo
3
pptPlex Section Divider Introduction The slides after this divider will be grouped into a section and given the label you type above. Feel free to move this slide to any position in the deck.
4
Motivation Considering that virtual attacks take place more and more often, with increasing damage, there is a need to increase the safety degree of applications representing targets for the attackers.
5
The project objective the inclusion of the signature based authentication procedure, to increase the security degree of on-line authentication the reduction of the implementation time allotted to execute the authentication system by the developers for this type of solution
6
Where did we start from? ATHOS bases Patent for signature authentication system BIOACSSISEB
7
What have we reached? Project eligible expenses financed from public funds : 912.843 RON New jobs created due to the project: 3 Patent applications resulted from the project: 1 Scientific publications resulted from the project: 3 Private financial contribution of the applicant: 1.386.648 RON Project eligible expenses made by SOFTWIN: 2.118.250 RON
8
pptPlex Section Divider Overview The slides after this divider will be grouped into a section and given the label you type above. Feel free to move this slide to any position in the deck.
9
System functions Security Authorization, confidentiality, integrity Disponibility Over 99% uptime Acuracy Performances of the signature authenticating methods FRR (False Rejection Rate) FAR (False Acceptance Rate) Capacity Maintaining system efficiency when processing a large number of applications in real time using limited resources Nvidia CUDA solution– high processing power at a reduced price
10
System functions Modifiability Treating a high number of requests from customers in different geographical regions – replication Interoperability Modifiable architecture– multiple biometric technologies can be used Scalability Optimal distribution of tasks by resources Reduced time to design and implement the solution
11
Workflow – the developer License acquisition+ SDK Creating application instance Developing application Activating application
12
Workflow – the final user Create system account RegistrationAuthentication
13
Licensing mode Requirement of SLA (Service Level Agreement) Maximum response time Maximum number of requests per minute Maximum number of users registered in the system Example: E-banking application vs timesheet application
14
Commercial package 1) Selling authentication services to developers: Subscription fee 2) Pay-per-use: Fee for each authentication Package content: Client SDK User manuals Development licenses + production
15
Performances* Security level FRR: max. 10-15% FAR: max. 1% Response time: 1-5 seconds Number of requests per minute: thousands- tens of thousands** * only with the purchased license and while the system is not overloaded ** depending on hardware configuration
16
pptPlex Section Divider Technical Description The slides after this divider will be grouped into a section and given the label you type above. Feel free to move this slide to any position in the deck.
17
Security Module Security Module Notifier Load Balancer System architecture ATHOS Service Computing Service Worker n Worker 2 Worker 1 Data Service Error Logging Service Aplications Users Specimens Logs PROXY Inspector ATHOS Portal License Administration Module PROXY Client 1 application Client 2 application PROXY Client m application
18
ATHOS Service Reverse PROXY Receiving and validating requests For authentication For data Security – TSL, HTTPS, mutual authentication (certificates) System architecture – Server components Load Balancer ATHOS Service Computing Service Worker n Worker 2 Worker 1
19
System architecture – Server components Computing Service Configuring tasks Return the application and user data Assigning priorities Taking the template from the database Monitoring Tasks System loading level Statistical information management and storage of Workers Load Balancer ATHOS Service Computing Service Worker n Worker 2 Worker 1
20
System architecture – Server components Load Balancer Task distribution by resources License requirement compliance optimization Resource usage optimization Processing capacity optimization ATHOS Service Computing Service Worker n Worker 2 Worker 1 Load Balancer
21
System architecture – Server components Worker Authentication process optimization Biometric authentication API Processing on multi-core (CPU) şi many-core (GPU) computer units Load Balancer ATHOS Service Computing Service Worker n Worker 2 Worker 1
22
System architecture – Server components Data Service Authorizing and serving data requests Data validation and storage Aplications Users Specimens Components Security Module Hashing Encryption Notifier Error Logging Service Logs Security Module Security Module Data Service Aplications Users Specimens
23
System architecture – Server components Error Logging Service Registration of component events Notification via e-mail on application and system level Periodic On demand Generate reports on application and system level Periodic On demand Notifier Error Logging Service Log-uri Security Module Security Module Data Service Aplications Users Specimens
24
System architecture – Server components ATHOS Portal Application management User management (partial) Management of system components Template storage Configuration of auxiliary services (logging, reporting) PROXY Inspector ATHOS Portal License Administration Module
25
System architecture – Server components PROXY Inspector Enables processing tasks to the client Monitors the subtask processing modules License Administration Module ATHOS module or third-party Management of commercial use licenses PROXY Inspector ATHOS Portal License Administration Module
26
Funcționalități specifice integrării ATHOS Modul achiziție semnături System architecture – Client components PROXY Communication module with ATHOS Interoperability Secured access Forwarding subtasks Client application Signature acquisition module ATHOS specific integration code Application specific code Client Execution Module PROXY Aplicație client Client Execution Module
27
Workflow - authentication Security Module Security Module Load Balancer ATHOS Service Computing Service Worker Signature in BIR format Data Service PROXY Client application Signature acquisition module Authentication request generated by application Authentication request in ATHOS standard format Application/User data request Template request Encrypted template Decrypted template Authentication task Processing request Processing result Task result Response to authentication request
28
Scheduling algorithm Algorithm developed by SOFTWIN team, patent pending (US PTO) Authentication task distribution by available resources SLA compliance Efficient resource usage Uniform decrease of performances when loading
29
Scheduling algorithm Specific auxiliary modules Data structure for storing tasks Distribution/Scheduling module Monitoring module State/performances estimating module Configuration task module Prioritization sub- module Classification sub- module
30
Scheduling algorithm Prioritization scheme based on SLA Determining the proportionality between urgent and non-urgent tasks Resource classification based on task proportionality Capacity Processing power Confidence level
31
Security Secured connection between clients and ATHOS core (TSL) Template encrypted storage(AES) Authentication and authorization on ATHOS service level
32
Technologies
33
Performances SLA compliance Performance decreasing „Stress testing” 14% standard deviation of performance decrease per applications LoadingSLA conditionCompliance degree NormalGuaranteed number of requests per minute100% Guaranteed response time100% HighGuaranteed number of requests per minute99.6% Guaranteed response time90%
34
Performances Processing capacity of Workers Hardware configurationNumber of authentication processes Number of requests/ 60 seconds Average response time (miliseconds) Intel Core 2 Duo CPU2120487 Intel Core i5-3320M1350249 Intel Core 2 Duo E7400 GPU (2 x nVidia GeForce GTX 275) 2900385 Intel Xeon X55603120722 Intel Xeon E5-24074600398 Intel Core i5-2500 GPU (3 x nVidia GeForce GTX 570) 34000291
35
Performances Scalability
36
Performances Resource loading Tasks / minuteSolved tasks on resource 1 (%) Solved tasks on resource 2 (%) 20050%50% (50%-0%) 40050%50% (48%-2%) 60050%50% (30%-20%) 80052%48% (23%-25%) 100046%54% (27%-27%) 120041%59% (29%-30%)
37
Performances Up to 5000 requests per minute(7,2 million requests/day) Data server Intel Xeon E5-2407, CPU: 2.40 GHz, 2 proc. x 8 core x 1 thread Central server Intel Xeon E7302, CPU: 2.13GHz, 4 core X 4 threads Workers Intel Core 2 Duo CPU 3 x Intel Core i5-3320M Intel Core 2 Duo E7400, GPU (2 x nVidia GeForce GTX 275) Intel Core i5-2500, GPU (3 x nVidia GeForce GTX 570)
38
Additional information A. Salinca, S. M. Rusu, Ș. Diaconescu: An approach to data collection in an online signature verification system, 8th International Conference on Web Information Systems and Technologies, Porto, Portugal 18 – 21 April 2012, WEBIST A. Salinca, S. M. Rusu, A. M. Pricochi: SOA–Based Authentication System for Dynamic Handwritten Signature, Advances in Information Systems and Technologies, 735-744, Springer Berlin Heidelberg, 2013 A. M. Pricochi, A. Salinca, S. M. Rusu, B. Ivașcu: A Dynamic Load Balancing Strategy for a Distributed Biometric Authentication System, 9th International Conference on Web Information Systems and Technologies, Aachen, Germany 8 – 10 May 2013, WEBIST
39
pptPlex Section Divider Demo The slides after this divider will be grouped into a section and given the label you type above. Feel free to move this slide to any position in the deck.
40
Demo ATHOS Athos Portal HomeBank- type Demo
41
ATHOS Workflow Demo HomeBank-type demo Dynamic handwritten signature authentication using ATHOS Application development according to SDK Adding user in the application from ATHOS Adding application in ATHOS Purchase license Insert into the systemActivate application Adding subject in ATHOS Create accountActivate account
42
Demo – facilities ATHOS RegistrationAuthentication User Management Sync app users Sync app data Event notification Reports and statistics Security Management SDK
43
Q & A Thank you!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.