Download presentation
Presentation is loading. Please wait.
Published byAshley Marshall Modified over 8 years ago
1
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler
2
BIOMETRICS Can someone please explain
3
Basically BIOMETRICS is… verification of a person’s identity by human qualities they possess which grants or denies them the access to a secure zone.
4
BIOMETRICS Standard – Individual traits that set us all apart Behavioral – Each person’s unique mannerisms Cognitive – Enroll in a process using memorable info
5
Standard BIOMETRICS Facial recognition Iris Retina Hand Geometry Fingerprints – Static – Dynamic Palm print DNA
6
Facial Recognition Predominant – 1D & 2D – Geometric (feature) – Photometric (view) Elastic Bunch Graph Matching – 3D – Light, pose, and expression do not interfere with nodes
7
Eyeball Scanning Iris Colored part of the eye Muscle that controls pupil size IrisCode ® - 256 bytes Retina Unique pattern of blood vessels on the retina in the back of the eye
8
Hand Geometry Pros – Ease of use, can be integrated with other technology, and small amount of data Cons – Size, cost, and will not work for those with hand injury
9
Fingerprint Used for over 100yr Automated systems now available Software and hardware now measure with HD Population is widely aware of their use
10
Fingerprint Static User thumb or finger on window scanner Fooled more easily Dynamic User swipes digit across an opening Fooled less easily
11
Palm Print Similar methods to fingerprints 30% of lifted prints are not fingers – Knives – Guns – Steering wheels
12
DNA Odds of 2 with same DNA are 1 in billion Obtainable by blood, saliva, hair, semen, or tissue
13
Standard BIOMETRICS Drawbacks – Overall cost – Social Acceptability – Accuracy – All are not foolproof
14
Behavioral BIOMETRICS Gait (how one walks) Dynamic signature Voice, or speech, recognition Keystroke recognition Computer footprint
15
Keystroke Dynamics Combined with a password Analyzes flight time and dwell time Based on the rhythm of the typist
16
Voice Recognition Advantages Inexpensive, quick result and non-intrusive Text dependent – Rely on previous recordings of specifics – Asks to repeat back – Monitor an individuals sonic qualities Text independent – Low level spectral analysis Disadvantages Can record and playback a voice Individual can be sick Low accuracy
17
Computer Footprint Are you accessing when you usually access? Is it from where you usually are? Similar to how banks monitor transactions
18
Cognitive BIOMETRICS Based upon how we make decisions Information from the user’s past that only the individual could pick out An enrollment process that the user remembers upon returning to the site: – www.passfaces.com/demo
19
BIOMETRICS Security at Home and Abroad
20
Dept. of Justice & CJIS Criminal Justice Information Services – Run by FBI and located in West Virginia – Criminal background checks Supports counterterrorism and law enforcement efforts Largest database of fingerprints – Also palm, face, voice, iris, DNA, etc.
21
Dept. Homeland Sec. & US-VISIT Applies to international visitors holding a non-U.S. passport or visa (age14-79) Digitally scan up to 10 fingerprints Photograph Individuals are asked: – Why are you visiting? – How long will you stay? Entry procedure repeats upon exit
22
Dept. of Defense & BIMA Biometrics Identity Mgmt. Agency – Formerly Biometrics Task Force (BTF) U.S. Armed Forces Counterterrorism – Biometrics Automated Toolset (BAT) – Handheld Interagency Identity Detection Equipment (HIIDE)
23
BAT System in OIF & OEF Digital camera, fingerprint reader, iris scanner, and tough book (laptop) Populates database Over 2,000 deploy Over half a million biometrics enroll
24
HIIDE System in OIF & OEF Lightweight (2 lbs.) Collects – Fingerprints – Iris images – Facial photos – Biographical contextual data Searches against internal database Over 5,000 in field
25
Thoughts on BIOMETRICS AdvantagesDisadvantages
26
Thoughts on BIOMETRICS Advantages No longer need ID Could prevent ID theft Catch more criminals Exonerate some innocent prisoners Disadvantages Requires massive, readily accessible database Cost of equipment Invasion of privacy
27
Feel free to ask questions. What did you not understand? Thank You!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.