Presentation is loading. Please wait.

Presentation is loading. Please wait.

Iridian Technologies, Inc Moorestown, NJ USA Iridian Technologies, SA Geneva, Switzerland 856-222-9090 866-IRIDIAN (U.S. & Canada) www.iridiantech.com.

Similar presentations


Presentation on theme: "Iridian Technologies, Inc Moorestown, NJ USA Iridian Technologies, SA Geneva, Switzerland 856-222-9090 866-IRIDIAN (U.S. & Canada) www.iridiantech.com."— Presentation transcript:

1

2 Iridian Technologies, Inc Moorestown, NJ USA Iridian Technologies, SA Geneva, Switzerland 856-222-9090 866-IRIDIAN (U.S. & Canada) www.iridiantech.com

3 The New Look of Security. Iridian Technologies, Inc Iris recognition biometric software Privately held Incorporated 1990, began operations 1993 Merged with Sensar Inc, July 2000 WW headquarters located in Moorestown, NJ Iridian Technologies SA headquartered in Geneva, Switzerland Holds numerous US & international software patents Iris

4 The New Look of Security. You’ve Probably Heard About Us Schiphol Airport, Amsterdam* Heathrow Airport, London Canadian Airports, Ottawa Atlanta, Knoxville, Frankfurt S-Travel, Zurich Switzerland Singapore/Malaysia borders The Hajj pilgrimage, Saudi Arabia US-FAA Secure Executive Toolset Defense, Army, Navy, data centers, correctional facilities, public utilities * Access & border crossing implemented by Schiphol Group, CMG, and Joh Enschede The Afghan Girl

5 The New Look of Security. The Netherlands “Privium” implemented by the Schiphol Group, JESS, and CMG –$89 charge, convenient parking at Schiphol, lounge access Installed kiosks and turnstiles using 1:1 verification via a smart card Used to enter and exit country –Includes one-stop immigration and security lane during exit As of March 2002, 2,000+ enrolled, averaging 10,000 transactions per month

6 The New Look of Security. Canada Iridian’s iris recognition technology and certified hardware/software were specified in recent CCRA EPPS RFP –Implementation expected to begin Summer 2002 in 2 airports growing to 8 Similar user design as The Netherlands except central database enrollment Iridian’s iris recognition being tested “to meet the Canadian government’s requirement for technology aimed at EPPS, an Expedited Passenger Processing System. EPPS will eventually allow pre-approved travelers to clear customs more smoothly.” - The Ottawa Citizen March 5, 2002

7 The New Look of Security. User authentication is the key to a business’ secure physical and logical perimeters. Traditional security devices or procedures allow the user to be the weakest link in the security model. Positive authentication is needed because it enables authorization and administration procedures. Iris Recognition delivers positive authentication.

8 The New Look of Security. Source: The New Yorker

9 The New Look of Security. Security-Privacy-Convenience No AmericaE ME AAsia 3. Security 2. Privacy 1. Convenience1. Security 2. Privacy 3. Convenience 1. Security 3. Privacy 2. Convenience Before September 11, 2001

10 The New Look of Security. Security-Privacy-Convenience No AmericaE ME AAsia 1. Security 2/3. Privacy 2/3. Convenience 1. Security 2. Privacy 3. Convenience 1. Security 3. Privacy 2. Convenience Post September 11, 2001

11 The New Look of Security. To Conduct Secure Business 1.Authenticate the point of entry –At the sender & receiver nodes –At the door or gate 2.Authorize the action –Privilege the “right” to gain access 3.Administer the policies –Secure the data transport –Database management with privacy * Access & border crossing implemented by Schiphol Group, CMG, and Joh Enschede

12 The New Look of Security. Biometric Types Iris Recognition – uses a video camera to pinpoint the independent coordinates of the iris of the eye Face – defines a dozen or so points on the face and measures the distance between them Fingerprints – looks for pattern ends and their changes in direction Hand – measures the size and angles of a person’s hand features Voice – analyzes the sound waves and speech patterns of a recorded voice Others – signature, retinal scan, keyboard

13 The New Look of Security. How to Measure a Biometric False Acceptance Rate (FAR) – accepting users who it shouldn’t accept False Rejection Rate (FRR) – rejecting users who it should accept Outlier Population – the percentage of people who cannot use the biometric because they do not have the characteristic Storage and Matching - the business application should determine to use either verification or identification or both

14 The New Look of Security. Authentication ALL biometrics can verify Verification asks: “Does this live record match a particular stored value?” –It requires a password or PIN or token to suggest a pointer, then the system verifies the match. Verification answers: “It is or is not a match.” Iris Recognition identifies Identification asks: “WHO is this person?” –It does not require a password or PIN or token because it finds the person by doing an exhaustive search of the database. Identification answers: –“This is so-and-so” OR –“This record is valid and is approved for processing”

15 The New Look of Security. Security and Privacy can be Balanced if The biometric and application align –Iris recognition requires user participation – “opt-in” –Some biometrics are passive Data integrity is assured -In systems architecture -In the template -In transactions -In storage Data managers follow policies

16 The New Look of Security. The Iris is NOT the Retina Sclera Iris Aqueous Humor Cornea Ciliary Muscle Retina Choroid Optic Nerve Lens

17 The New Look of Security. How Iris Recognition Works 1.Uses a video image of the iris 2.Analyzes the iris patterns, preparation for secure transport 3.Creates a 512 byte IrisCode R template to describe the patterns 4.Matches the code to all IrisCodes in a database/file 5.Accepts or rejects individual

18 The New Look of Security. Common Platform Walkup Physical Access Kiosk Gate/Perimeters Desktop Information Access Single Sign On/Off Domain Log-on Network Personal Information Access Transactions Single Sign On

19 The New Look of Security. Image capture and evaluation, image compression Image security preparation for transport including countermeasures and permutations Offers 3DES encryption at API Some cameras use PrivateID to support internet video conferencing, video capture/editing, and video e-mail applications Drivers support multiple Windows versions Using APIs, can be used with smart cards, passports, LAN/WAN logon, digital document signing, e- commerce transaction authorization etc Client or Camera Resident Software

20 The New Look of Security. Secure Authentication Server Accepts secured iris image from Privateid TM Creates IrisCode R and performs matching algorithms –Can perform identification (1:n) or verification (1:1) Offers 3DES encryption at API and database –Supports Oracle or SQL db Currently runs on NT 4.0, W2000 –Linux and Solaris shortly Sold as whole unit or as a kit Priced per user (1 user = 2 IrisCodes R ) Application Servers ODBC Database Oracle, MS-SQL TCP/IP network KnoWho Authentication Server Internet Connection www Windows Desktop

21 The New Look of Security. LG IrisAccess TM 2200 powered by xxxxxxxx Walk-up Applications Facility access Immigration/airport security Data centers Utility & power plants Prison book/release Time & attendance Benefits Audio instructions Auto focus View 3 to 12 inches Small size

22 The New Look of Security. Oki-Panasonic BM-ET500 TM powered by xxxxxxxx Walk-up Applications Immigration/airport security Gate control Utility & power plants Prison book/release Time & attendance Benefits Two-iris recognition Stand up to a meter away Auto focus Surveillance Face image capture

23 The New Look of Security. Panasonic Authenticam TM powered by PrivateID TM Available at Enterprise Resellers Desktop Applications Local logon Domain logon Single Sign On LAN administration Desktop security Benefits Amber/green LED View 19 to 21 inches Small size Video conferencing

24 The New Look of Security. Application Integration Architecture

25 The New Look of Security. Partnerships

26 The New Look of Security. To Conduct Secure Business 1.Authenticate the point of entry –At the sender & receiver nodes –At the door or gate 2.Authorize the action –Privilege the “right” to gain access 3.Administer the policies –Secure the data transport –Database management with privacy Iris Recognition delivers positive authentication.


Download ppt "Iridian Technologies, Inc Moorestown, NJ USA Iridian Technologies, SA Geneva, Switzerland 856-222-9090 866-IRIDIAN (U.S. & Canada) www.iridiantech.com."

Similar presentations


Ads by Google