Download presentation
Presentation is loading. Please wait.
Published byDouglas Ross Modified over 9 years ago
1
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - I October 17, 2005
2
Outline l Types of Applications l Example Government Applications l Grouping of Applications l Plan for next few lectures
3
References l Course Text Book, Chapter 10 l http://www.biometricgroup.com/applications.html http://www.biometricgroup.com/applications.html l http://www.biometrics.org/REPORTS/CTSTG96/ http://www.biometrics.org/REPORTS/CTSTG96/
4
Types of Applications l Identification Systems - Biometrics are increasingly integrated into large-scale systems for drivers’ licensing, surveillance, health and identity cards, and benefits issuance. - The need for singular identification and transactional verification has emerged in various public and private sector environments. l IT/Network Security - As more and more valuable information is made accessible to employees via LAN and WAN, the risks associated with unauthorized access to sensitive data grow larger. - Protecting your network with passwords is problematic, as passwords are easily compromised, lost, or inappropriately shared.
5
Types of Applications (Continued) l e-Commerce and Internet - Biometrics are being positioned as a solution for e- Commerce and Internet security, designed to ensure that only authorized individuals can access sensitive data or execute transactions. l Access Control - Biometrics have proven to be an effective solution for high-security access control, ensuring that only authorized individuals can access protected or secure areas. - Biometric systems require controlled and accurate enrollment processes, careful monitoring of security settings to ensure that the risk of unauthorized entry is low, and well-designed interfaces to ensure rapid acquisition and matching
6
Types of Applications (Concluded) l Smart Cards - Biometrics are an authentication technology; smart cards can be a storage, processing, and/or authentication technology. - In certain applications, the two technologies compete, such that an institution may deploy smart cards instead of biometrics for access control, or vice versa. - Increasingly, the two technologies are deployed in conjunction, strengthening each other’s capabilities.
7
Some Government Applications l Immigration and Naturalization Service's (INS) Passenger Accelerated Service System (INSPASS) - INSPASS was designed as a means to provide prompt admission for frequent travelers to the US by allowing them to bypass the personal interview/inspection part of the entry process. It uses hand geometry to verify the identity of the traveler at an automated inspection station. l CANPASS - It is the Canadian version of INSPASS, except that it uses a fingerprint biometric, rather than hand geometry, for traveler verification. The goal of CANPASS is to ease the transfer of goods and people between the US and Canada
8
Some Government Applications (Continued) l PORTPASS - It is another INS initiative similar to INSPASS except that people in vehicles at borders are being monitored and it uses a voice recognition biometric, instead of hand geometry. - PORTPASS is used at a US/Canadian vehicle border crossing and is planned for use at US/Mexican border crossings. - One version of PORTPASS (the Automated Permit Port) requires the vehicle to stop. It will also have a Video Inspection Service, allowing a driver to conference with an Inspector should the biometric fail. - Another version, known as the Dedicated Commuter Lane, uses a radio frequency tag affixed to the vehicle in order to obtain the biometric as the vehicle is moving.
9
Some Government Applications (Continued) l Federal Bureau of Prisons - The Federal Bureau of Prisons is using hand geometry units to monitor the movements of prisoners, staff, and visitors within certain Federal prisons. - Visitors must enroll upon arrival and are given a magnetic stripe card containing information that points to his/her identifying information in a central database. This card must be carried with the visitor at all times - Staff and inmates must also enroll. Staff are enrolled to reduce the possibility of mistakenly identifying them as an inmate or for positive identification in the event of a disturbance. - Prisoners are enrolled for access control to places such as the cafeteria, recreation lounges, and the hospital. The system also allows for the tracking of prisoners' movements.
10
Some Government Applications (Continued) l Automated Fingerprint Image Reporting and Match (AFIRM) - The fingerprints of new applicants for welfare benefits are checked against a central database of prior claimants. l Spanish National Social Security Identification Card (TASS) - The TASS program is a smart card initiative employing fingerprint technology to eliminate enrollment duplication and provide secure access to personal information upon retrieval. l The Colombian Legislature - The Colombian Legislature uses hand geometry units to confirm the identity of the members of its two assemblies immediately prior to a vote.
11
Some Government Applications (Concluded) l Some Other Applications - California, Colorado, Florida, and Texas Departments of Motor Vehicles, Government Accounting Office's Electronic Benefits Transfer (EBT) Task Force, FBI's Integrated Automated Fingerprint Identification System (IAFIS), National Crime Information Center 2000 (NCIC 2000) l Other Agencies - The Defense Advanced Research Projects Agency, Drug Enforcement Agency, Department of Defense, Department of Energy, Department of Public Safety, Department of State, Federal Bureau of Investigation, Federal Reserve Bank, Hill Air Force Base, the Pentagon, and the US Mint have several biometric devices with numerous users for access control applications
12
Grouping Biometrics Applications l Three Categories of Applications l (1) Logical Access Applications l (2) Physical Access Applications l (3) Identify or Verify the Identity of Individuals
13
Additional Criteria for Understanding Biometric Systems l In what manner does the user interact with the system? l Does the use claim identity before interacting with the system? l What are the applications requirements for accuracy, enrollment and response time? l Is the user motivated to comply with the biometrics systems? What sanctions are in place for misuse? l What is the value of the data or material protected by the system? l With what non-biometrics technologies do biometrics compete?
14
Seven Horizontal Classifications l Criminal Identification - Identify or verify the identity of a suspect or criminal l Retail ATM Point of Sale - Identify/verify individuals carrying out transactions l E-Commerce/Telephony - Identify/verify individuals carrying out remote transactions l PC/Network access - Replace passwords and PINs
15
Seven Horizontal Classifications (Concluded) l Physical access / Time Attendance - Verify identity of individuals entering and leaving the building l Citizen identification - Identify and verify individual entering and leaving the building l Surveillance - Verify the identity of individuals present in a given space
16
Biometrics Solution Matrix l How urgent is the authentication problem that biometrics are solving l What is the scope of the authentication problem that biometrics are solving l How well can biometrics solve the authentication problem? l Are biometrics the only possible authentication solution? l How receptive are users to biometrics as an authentication solution
17
Groups of Applications l Citizen Facing Applications - E.g., Criminal identification l Employee Facing Applications - PC/Network access, Physical access l Customer-facing applications - POS Transactions
18
Plan for Remaining Lectures (Tentative) l October 19, 2005: Biometrics Applications - II l October 24, 2005: Guest Lecture l October 26, 2005: Biometrics Applications - III l October 31, 2005: Privacy I l November 2, 2005: Privacy - II l November 7, 2005: Standards and Interoperability - I l November 9, 2005: Guest lecture l November 14, 2005: Standards and Interoperability - II l November 16, 2005: Secure Biometrics - I l November 21, 2005: Secure Biometrics – II l November 23, 2005: Review for Finals l November 28, 2005: Misc. Topics, Review for Finals
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.