josh tate. advanced authenticationintroduction very broad subject and highly researched. focused...

17
Stuff and things about things and stuff Josh Tate

Upload: lucy-rogers

Post on 16-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • Josh Tate
  • Slide 2
  • Slide 3
  • Advanced AuthenticationIntroduction Very broad subject and highly researched. Focused on topics that could be quick to implement and (somewhat) inexpensive. Solutions that could be used at home/work/public.
  • Slide 4
  • Advanced AuthenticationWhat is Authentication: Most common ways to authenticate today: Something you know Something you have Something you know/have ?
  • Slide 5
  • Advanced AuthenticationWhat is Authentication: Authentication Technique ExampleProperties Something you have Credit Card Car Key Badge Lost / Stolen Duplicated Shared Something you know Login ID / Password ATM PIN Forgotten Shared Guessed Something you are Fingerprint Eyes / Face Voice Cannot be lost / stolen Cannot guess / forge Cannot be shared (easily)
  • Slide 6
  • Advanced AuthenticationAuthentication Methods I will cover: Fingerprint / Knuckle Identification Fingerprint & smart card combinations EyePassShape
  • Slide 7
  • Advanced AuthenticationFingerprint / Knuckle Identification No two fingerprints have ever been found alike in many billions of human and automated computer comparisons. Fingerprints are the very basis for criminal history foundation at every police agency on earth. Fingerprinting established the first forensic professional organization, the International Association for Identification (IAI), in 1915. [1] Researchers noticed that fingerprints could uniquely identify people as early as the 1800s.
  • Slide 8
  • FeatureProperties CrossoverIntersection point CoreU-Turn BifurcationFork Ridge EndingDead End DeltaSplit IslandDual dead ends Advanced AuthenticationFingerprint / Knuckle Identification
  • Slide 9
  • Advanced AuthenticationFingerprint / Knuckle Identification
  • Slide 10
  • Advanced AuthenticationFingerprint & smart card combinations Very secure because it combines all 3 authentication techniques (are/have/know) The research paper pitched this idea as a replacement for Passports / Drivers License / Credit Cards etc. Stolen Wallet?
  • Slide 11
  • Advanced AuthenticationFingerprint & smart card combinations
  • Slide 12
  • Advanced AuthenticationEyePassShape Public authentication is time-critical. Authentication token should be easy to remember. Authentication has to be secure. Authentication methods have to be easily deployable.
  • Slide 13
  • Advanced AuthenticationEyePassShape EyePIN Not very Time-Critical Very Secure Pass ShapeNot very Secure Very Fast Both are easy to deploy and are easy to remember
  • Slide 14
  • Advanced AuthenticationEyePassShape Fast Easy to Remember Secure Deployable
  • Slide 15
  • Advanced AuthenticationEyePassShape
  • Slide 16
  • Advanced AuthenticationEyePassShape
  • Slide 17
  • Advanced AuthenticationReferences [1] The History of Fingerprints, January 2012, http://onin.com/fp/fphistory.htmlhttp://onin.com/fp/fphistory.html [2] Biometric Education Fingerprint, http://www.barcode.ro/tutorials/biometrics/fingerprint.html http://www.barcode.ro/tutorials/biometrics/fingerprint.html [3] Pallav Gupta, Srivaths Ravi, Anand R, Kiral K. Jha, Efficient fingerprint-based user authentication for embedded systemsm DAC 2005 Proceedings of the 42 nd annual Design Automation Conference, 244-247. [4] Lionel Beauge, Andrzej Drygallo, 2010, Fully featured secure biometric smart card device for fingerprint-based authentication and identification, MM&Sec 2010 Proceedings of the 12 th ACM workshop on multimedia and security, 181-186. [5] Alexander De Luca, Martin Denzel, Heinrich Hussmann, 2009, Look Into My Eyes!: can you guess my password?, SOUPS 2009 5 th Symposium on Usable Privacy and Security, Article 8.