what is biometrics? you know- something that you know- password, pin, or personal information such...
TRANSCRIPT
What is Biometrics?Something that you know- you know- password,
PIN, or personal information such as your mother's maiden name)
Something that you have- a card key, smart card,
Something that you are- you are- a biometric.
Bio= “life”, metro=“measure” (ancient Greek)
Why Biometrics?
• Biometric is the most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten.
• Control for businesses• Passwords are not user-friendly• Inexpensive implementation• Less administration (paperwork, cards, etc.)• Saves money (no need for producing keys,
etc.)
Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological characteristic or behavioral characteristic.
Uses of Biometrics Simple:• Verification – Is this who he claims to be?• Identification – who is this?
Advanced:• Detecting multiple identities• Patrolling public spaces
Identification Methods
Enrollment Biometric data is collected for a known
identity Reference template is created and stored
Authentication Identification: comparison of biometric
data to all available data files in a database Verification: comparison of biometric data
to previously stored version
Biometrics
Fingerprint Recognition Identification by using patterns of an
individual's fingertips that are unique to that individual. By far the most widely accepted biometric.
Fingerprint Recognition Strengths:
Fingerprints don’t change over time Widely believed fingerprints are unique
Weaknesses: Scars
Attacks: Surgery to alter or remove prints “Gummy fingers” Corruption of the database
•Fingerprint Recognition
Face Recognition
The identification of a person by their facial image characteristics
Face Recognition Strengths:
Database can be built from driver’s license records, visas, etc.
Few people object to having their photo taken
Weaknesses: No real scientific validation
Attacks: Surgery Facial Hair Hats Turning away from the camera
1) Digitally scan an existing photograph2) Acquire a live picture of a subject3) software is used to locate the faces
in the image that has been obtained4) software measures face according to
is peaks and valleys (nodal points)5) the face print created by the
software is compared to all face prints the system has stored in its database.
Facial Recognition Process
6) software decides whether or not any comparisons from step 4 are close enough to declare a possible match
Voice Recognition:
Identification using the features of speech that have been found to differ between individuals
Voice Recognition
Strengths: Most systems have audio hardware Works over the telephone Can be done covertly Lack of negative perception
Weaknesses: Background noise (airplanes) No large database of voice samples
Attacks: Tape recordings Identical twins / sound alike
Iris Recognition
This identification method uses the unique characteristics of the eye.
Iris Recognition
Strengths: 300+ characteristics; 200 required for match
Weaknesses: Fear Discomfort Proprietary acquisition device Algorithms may not work on all individuals No large databases
Attacks: Surgery
Hand Scan Typical systems measure 90 different features:
Overall hand and finger width Distance between joints Bone structure
Primarily for access control: Machine rooms Olympics
Strengths: No negative connotations – non-intrusive Reasonably robust systems
Weaknesses: Accuracy is limited; can only be used for 1-to-1
verification
Behavior Biometrics:
Handwriting (static & dynamic) Keystroke dynamics
Keystroke Recognition
Uses rhythm and manner in which characters are typed into a keyboard
Typing characteristics are unique to individuals
Indicators Speed in words per minute Delays Specific sequences of characters Typing errors Seek time and hold time
Biometrics are used by:
Government Military Schools Commerce Law Enforcement
Examples of Biometrics Usage
Governments worldwide use biometrics for passports and airport security.
Police agencies use fingerprints and DNA for identification and forensics.
Financial institutions use palm/finger vein authentication to secure ATMs.
Companies use biometrics to keep time records, secure locations and improve user convenience.
Business Applications
Biometric Door entry Secured Safes Computer/Network Logon Employee Time cards U.S. Visit Program Schools
Sample of Applications Voter Registration / Management Driver Licensing Border Control Passport / VISA Welfare / Government Insurance (WIC) Criminal ID / Wanted Persons Lookup Jail Management Airports / Frequent Traveler / Passenger
Tracking Check Cashing e-Commerce & Financial Services Identity Theft
Things That Make Biometrics Work
Uniqueness - The same trait will not appear in two people
Universality - The trait has to occur in many people as possible
Permanence - The trait does not change over time
Measurability - The trait can be measured with simple technical instruments
User friendliness - The trait is easily measured with minimal discomfort
Problems With Biometrics
Simple Hygiene of users may create problems with
authentication
If the person has arthritis, long fingernails, is wearing hand cream or has circulation problems then this will not produce a good reading
Around half the population wears
glasses or contact lenses
Future of Biometrics DNA matching the "ultimate" biometric technology
which would produce proof-positive identification of an individual.
Active Advertisement Advertisements based on who you are National Biometric Database National Database of citizens used for multiple
purposes
Automobile Security = No more keys, just you
Future of Biometrics
Future…