Biometrics - An Authentication

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

BIOMETRICS - AN AUTHENTICATION

MOVIES TO REAL WORLD

 Access to a security vault granted by a retinal


scan
 A door unlocks as someone approaches, activated
by facial recognition
 My car door unlocks as I touch the door handle
 Accessing a computer system by presenting a
fingerprint

Sound like Hollywood?


BIOMETRICS OVERVIEW

The security field uses three different types of identification:


Something You Know — a password, PIN, or piece
of personal information (such as your mother's maiden name);
Something You Have — a card key, smart card, or token (like a Secur ID
card); and/or
Something You Are —a biometric.
Of these, a biometric is the most secure and convenient authentication
tool. It can't be borrowed, stolen, or forgotten, and forging one is
practically impossible. (Replacement part surgery, by the way, is outside
the scope of this presentation.)
WHAT ARE BIOMETRICS

Biometrics are automated methods of identifying a


person or verifying the identity of a person based on a
physiological or behavioral characteristic
Physiological are related to the shape of the body. Examples include, but
are not limited to fingerprint, face recognition, DNA, hand and palm
geometry, iris recognition, which has largely replaced retina, and
odor/scent.
Behavioral are related to the behavior of a person. Examples include,
but are not limited to typing rhythm, and voice. Some researchers have
coined the term behavior metrics for this class of biometrics.
Strictly speaking, voice is also a physiological trait because every person
has a different vocal tract, but voice recognition is mainly based on the
study of the way a person speaks, commonly classified as behavioral .
BIOMETRIC: OPERATION METHOD

A biometric system can operate in the following two modes:


Verification – A one to one comparison of a captured biometric with a
stored template to verify that the individual is who he claims to be. Can
be done in conjunction with a smart card, username or ID number.
Identification – A one to many comparison of the captured biometric
against a biometric database in attempt to identify an unknown
individual. The identification only succeeds in identifying the individual
if the comparison of the biometric sample to a template in the database
falls within a previously set threshold.
ENROLLMENT 2 VERIFICATION
Characteristics of a biometric that must be present in order to use the system for
authentication purposes
Uniqueness - The same trait will not appear in two people
Universality - The trait has to occur in many people as
possible
Permanence - The trait does not change over time
Measurability - The trait can be measured with simple technical
instruments
User friendliness - The trait is easily measured with minimal
discomfort
BASIC BLOCK DIAGRAM OF A BIOMETRIC SYSTEM
USES FOR BIOMETRICS
Biometric-based authentication applications include workstation and
network access, single sign-on, application logon, data protection, remote
access to resources, transaction security, and Web security and more .

Biometric Needs Model


Physical Security: Access to a physical location such as a building or
room.
Cyber Security: Access to an organization’s network through a
biometrically authenticated login schema.
Transactional Security: Any monetary transaction which biometrically
authenticates, accesses, and atomically debits or credits the user’s account
ACTIVE VS PASSIVE
Biometrics can also be defined as either Passive, or Active.
Passive biometrics do not require a users active participation and can be
successful without a person even knowing that they have been analyzed.
Active biometrics however, do require a person cooperation and will not work
if they deny their participation in the process.
Active
All finger print technologies, Hand geometry technologies, Retina scanning
technologies, Signature recognition technologies, ………
Passive
Voice recognition technologies, Iris recognition technologies, Facial
recognition technologies, …………..
TYPES…..
Fingerprint Recognition: Identification by using patterns of friction ridges and
valleys on an individual's fingertips are unique to that individual. By far the most
widely accepted biometric.
Face Recognition: The identification of a person by their facial image characteristics
Voice Recognition: Identification using the acoustic features of speech that have
been found to differ between individuals
Iris/Retinal Recognition: This identification method uses the unique characterizes of
the eye
Hand and Finger Geometry: Identification by measuring either physical
characteristics of the fingers or the hands
Signature Verification: Identification using the dynamic analysis of a signature to
authenticate a person
Venial Recognition: A system for Identification using a persons unique vein patterns
Palm Print Recognition: Uses the lines on one's palm to identify an individual
(similar to fingerprint recognition)
MULTI MODAL
Multimodal biometric systems are those that utilize more than one physiological or
behavioral characteristic for enrollment, verification, or authentication.
Multi-modal biometric systems are looked to as a means of
(1) reducing false non-match and false match rates,
(2) providing a secondary means of enrollment, verification, and identification if
sufficient data cannot
be acquired from a given biometric sample, and
(3) combating attempts to spoof biometric systems
through non-live data sources such as fake fingers.
WHY USE BIOMETRICS
 Convene for users.
 Control for businesses.
 Inexpensive implementation.
 Price/Performance curves dropping.
 Saves money (i.e., no need for producing keys, etc.)
 Accountability/Non-Repudiation
 Improved identification (i.e., authentication, verification, impersonation).
 Improved audit trail.
 Less administration (i.e., paperwork, cards, etc.)
 More security??
BUSINESS APPLICATION
 Biometric Door entry
 Secured Safes
 Computer/Network Logon
 Employee Time cards
 Schools and Universities
 Voter Registration / Management
 Driver Licensing
 Border Control
 Passport / VISA
 Welfare / Government Insurance (WIC)
 Criminal ID / Wanted Persons Lookup
 Jail Management
 Airports / Frequent Traveler / Passenger Tracking
 Check Cashing
 E Commerce & Financial Services
FUTURE OF BIOMETRICS
DNA matching : The "ultimate" biometric technology which would
produce proof-positive identification of an individual. This technology is
still not considered a "biometric" technology and is years away from any
kind of implementation. It is also very intrusive for the user.
Active Advertisement :Advertisements based on who you are
National Biometric Database (NBDb) :National Database of citizens used
for multiple purposes
Automobile Security: No more keys, just you
CONTROLLING THE HUMAN FACTOR OF BIOMETRICS

Users may become uncooperative if systems


limitations are not tested
 Simple Hygiene of users may create problems with authentication
 If the person has arthritis, long fingernails, is wearing hand cream or has
circulation problems then this will not produce a good reading
 Around half the population wears glasses or contact lenses.
 People age
MAINSTREAM ISSUES IN BIOMETRICS

 Personal Privacy
 Physical Privacy
 Religious Objections
 System attack vulnerabilities (e.g. denial of service)
 Insider threat
 Hacking
 Spoofing
 Operational vulnerabilities (e.g. distraction and vigilance)
 Face
 Skin texture and reflectance
 Speaker ID
 DNA
 Template aging
 Simulation, e.g., synthetic aging
COUNTRIES APPLYING BIOMETRICS

United States - The United States government has become a strong


advocate of biometrics with the increase in fear of terrorism
since September 11, 2001. The FBI is currently spending $1 billion to
create a new biometric database, which will store DNA, fingerprints, and
other biometric data. The computers running the database will be
contained in an underground facility about the size of a football field.
The Information Processing Technology Office, ran a program known
as Human Identification at a Distance which developed technologies that
are capable of identifying a person at up to 500 ft by their facial features.
The US Department of Defense (DoD) Common Access Card, is an ID
card issued to all US Service personnel and contractors on US Military
sites. This card contains biometric data and digitized photographs . 
Germany - The biometrics market in Germany will experience
enormous growth until 2009. “The market size will increase from
approximately 12 million € (2004) to 377 million €” (2009). “The federal
government will be a major contributor to this development”. In particular, the
biometric procedures of fingerprint and facial recognition can profit from the
government project. In May 2005 the German Upper House of Parliament
approved the implementation of the ePass, a passport issued to all German
citizens which contain biometric technology. The ePass has been in circulation
since November 2005, and contains a chip that holds a digital photograph and
one fingerprint from each hand
Brazil - Since the beginning of the 20th century, Brazilian citizens have had user ID
cards. The decision by the Brazilian government to adopt fingerprint-based biometrics.
Iraq - Biometrics are being used extensively in Iraq to catalogue as many Iraqis as
possible providing Iraqis with a verifiable identification card, immune to forgery.
During account creation, the collected biometrics information is logged into a central
database which then allows a user profile to be created. Even if an Iraqi has lost their
ID card, their identification can be found and verified by using their unique biometric
information. Additional information can also be added to each account record, such as
individual personal history.
Australia - Visitors intending to visit Australia may soon have to submit to biometric
authentication as part of the Smartgate system, linking individuals to their visas and
passports. Biometric data are already collected from some visa applicants by
Immigration. Australia is the first country to introduce a Biometrics Privacy Code. The
Code includes privacy standards that are at least equivalent to the Australian National
Privacy Principles (NPPs) in the Privacy Act and also incorporates higher standards of
privacy protection in relation to certain acts and practices.
India
India has planned an ambitious mega project. To provide a unique identification
number to each of its 1.25 billion people. The Identification number will be
stored in a central databases. consisting the biometric information of the
individual. If implemented. This would be the biggest implementation of the
Biometrics in the world.
CONCLUSION
Biometrics comprises methods for uniquely recognizing humans based upon
one or more intrinsic physical or behavioral traits. In information technology, in
particular, biometrics is used as a form of identity access
management and access control. It is also used to identify individuals in groups
that are under surveillance.
Queries if any…….
Presented by Renjith. S.
Thank you for one & all ………..

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy