Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Post on 29-Jan-2016

213 views 0 download

Tags:

transcript

Biometric Technologies

Presented By:

Student Id: S083008900274

1

Unique Star

Overview

Definition of biometrics Purpose of biometrics and what it provides over

conventional security Introduction of subgroups of biometrics Current use of biometrics Conclusion and thoughts on future developments

2

Biometrics are automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics.

Biometric scanning is used for two major purposes: identification and authentication.

Identification: “Do I know who you are?” One to ManyAuthentication: “Are you who you claim to be?” One to One

Biometric scans are more accurate, make it difficult to masquerade, and generally require less of the user than standard security measures such as password protection.

Biometric technology falls roughly into eight categories: finger, hand, iris, retina, face, Signature Recognition , Keystroke Recognition, and voice recognition.

3

Definition of Biometrics

Physiological BiometricsFingerprint RecognitionHand Geometry Recognition Iris Recognition Retinal Scanning Facial Recognition

Behavioral Biometrics.Voice Recognition Signature Recognition Keystroke Recognition

4

Types of Biometrics

The most widely-used biometric technology. Measures the unique, complex swirls on a

person's fingertip. The swirls are characterized and produced as a template requiring from 250-1,000 bytes

5

Fingerprint Scan

Hand scan, also known as hand geometry, is a biometric authentication technology.

The system maps key features of the topography of a person's hand, measuring all the creases on the palm.

This is more expensive and considered less accurate than other biometrics.

Strength: requires only ~9 bytes to store template.

6

Hand Scan

The technology examines the unique patterns of the iris, the ring around the pupil.

Very complex. Iris scans are non-invasive. The person puts their

face in front of a camera which then analyzes all the features.

Even works with corrective lenses. Highest accuracy of all the biometric technologies.

7

Iris Scan

The Retinal scans examine the blood vessel patterns of the retina, the nerve tissue lining the inside of the eye that is sensitive to light.

An infrared light source is used to illuminate the retina of the eye. The image of the enhanced blood vessel pattern of the retina is analyzed for characteristic points.

It is also among the most difficult to use, and is perceived as being moderately to highly intrusive

8

Retinal Scan

One method is called feature analysis which tracks about 80 facial characteristics.

A facial template requires ~1,300 bytes. Essentially, the technology measures the peaks

and valleys of the face. more suitable for wide range. Expensive

9

Facial Scan

Voice is a behavioral biometrics. Voice verification is used with passwords and PIN

numbers. Voice dynamics relies on the production of a

"voice template" that is used to compare with a spoken phrase. A speaker must repeat a set phrase several times as the system builds the template.

10

Voice Scan

Signature scan - analysis of characteristics in an individuals signature. May soon help address the very large demand for document authentication.

Keystroke scan - analysis of an individual’s typing pattern. Can be used along with passwords for a very secure system.

Body odor, skin pores, wrist/hand veins, DNA, Shape of ear, Gait, etc…

11

Others

Network security - Authentication, ATM, Internet banking.

Non-Network based security - Home use, content control.

Sensitive environments, e.g. government buildings, prisons

Schools - Library cards, Computer access, Enrollment.

Businesses - Time and attendance. Law Enforcement - Casino Operations, Super

Bowl. Etc…., The uses are endless.

12

Use of Biometrics

Imagine a secure world without passwords.

13

Conclusion

14

15