Sei sulla pagina 1di 26

BIOMETRIC TECHNOLOGY

PRESENTED

BY

BESSY BASIL
S3 CS
ROLL NO:52
Biometrics
Descriptions

• Biometrics: Science of identifying, or


verifying the identity of, a person based on
physiological or behavioral characteristics
CHARACTERISTICS USED

• Fingerprints
• Voiceprints
• Facial features
• Writing patterns
• Iris patterns
• Hand geometry
Why use biometrics?
Traditionally…
• What you have – keys, badges, ID cards
• What you know – username/password, PIN,
combination, personal info. (SSN, DOB, etc.)
BIOMETRICS…
• What you are
– Convenience (can’t lose it or forget it)
– Helps combat identity theft, workplace fraud, etc.
– National security (Iraq, Afghanistan, US borders)
– Personal security (protects personal property)
How is biometrics used?

• ATM
• Retail Purchases
• Airports
• Criminals
• Cold Cases
– Afghan girl
• Commercial
– Laptops, PCs
– Home and Car locks
HOW IT WORKS

– The hardware captures the salient human


characteristic

– The software interprets the resulting data and


determines acceptability.
What is a Biometric Identification
System(BIS)?
How do you build such a System?
• A Biometric Identification System is:
– A combination of multiple components build into a turn-key, end-
to-end Integrated system which at core for one or multiple
biometrics solves the two main problems of:
• Image Processing and Template Extraction and,
• Search and Matching;
• plus
– The full range of business and customer operation requirements
for the target market application;
• Criminal Justice Information Systems, (AFIS)
• Civil Identity Management, (National ID Card, Voter
Registration, Passport/Visa, Driver License)
• Commercial market, (Cybersecurity
Descriptions

• Authorization: Permission or
Authentication:
approval. Validating or figuring
out the identity of a
person.
Authentication

There are 3 traditional way of verifying the identity of a


person:

• Possessions (keys, passports, smartcards , …)

• Knowledge
Secret (passwords, pass phrases, …)
Non-secret (user Id, mothers maiden name, favorite
color)

• Biometrics
Physiological (fingerprints, face, iris, …)
Behavioral (walking, keystroke pattern, talking, …)
Authentication
• The 3 modes of authentication are sometimes combined
– User id + password
– ATM card + password
– Passport + face picture and signiture
Authentication
There are two different authentication methods in
biometrics

• Verification: Is he/she the person who claims


he/she is? Works with id + biometrics. Thus it is
based on a combination of modes.

• Identification: Who is this person? Uses only


the biometrics and searches the entire database
Biometric Identification
Biometric identification is based only on
biometric credentials.
Biometric Identification
Biometric identification system can be used
in two different modes

Positive identification
• Authorization of a group without id

• Negative identification
• Most Wanted List
Biometric Verification
Biometric verification differs from biometric
identification in that the presented biometric is
only compared with a single enrolled biometric
entity which matches the input id
Biometric Enrollment
Process of registering subjects in biometric
database
Positive Enrollment:
• To create a database of eligible subjects
• Biometric samples and other credentials are
stored in the database. An id (or a smart card) is
issued to the subject.

Negative Enrollment:
• To create a database of ineligible subjects
• Often without subject cooperation or even
knowledge
Biometric System Security
• Possible Security Concerns:

– Biometric information is presented when the


owner is not present.

– Hacking the scanner, feature extractor,


matcher, database, and any other possible
module in the system.
Descriptions
• Authorization: Permission to access a resource

• Access Control: A mechanism for limiting the use of


some resource to authorized users

• Access Control List: A data structure associated with a


resource that specifies the authorized users and the
conditions for their access

• Authenticate: To determine that something is genuine; to


determine reliably the identity of the communicating party
• Authentication: Permission to access a resource
Passwords versus Biometrics
• Passwords: Exact match
• Biometrics: Probabilistic match
– FAR, FRR
Benefits of Biometric
Technologies
• Verification of identity upon apprehension of a
suspect
• Identification of potential suspects from forensic
biometric-based evidence
• Identification of persons of law enforcement
interest in public places
• Border control
• Risk management
Benefits of Biometric
Technologies
• Fraud prevention
• Identification theft
• Program administration
• File matching
• Perimeter security
• Access to secure systems
What are biometric downfalls?
• Privacy concerns – biometric traits are publicly known

• Unauthorized use – functionality creep (medical data

• Biometric crimes – kidnapping and theft of body parts.


Spoofing or faking biometrics traits.
RELEVANCE
• The Indian government to new biometric identification cards
to every citizen of the nation that holds 1.2 billion people.

• This new database will help the Indian government collect


taxable income.

• cost -- seven billion pounds ($11.45 billion) and it will be


operated by the Unique Identification Authority, which is a
new government department in India.

• According to Mr.Nandan Nilekani, it will take up to eighteen


months to issue these new identification cards however
FINGERPRINT PC LOCK
FINGERPRINT DOOR LOCK
IRIS SCAN IMAGE

Potrebbero piacerti anche