Está en la página 1de 32

ISM 6021 Illumination 2CK Kadi Drennon Clarissa Ignacio Celesta Mitchell

Biometrics Overview
What are Biometrics? Automated methods of identifying or verifying the identity of a person based on a physiological or behavioral characteristic
Physical: Fingerprint Facial Recognition Hand Geometry Iris Scan Retinal Scan DNA Behavioral: Speaker Recognition Signature Recognition

Biometrics Overview
2 ways to recognize a person:
Verification Am I who I claim to be?
Identification Who am I?

Confirm or establish identity based on who person is NOT what person possesses

ID card

NOT what person remembers Password

Fingerprint
Fingerprint Pattern Analysis Typical System: fingerprint scanner maps the

series of whorls, ridges, furrows and minutiae on the surface of the finger Applications:
o o o o

Law Enforcement Entry Devices for Buildings Computer Network Access New: grocery stores checkout, ATM authorization

Face characteristics analysis


Facial Recognition

Typical system: digital video

camera input of a persons face images- measures facial structure; compares against database Applications:
o

Law enforcement Automated bank tellers- user verification purposes

Hand Geometry
Hand shape analysis and measurement

Typical system: scanners with guidance pegs that

position the hand property for analysis Applications:


o o o

San Francisco International Airport Immigration facilities Day Care Centers

Iris Recognition
Iris analysis Typical system: scanner analyzes the colored tissue

around the pupil 200 points: rings, furrows, freckles Applications:


o o

Law Enforcement Employee Security Check Streamline boarding procedures (frequent passengers Charlotte NC)

Retina Scanning
Analysis of layer of blood vessels at the back of the

eye Typical system: low-intensity light source and an optical coupler; the user needs to remove glasses, keep the eye focused on the light, 15 seconds Applications:
o

High-end security: military, power plans

DNA (Deoxyribonucleic acid)


A DNA sample is used to produce either a DNA

fingerprint or a DNA profile Applications:


o o o o

Medical applications Paternity Tests Criminal identification and forensics Personal Identification: DNA PAK38 (Personal Archival Kit): conserving a sample so the person can be identified in case of kidnapping, accidents or natural disasters. Commercial applications limited

Speaker Recognition
Voice print analysis Typical system: uses the pitch, pattern, tone,

rhythm of speech for identification purposes; only biometric that allows users to authenticate remotely Applications:
o o o o

Call Centers Law enforcement house arrest authentication Electronic commerce Customer authentication for service calls

Signature Recognition
Handwriting analysis Typical System: user will sign on a tablet, the device will

record pressure, speed, sequence and shape of characters and compare to a database
o

Cyber SIGN in Action view the movie. 56K modem

Applications o Access to documents o Execution of contracts o Banking services

Comparison Chart Use


Biometric
Fingerprint Facial Recognition Hand Geometry Iris Scan Retinal Scan DNA Speaker Recognition

Verification

Signature Recognition
Biometric not capable Biometric capable

. . . . . . . .

Identification

. . .

Verification: Input compared to data previously recorded to see if the person is who she claims to be. Identification: input compared to data previously recorded to see who the person is.

Comparison Chart Accuracy/Reliability


Biometric
Fingerprint Facial Recognition Hand Geometry Iris Scan Retinal Scan DNA Speaker Recognition Signature Recognition

Accuracy Reliability
Very High High High Very High Very High Very High Medium Medium High Medium Medium High High High Low Low

Errors
Dirt, dryness Hair, glasses, age Hand injury Poor lighting Glasses none Noise, colds Changing signatures

Accuracy: How well can the specific biometric is able to tell individual apart Reliability: how dependable the specific biometric is for recognition purposes

Comparison Chart Characteristics


Biometric
Fingerprint Facial Recognition Hand Geometry Iris Scan Retinal Scan DNA Speaker Recognition Signature Recognition

User Acceptance
Medium Medium Medium Medium Medium Low High Medium

Ease of Low Use Cost


High Medium High Medium Low Low High High

Hardware
Special, cheap Common, cheap Special, mid-price Special, expensive Special, expensive Special, expensive

. .

. .

Common, cheap Special, mid-price

User Acceptance: willingness of the public to accept the use of the specific biometric Ease of Use: - for both user and personnel .yes Low Cost: is there a low cost option for the specific biometric no Hardware: type and cost of hardware required to use the specific biometric

Comparison Accuracy vs. Cost

What Biometrics are Replacing


Traditional verification methods:
Passwords PIN numbers Tokens Photo ID cards Smart cards Magnetic strip cards Physical keys Key chains

Benefits of Biometrics
- Increased security - Convenience - Opportunity to build

a sustainable competitive advantage


- Growing technology

and advancement

Benefits of Biometrics
For Employers
Increased security measures

For Employees
Convenience no passwords

due to lack of sharing passwords and identification cards Reduce costs of password and ID card maintenance Reduce payroll costs of buddy punching timecards Sustainable competitive advantage for businesses advanced technology to ensure security for clientele Ability to track employees and link activities

to forget Eliminate problems of long passwords and lost/stolen identification cards and PIN numbers Faster login time Improved security of sensitive information

Concerns with Biometrics


-- Sensitive biometric

information susceptible to hackers


-- Lack of privacy for

employees
-- Costly and time

consuming to implement

Concerns with Biometrics


For Employers

For Employees
Biometrics can seem intrusive

Biometric data is very sensitive and security of this information is vital more susceptible to hackers It is possible to steal fingerprints by using the latent fingerprint residue left from touching a surface Text-based voice recognition may have errors identifying individuals if their voice changes Biometrics cant be used with certain groups such as people with disabilities Biometrics, like all other security identification methods, is not foolproof Biometric systems costly and time consuming to implement

to employees intrudes on personal space Employees may be reluctant to change Biometric identification cannot work with all employees, such as disabled individuals Employees scared of biometric information to be abused or stolen

Concerns with Biometrics


As with many emerging technologies, there are

concerns with the abuse of biometric technology and identification. The BITE Project (Biometric Identification Technology Ethics) is a team in Europe that looks at the social, cultural and ethical factors arising from emerging biometric identification technologies.

Concerns with Biometrics


The information gathered from The BITE project is helpful to

understand the scope of how employees view biometric technology and their concerns of ethics and privacy.

99.51% surveyed feel the general public is not clearly or poorly informed of biometrics 82.09% feel that biometrics can potentially used to discriminate against ethnic/cultural/racial/religious groups 86.26% feel biometrics should not be permitted to use information to create its own profile of the individuals habits and activities

Biometrics in Business
Current Biometric Applications:

Computer logins ATMs Grocery stores Airport kiosks Drivers licenses Internet banking National ID cards Welfare disbursement International border crossing Forensics criminal identification Annual amusement park pass holders Speaker verification for television home shopping

Biometrics in Business
Signature verification:

Fingerprint

Electronic commerce E-business essential factors for growth:


Highly secure Trustworthy

identification:

Social services Background checks Criminal identification

Speaker recognition:

Large voice processing Verify customer during transactions via telephone

Biometrics in Business
Other biometric technology being used: Automobiles

Replace keys for keyless entry and keyless ignition

E-passports Passports with embedded chip containing persons facial image and other traits

Biometrics in Business
U.S. Department of Defense United States Navy Use of Biometrics Currently implementing a pocket-sized identity dominant system to identify sailors and determine suspected terrorists. The Navy has spent approx $13 in research and design. Scan crew of ship against the Defense Departments Automated Biometric Identification System (ABIS) database. Uses biometrics to identify detainees and terrorists Use fingerprint devices, iris scanners, and electronic databases to screen applicants requiring security clearances Use biometrics to identify and determine security access for certain Air Force bases which frees personnel time and controls access.

United States Army United States Marines

United States Air Force

Biometrics in Business
Travel and Transport Biometrics is growing in the travel and transportation industry due to heightened security measures since 9/11 Examples of how biometrics will be used in the future:

Identification of employees in secure areas at airports, ports Identification of passengers and monitor of international travel against illegal immigrants Surveillance of individuals in terminals in regards to criminal activities Visa control

Recommendations
Biometrics as a way to achieving a sustainable

competitive advantage must be significant to the users/customer experience and business processes.

Recommendations
Implementation of a Biometrics program is important in

high exposure and businesses with high information intensity.

Recommendations
Businesses must evaluate relative accuracy, cost,

intrusiveness, and effort of Biometric Technology


Relative Effort = Facial, Signature, Iris Scan Relative Cost = Keystroke Scan Relative Intrusiveness = Voice Scan Accuracy = Iris Scan

Recommendations
Consider your identification needs will this have positive ROI? What information is most sensitive in nature?

Ask if a Biometric System will benefit consumers? Improve services? Reduce costs? A Biometric System should benefit all aspects of business.
Research and decide the type of Biometric System. Perform risk analysis of different programs. Not all Biometric Systems work for every company. Ensure biometric information is secured. Biometric data is highly sensitive and can be susceptible to hackers. Test all Biometric systems before put in production. Educate employees in the new system and inform them of the advantages of Biometric system. Employees may be reluctant to change.

Thank you!
For additional information please visit Illumination 2ck Wiki
http://sites.google.com/site/illumination2ck/

También podría gustarte