Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Biometrics Overview
What are Biometrics? Automated methods of identifying or verifying the identity of a person based on a physiological or behavioral characteristic
Physical: Fingerprint Facial Recognition Hand Geometry Iris Scan Retinal Scan DNA Behavioral: Speaker Recognition Signature Recognition
Biometrics Overview
2 ways to recognize a person:
Verification Am I who I claim to be?
Identification Who am I?
Confirm or establish identity based on who person is NOT what person possesses
ID card
Fingerprint
Fingerprint Pattern Analysis Typical System: fingerprint scanner maps the
series of whorls, ridges, furrows and minutiae on the surface of the finger Applications:
o o o o
Law Enforcement Entry Devices for Buildings Computer Network Access New: grocery stores checkout, ATM authorization
camera input of a persons face images- measures facial structure; compares against database Applications:
o
Hand Geometry
Hand shape analysis and measurement
Iris Recognition
Iris analysis Typical system: scanner analyzes the colored tissue
Law Enforcement Employee Security Check Streamline boarding procedures (frequent passengers Charlotte NC)
Retina Scanning
Analysis of layer of blood vessels at the back of the
eye Typical system: low-intensity light source and an optical coupler; the user needs to remove glasses, keep the eye focused on the light, 15 seconds Applications:
o
Medical applications Paternity Tests Criminal identification and forensics Personal Identification: DNA PAK38 (Personal Archival Kit): conserving a sample so the person can be identified in case of kidnapping, accidents or natural disasters. Commercial applications limited
Speaker Recognition
Voice print analysis Typical system: uses the pitch, pattern, tone,
rhythm of speech for identification purposes; only biometric that allows users to authenticate remotely Applications:
o o o o
Call Centers Law enforcement house arrest authentication Electronic commerce Customer authentication for service calls
Signature Recognition
Handwriting analysis Typical System: user will sign on a tablet, the device will
record pressure, speed, sequence and shape of characters and compare to a database
o
Verification
Signature Recognition
Biometric not capable Biometric capable
. . . . . . . .
Identification
. . .
Verification: Input compared to data previously recorded to see if the person is who she claims to be. Identification: input compared to data previously recorded to see who the person is.
Accuracy Reliability
Very High High High Very High Very High Very High Medium Medium High Medium Medium High High High Low Low
Errors
Dirt, dryness Hair, glasses, age Hand injury Poor lighting Glasses none Noise, colds Changing signatures
Accuracy: How well can the specific biometric is able to tell individual apart Reliability: how dependable the specific biometric is for recognition purposes
User Acceptance
Medium Medium Medium Medium Medium Low High Medium
Hardware
Special, cheap Common, cheap Special, mid-price Special, expensive Special, expensive Special, expensive
. .
. .
User Acceptance: willingness of the public to accept the use of the specific biometric Ease of Use: - for both user and personnel .yes Low Cost: is there a low cost option for the specific biometric no Hardware: type and cost of hardware required to use the specific biometric
Benefits of Biometrics
- Increased security - Convenience - Opportunity to build
and advancement
Benefits of Biometrics
For Employers
Increased security measures
For Employees
Convenience no passwords
due to lack of sharing passwords and identification cards Reduce costs of password and ID card maintenance Reduce payroll costs of buddy punching timecards Sustainable competitive advantage for businesses advanced technology to ensure security for clientele Ability to track employees and link activities
to forget Eliminate problems of long passwords and lost/stolen identification cards and PIN numbers Faster login time Improved security of sensitive information
employees
-- Costly and time
consuming to implement
For Employees
Biometrics can seem intrusive
Biometric data is very sensitive and security of this information is vital more susceptible to hackers It is possible to steal fingerprints by using the latent fingerprint residue left from touching a surface Text-based voice recognition may have errors identifying individuals if their voice changes Biometrics cant be used with certain groups such as people with disabilities Biometrics, like all other security identification methods, is not foolproof Biometric systems costly and time consuming to implement
to employees intrudes on personal space Employees may be reluctant to change Biometric identification cannot work with all employees, such as disabled individuals Employees scared of biometric information to be abused or stolen
concerns with the abuse of biometric technology and identification. The BITE Project (Biometric Identification Technology Ethics) is a team in Europe that looks at the social, cultural and ethical factors arising from emerging biometric identification technologies.
understand the scope of how employees view biometric technology and their concerns of ethics and privacy.
99.51% surveyed feel the general public is not clearly or poorly informed of biometrics 82.09% feel that biometrics can potentially used to discriminate against ethnic/cultural/racial/religious groups 86.26% feel biometrics should not be permitted to use information to create its own profile of the individuals habits and activities
Biometrics in Business
Current Biometric Applications:
Computer logins ATMs Grocery stores Airport kiosks Drivers licenses Internet banking National ID cards Welfare disbursement International border crossing Forensics criminal identification Annual amusement park pass holders Speaker verification for television home shopping
Biometrics in Business
Signature verification:
Fingerprint
identification:
Speaker recognition:
Biometrics in Business
Other biometric technology being used: Automobiles
E-passports Passports with embedded chip containing persons facial image and other traits
Biometrics in Business
U.S. Department of Defense United States Navy Use of Biometrics Currently implementing a pocket-sized identity dominant system to identify sailors and determine suspected terrorists. The Navy has spent approx $13 in research and design. Scan crew of ship against the Defense Departments Automated Biometric Identification System (ABIS) database. Uses biometrics to identify detainees and terrorists Use fingerprint devices, iris scanners, and electronic databases to screen applicants requiring security clearances Use biometrics to identify and determine security access for certain Air Force bases which frees personnel time and controls access.
Biometrics in Business
Travel and Transport Biometrics is growing in the travel and transportation industry due to heightened security measures since 9/11 Examples of how biometrics will be used in the future:
Identification of employees in secure areas at airports, ports Identification of passengers and monitor of international travel against illegal immigrants Surveillance of individuals in terminals in regards to criminal activities Visa control
Recommendations
Biometrics as a way to achieving a sustainable
competitive advantage must be significant to the users/customer experience and business processes.
Recommendations
Implementation of a Biometrics program is important in
Recommendations
Businesses must evaluate relative accuracy, cost,
Relative Effort = Facial, Signature, Iris Scan Relative Cost = Keystroke Scan Relative Intrusiveness = Voice Scan Accuracy = Iris Scan
Recommendations
Consider your identification needs will this have positive ROI? What information is most sensitive in nature?
Ask if a Biometric System will benefit consumers? Improve services? Reduce costs? A Biometric System should benefit all aspects of business.
Research and decide the type of Biometric System. Perform risk analysis of different programs. Not all Biometric Systems work for every company. Ensure biometric information is secured. Biometric data is highly sensitive and can be susceptible to hackers. Test all Biometric systems before put in production. Educate employees in the new system and inform them of the advantages of Biometric system. Employees may be reluctant to change.
Thank you!
For additional information please visit Illumination 2ck Wiki
http://sites.google.com/site/illumination2ck/