1 / 53

Biometrics in Society

Biometrics in Society. Trai Corte Karrah Parker Shannon Adams Earline (Lane) Rocks. Our Group. Trai Corte . Our Group. Karrah Parker. Shannon Adams . Lane Rocks. The Question. Laws have been passed requiring biometrics to be used in Digital Passports.

truda
Télécharger la présentation

Biometrics in Society

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Biometrics in Society Trai Corte Karrah Parker Shannon Adams Earline (Lane) Rocks

  2. Our Group Trai Corte

  3. Our Group Karrah Parker

  4. Shannon Adams

  5. Lane Rocks

  6. The Question Laws have been passed requiring biometrics to be used in Digital Passports. Should this be extended to other areas like credit card security, etc.?

  7. Stop & Think

  8. What is biometrics to you? Demolition Man, 1993

  9. What is biometrics?   The statistical analysis of biological observations and phenomena The measurement and analysis of unique physical or behavioral characteristics especially as a means of verifying personal identity <<<Merriam Webster>>>

  10. What is biometrics?

  11. Educational Sectors • Masters Program in Biometrics • Security • Healthcare • Video Games • Transportation

  12. Usage Sectors Government Private Businesses Research/Academics

  13. Government Sector • National Security & Technology Counsel • 1993 • Sub-Committee on Biometrics • 2003 • National Biometrics Challenge • Set in 2006, 5 years to 2011 • Evolving mission needs, coupled with advances in technology, have created the need for a new structuring of biometric priorities

  14. Biometrics.gov Biometrics referefences Presidential Directives Subcommittees Federal biometric standards policy Registry of recommended standards.

  15. Why? 9/11

  16. Strategic Usage Cameroon, 2012

  17. Strategic Usage Cameroon, 2012

  18. Private Sector

  19. History of Biometrics • Wording • Greek roots • Bio (Life) • Metrics (Measure)

  20. History of Biometrics We can say that it goes back as far as time goes.

  21. Biometrics in Life

  22. Biometrics in Life

  23. Biometrics in Social Media

  24. Biometrics in Social Media

  25. Types of Technology and Their Advantages Finger Print Recognition This has a high accuracy when it comes to identifying a person It is also very commonly seen and has the most development time. Simple and standardized Requires a small storage space for biometric template. This means that it reduces the size of databases that are required

  26. Types of Technology and Their Advantages • Palm Print Recognition • Basically does the same thing as a finger print scanner but has a larger area and can capture more distinct features for identification purposes. • Though it is not very common it is still highly accurate when identifying a person • This is also easy to standardize as it will have a similar standardization to fingerprint scanners

  27. Types of Technology and Their Advantages • Hand Geometry • Even with special hardware, this type of biometric scanner can be easily integrated into other devices and systems without causing any problems • This has the lowest amount of storage data and requires an even smaller database than required for fingerprint scanners

  28. Types of Technology and Their Advantages • Dynamic Signature • The most common biometric signature we use today. • It can compare your signature to the likeness of other signatures you have done to get a positive verification • This has a high accuracy and it is standardized

  29. Types of Technology and Their Advantages • Speaker Recognition • This is a very secure biometric technology • It is non-intrusive and is also highly socially accepted • It takes about 5 seconds to verify a person • It is also the cheapest biometric technology to buy

  30. Types of Technology and Their Advantages • Facial Recognition • This is a non-intrusive technology • It is also a very cheap biometric technology • Along with finger print biometric technology, facial recognition is a common law enforcement tool do to its facial scanning algorithm

  31. Types of Technology and Their Advantages • Iris Recognition • Very High Accuracy • Verification time is less than 5 seconds • Since the eye of someone who is dead will deteriorate too fast and became useless, there are no extra precautions to ensure that a person is alive at the time of the scan

  32. Types of Technology and Their Advantages • Retinal Recognition • Retinal Scanning • Very High Accuracy • There is no known way to replicate a retina so it is also very secure • As with Iris Recognition, dead eyes are useless

  33. For more information… • http://www.biometrics.gov/ • http://www.biometrics.org/

  34. Overall Advantages of Biometrics Usage • Biometrics generally… • Have a higher security than normal methods • Reduce the number of fraud attempts • Eliminate the problem of lost, forgotten or stolen cards and passwords • Reduce certain costs like Password Admin. • Are more accurate at identifying a person • More convenient

  35. Advancing Technology • Biometric technology is used in many fields from banking to law enforcement to simple things as getting into your laptop. This type of commonality allows for the advancement of a young science that has a lot of growth left in it. • More common uses in the public will also help increase awareness for the technology as well as help improve the security standards. • There are even newer types of biometric scanners being made and experimented with.

  36. Advancing the Technology • There is the Vascular Pattern Recognition: This type of scanner will scan the path of blood vessels in the human body and use them to verify a person. You don’t even need to be touching anything, you just have to stand there • Another is a system that scans the DNA of a person. Since DNA is unique to the individual, it would be impossible for anyone to copy that. It has already been implemented in many fields, such as law enforcement, but it is still a very young technology and has a lot of improving to do to increase things like verification speeds. • As the technology grows, prices for it will be cheaper and things like data base storage will begin to get smaller.

  37. Useful but not ‘keys’… Secrecy Random Ability to update Ability to destroy

  38. Once owned, forever owned … FOREVER…

  39. Arguments to Slow the Integration of Biometrics in Society “Once a person’s biometrics have been compromised, they will always be compromised. Deloitte & Touche researchers in 2006 LEGITIMATE THREAT

  40. Biometrics Hacking Teams

  41. Once owned, forever owned … FOREVER…

  42. Identify Theft One of the largest growing crimes on the internet! An Identity is stolen every 3 seconds! Sophisticated hackers create new ways to hack you .

  43. Replication? Since the technology is cheap to obtain most can be replicated. What happens when someone lifts your finger print ? Or what happens when the system fails? Will you be able to purchase? How soon?

  44. Cyber Attacks Many Foreign hackers and or adversaries attempt every day to collection information Your biometrics and all personal information can be compromised by foreign powers. Databases with the information only provoke attacks, especially government and military personnel.

More Related