1 / 9

A Trusted Biometric System

A Trusted Biometric System. Presented By Yuan Qian Liqun Chen,Sinani Pearson,Athanasios Vamvakas Trusted E-Service Laboratory HP Laboratories Bristol HPL-2002-185 July 15th, 2002. Judging points of the information required to access a good trusted security system in my view.

cecilm
Télécharger la présentation

A Trusted Biometric System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Trusted Biometric System Presented By Yuan Qian Liqun Chen,Sinani Pearson,Athanasios Vamvakas Trusted E-Service Laboratory HP Laboratories Bristol HPL-2002-185 July 15th, 2002

  2. Judging points of the information required to access a good trusted security system in my view • Self importance (Affordable to lose? ) • Protection difficulty (difficulty to copy, difficulty of imitation, difficulty to disclose, difficulty to be stolen) • Safe to use (In terms of potential damage to your health) • Cost of implantation for security verification Goal: No , Easy, Safe, Low

  3. Compare/Contrast of two type password • Self Importance : External Object based Low, (hardly any in most case) Biometric based High • Protection : Subjectively Objectively (Beyond users’ control) External Object based (abstract/real object) Easy/Hard Hard/Easy Biometric based Easier Hard

  4. Safe to use :(In terms of potential damage to your health) External Object based: Hardly any damage Biometric based: Could be.(Are you afraid of cornea scanning?) • Cost of hardware implantation for security verification : External Object based(abstract/real object): Medium/Low Biometric based: High

  5. Briefly Review • Introduce the Trusted Platform Module (TPM) • Mutual integrity checking thought the TPM before Biometric Data and Smart Card with biometric code gets send • After pass the integrity check, verification is executed on the TPM after biometric information gets send to the TPM • Data is encrypted by asymmetric encryption algorithms during the transmission

  6. So how does this implantation affect the four points? • Self Importance : Not mentioned, assume remains same • Safe to use : Not mentioned, assume remains same • Protection: (Let us judge this technology from the paten point of view) • New ? Not completely. Some progress is using the encryption which is based on the current widely used encryption mechanism (public key, private key) • Useful ? • It adds one more defense shield • TPM should take responsibility after authorizing user to use contrast to use at the user’s risk before

  7. Cost ? • Unfortunately, not mentioned in detail in the article. • Some doubts about the abstract description : “It has been designed to do all this at minimal cost, to promote wide deployment” - How minimal is the “minimal cost” ? - “minimal cost” should compare to other implementations with the same purpose or goal, instead of comparing to all its own possible implementation outcomes only, and also should compare to the gain Does this “minimal cost” support this?

  8. Conclusion To the implementation Appreciation - TPM is taking the responsibility, so at least users do not need to worry about using - Encryption algorithms involved is well designed and it is widely accepted to use already - Not very difficult to implement in terms of technique Criticism - Not focused on the key point (users’ BD and SC) itself - Cost is hard minimize according to its implementation description in my view

  9. To the article Appreciation - Steps for data encryptions explained clearly - Encryption algorithms involved is well designed and it is widely accepted to use. Criticism - Motivation “Unfortunately, biometrics has its own drawbacks. Unlike a password, a user’s biometric information, such as face, fingerprint, hand, iris etc is unchangeable.” better to have a full contrast view against the other type based password - Low cost is inconvincible, need more detailed explanations

More Related