1 / 19

Ankit Mehta ankitmehta03@gmail

Ankit Mehta ankitmehta03@gmail.com. Biometrics. What are Biometrics?. Biometrics Overview. Automated methods of identifying or verifying the identity of a person based on a physiological or behavioral characteristic. Physical: Fingerprint Facial Recognition Hand Geometry Iris Scan

cstratton
Télécharger la présentation

Ankit Mehta ankitmehta03@gmail

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ankit Mehtaankitmehta03@gmail.com Biometrics

  2. What are Biometrics? Biometrics Overview • Automated methods of identifying or verifying the identity of a person based on a physiological or behavioral characteristic • Physical: • Fingerprint • Facial Recognition • Hand Geometry • Iris Scan • Retinal Scan • DNA • Behavioral: • Speaker Recognition • Signature Recognition

  3. Biometrics Overview 2 ways to recognize a person: • Verification • Am I who I claim to be? • Identification • Who am I? Confirm or establish identity based on who person is • NOT what person possesses • ID card • NOT what person remembers • Password

  4. Fingerprint • Fingerprint Pattern Analysis • Applications: • Law Enforcement • Entry Devices for Buildings • Computer Network Access • New: grocery stores checkout, ATM authorization

  5. Face characteristics analysis • Typical system: digital video camera input of a person’s face images- measures facial structure; compares against database • Applications: • Law enforcement • Automated bank tellers- user verification purposes Facial Recognition

  6. Hand Geometry • Hand shape analysis and measurement • Typical system: scanners with guidance pegs that position the hand property for analysis • Applications: • San Francisco International Airport • Immigration facilities • Day Care Centers

  7. Iris Recognition • Iris analysis • Typical system: scanner analyzes the colored tissue around the pupil • Applications: • Law Enforcement • Employee Security Check • Streamline boarding procedures (frequent passengers – Charlotte NC)

  8. Retina Scanning • Analysis of layer of blood vessels at the back of the eye • Typical system: low-intensity light source, the user needs to remove glasses, keep the eye focused on the light, 15 seconds • Applications: • High-end security: military, power plans

  9. DNA (Deoxyribonucleic acid) • A DNA sample is used to produce either a DNA fingerprint or a DNA profile • Applications: • Medical applications • Paternity Tests • Criminal identification and forensics • Personal Identification: DNA PAK38 (Personal Archival Kit): conserving a sample so the person can be identified in case of kidnapping, accidents or natural disasters. • Commercial applications limited

  10. Speaker Recognition • Voice print analysis • Typical system: uses the pitch, pattern, tone, rhythm of speech for identification purposes; only biometric that allows users to authenticate remotely • Applications: • Call Centers • Law enforcement – house arrest authentication • Electronic commerce • Customer authentication for service calls

  11. Signature Recognition • Handwriting analysis • Typical System: user will sign on a tablet, the device will record pressure, speed, sequence and shape of characters and compare to a database • Applications • Access to documents • Execution of contracts • Banking services

  12. Comparison Chart Use Verification: Input compared to data previously recorded to see if the person is who she claims to be. Identification: input compared to data previously recorded to see who the person is. Biometric not capable Biometric capable

  13. Comparison Chart Accuracy/Reliability Accuracy: How well can the specific biometric is able to tell individual apart Reliability: how dependable the specific biometric is for recognition purposes

  14. Comparison Chart Characteristics User Acceptance: willingness of the public to accept the use of the specific biometric Ease of Use: - for both user and personnel Low Cost: is there a low cost option for the specific biometric no Hardware: type and cost of hardware required to use the specific biometric • .yes

  15. Comparison Accuracy vs. Cost

  16. Traditional verification methods: What Biometrics are Replacing • Passwords • PIN numbers • Tokens • Photo ID cards • Smart cards • Magnetic strip cards • Physical keys • Key chains

  17. Benefits of Biometrics - Increased security - Convenience - Opportunity to build a sustainable competitive advantage - Growing technology and advancement

  18. Conclusion For Employers For Employees • Increased security measures due to lack of sharing passwords and identification cards • Reduce costs of password and ID card maintenance • Reduce payroll costs of “buddy punching” timecards • Sustainable competitive advantage for businesses – advanced technology to ensure security for clientele • Ability to track employees and link activities • Convenience – no passwords to forget • Eliminate problems of long passwords and lost/stolen identification cards and PIN numbers • Faster login time • Improved security of sensitive information

  19. Thank you! /

More Related