1 / 16

Biometrics

Chuck Cook Matthew Etten Jeremy Vaughn. Biometrics. Overview. What is Biometrics? Why use Biometrics? Types of Biometrics Uses and Applications of Biometrics. Definitions. As a process:

inoke
Télécharger la présentation

Biometrics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chuck Cook Matthew Etten Jeremy Vaughn Biometrics

  2. Overview • What is Biometrics? • Why use Biometrics? • Types of Biometrics • Uses and Applications of Biometrics

  3. Definitions • As a process: Automated methods of identifying a person based on measurable biological and behavioral characteristics. • As a characteristic: A meaurable biological and behavioral characteristic that can be used for automated identification.

  4. Performance – accuracy and speed increase with technological advances Public Acceptance Difficult to forge Do not need to remember passwords Why Biometrics • Universal – we all share the same physiology • Unique – especially when used together • Permanent – most do not change over time • Collectable – easy to gather and store data

  5. Fingerprints • Advantages: Multiple fingers, easy use, proven technology, large database exists, ridges last a lifetime • Disadvantages: Age and/or occupation may impede recognition

  6. Facial Recognition • Advantages: No contact required, cameras are common, easy for people to verify • Disadvantages: Face can be obstructed, sensitive to changes in expresson, age and lighting

  7. Iris Recognition • Advantages: No contact required, eye is less prone to injury, and iris is stable over lifetime • Disadvantages: Difficult to capture for some

  8. HandGeometry • Advantages: Easy to capture, believed to be stable over lifetime • Disadvantages: Requires some training, not sufficiently distinctive over a large population

  9. Other Techniques • Signature/Handwriting • Voice/Speech • Retinal Scans • Facial Thermography • Vascular Patterns • Keystroke Patterns

  10. Biometric System • 5 Basic Components • Sensors – collect data • Processing Algorithms – develop a template • Data Storage – Hard drives or smart cards • Matching Algorithms – compare template with new data • Decision Process – Automated or Human-assisted

  11. Usage • Verification A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smart card, username or ID number. • Identification A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual.

  12. Law enforcement Consumer/Retail National security Secure banking Health services Applications • Building or secure location access • Access to computer systems • Passports/Travel • Employee recognition • Elections

  13. Health Care Applications • Privacy • HIPAA and other such acts guarantee privacy • United States require that physicians and healthcare professionals who use electronic records track every time a patients record is accessed. • Biometrics can help secure these records, as well as keep track of who did, or tried to, access healthcare records

  14. Law Enforcement Applications • Greatly reduce paperwork • Sensitive information can be identified using national or regional databases • Move from ink and paper fingerprinting to digital systems to save time and money • Facial recognition can be obtained using “mug shots”

  15. Consumer Applications • Controlled access to personal computers, mobile devices, private data, medical records, etc. • Product can customize itself to you, based on your identity • Identify age or criminal record for selling of restricted items (Alcohol and firearms)

  16. Financial Applications • ATM machines could use Iris or facial recognition as opposed to a 4 digit PIN • Easier to steal cash or credit card numbers than physical features

More Related