80 likes | 187 Vues
George Turner Effectiveness of Biometric Security. CS591 Semester Project 2010. Abstract. Computers need a way to identify and verify user(s) Protect the identity of the user, without exposure to other malicious users Method should be user friendly, or risk losing user base
E N D
George TurnerEffectiveness of Biometric Security CS591 Semester Project 2010
Abstract • Computers need a way to identify and verify user(s) • Protect the identity of the user, without exposure to other malicious users • Method should be user friendly, or risk losing user base • Be able to assure confidence to user that the computer knows who you are
Current Technique (Passwords) • Pros: • Easy to use, only requires the use of a keyboard • String encryption allows for protection • Users are confident, as this method has been used for 50 years • Cons: • Easy to steal, when non-encrypted • Requires constant changing, for better security • Requires complexity, for better security
Biometrics • Wikipedia: “methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits” • Common Types: Fingerprint, DNA, Voice, Retina. • Recent and continuing trends in technology make this easier and more accurate
Fingerprints • Wikipedia: “No two fingerprints have ever been found identical in many billions of human and automated computer comparisons” • IAFIS, and other databases already have millions of records • Making it’s way onto identification documents, such as driver’s license, and Passports
Current Fingerprint Scanners • Pros: • Easy to use, only requires a swipe of the finger • Scan is unique for all individuals • Scanners are getting cheaper to make (Mid grade quality for $40) • Cons: • Hollywood still portrays as a “vulnerable” technology. • Primary usage is a “password bank”
Operating System and Application Integration • Integrated with all of the major operating systems: Windows, Linux, Mac, Ubuntu • Numerous SDKs for all of the major programming languages (C#, Java, Visual Basic, Delphi, etc.), ranging from Freeware to Full scale business usage