Title: An Introduction to AIDC
1An Introduction to AIDC
- Ohio University AIDCTI Conference 2006
2Agenda
- Biometrics and their role in AIDC
- Introduction to Biometrics
- Biometrics Research at Purdue
- Biometrics Demonstration / Lab
3What and Where Can I find AIDC?
- Its knowing instantly whats in a crate from 30
feet away - Putting your hand in a reader to open a door
identifying your access - Scanning a bar code and getting a price
- Identifying an individual wanting access at a
bank account - Identifying a car or truck through a toll booth
and taking the toll money
4Biometrics and their role in AIDC AIDC
Technologies
- AIDC technologies are integrated seamlessly into
the supply chain and everyday life - Reduces errors
- Speeds up processes and delivery times
- Provides item visibility
- Provides major cost savings
- Provides a competitive edge
- Aids in TQM and Process Improvement
5Biometrics and their role in AIDC Biometrics
Applications
- Identity verification / identification of humans
- Can be used in conjunction with other AIDC
technologies
6Who am I?
7How can you prove it?
8Biometrics and their role in AIDC Why use
Biometrics
- Legislative Mandate
- Consumer Demand
9Biometrics and their role in AIDC Legislative
Mandate
- Public Law 107-71 - Aviation and Transportation
Security - For screening of all airline passengers
- Public Law 107-56 - The USA Patriot Act
- Called for the use of emerging technologies to
ensure passengers do not obtain multiple visas - Public Law 107-173 - Border Security Act
- Secure borders with emerging technologies
- Requires foreign visitors to carry travel
documents contain
10Biometrics and their role in AIDC Legislative
Mandate
- The U.S. VISIT Program
- Entry and exit system for foreign travels
requiring a VISA - As of January 5, 2004
- Entry procedures operational at 115 airports and
14 seaports - Exit procedure currently in a pilot test a 1
airport and 1 seaport - By the end of 2004, the US VISIT program should
be operational at the busiest 50 land ports of
entry
11Biometrics and their role in AIDC Manufacturing
Initiatives
- ISA-TR99.00.01-2004 Security Technologies for
Manufacturing and Control Systems categorizes
security issues related to hardware and software
systems including - Distributed Control Systems,
- Programmable Logic Controllers,
- Supervisory Control and Data Acquisition Systems,
- Networked Electronic Sensing Systems and
- Monitoring, diagnostic, and assessment systems
(ISA, 2004, pg 2).
12Biometrics and their role in AIDC Manufacturing
Initiatives
- The American Society for Industrial Security and
Price Waterhouse (ASIS/PWC) study determined that
the greatest losses occur in information related
to Research and Development (RD) and
Manufacturing Processes. - This is particularly relevant in the
pharmaceutical industry. - The Pharmaceutical Industry Profile for 2002
pointed out that the pharmaceutical industry
budget for RD has grown from 1.3B in 1977 to
and estimated 32B in 2002.
13Biometrics and their role in AIDC Manufacturing
Initiatives
- Protection of Intellectual Property
- FDA has expressed concern regarding the ability
to authenticate an individual who performs any
type of transaction, in the manufacturing
process, that would be governed by the
regulations associated with electronic signatures
and the guidance of 21 CFR Part 11.
14Biometrics and their role in AIDC Consumer Demand
- Commercial reality
- Effectiveness of using the system
- Ease of enrollment
- Ease of use
- Stability of the Technology
- Performance
- User Perception
- Price and Effectiveness of Substitution Goods
- Insurance Infrastructure
- Legal Structure
- Human Trust
- Risk of Loss from Intrusion
15Identifying Individuals
- There are three common ways of identifying an
individuals identity - Token
- What the individual has
- An identification card, badge, magnetic stripe
card, or RFID card - Secret/Knowledge
- What the individual knows or owns
- A password, or Personal Identification Number
(PIN) - Biometric
- What the individual is or does.
16Biometrics Applications
- Biometrics are now becoming pervasive
- Border control and security
- Point of sale
- ATMs
- Laptops
- Cell phones
17Biometrics The definition
- the automated recognition of individuals based
on their behavioral and biological
characteristics
18Biometrics The definition
- Universal
- Each person should have the specific biometric
trait - Unique
- Any two people should be sufficiently different
in terms of the characteristic - Collectible
- Biometric traits must be obtainable
- Permanent
- Traits remain invariable over time, allowing for
repeatable measures
19Biometrics The definition
- Can operate in two different modes
- Verification
- Validates a persons identity by comparing the
captured biometric already stored in the system - PIN
- 11 comparison
20Biometrics The definition
- Identification
- System does a search on all of the users in the
database - 1M
- Whose biometric data is this
- Purpose is to prevent a single person from having
multiple identities or aliases
21Biometrics The definition
22Different Types of Biometrics
- Each biometric has a strength and weakness
- No biometric trait or technology is optimal
- Several types of biometrics
23Biological Behavioral
- Behavioral
- Signature
- Keystroke
- Voice
- Gait
- Biological
- Face
- Hand
- Finger
- Iris
- Vein
- Retinal Imaging
- Ear
- Odor
24Face Recognition
- Based on
- Location and shape of facial attributes such as
the eyes, eyebrows, nose, lips and chin, as well
as their relationship to each other - Or an overall approach
- To be successful
- Detect whether a face is present in an image
- Locate the face if there is one
- Recognize the face from a general viewpoint
25Face Recognition
- 3D based on multiple planes
- Recognition Comparison
- 2D based on a flat plane
26Face Recognition
- Recognition Comparison
- 2D points for matching
27Face Recognition Applications
- Border security
- Surveillance
28Fingerprints
- Flow-like features found on human fingers
- Friction Ridges
- Raised surface of your fingers
- Gives you grip
- Valleys
- Lower surface of your fingers
- Ridges and valleys are unique to each person
- Fingerprint formations depend on initial
conditions of the embryonic mesoderm - Completely developed by the 21st week after
conception
29Biometric TechnologiesFingerprint Recognition
30Fingerprint
- The use of fingerprints as a means of
identification were first used by the Chinese in
500 B.C.
- Modern fingerprint
- classifications were established in the late 19th
century. - 1888 Sir F. Galton introduced minutiae point
classification for single fingerprints - Galton
Features
31Applications
- Financial Services
- Credit Unions
- Health Care
- Hospitals
- Telecommunications
- Cell Phones
- Government
- Social Services
- Electronic Commerce
- Credit Card
32Applications
33Biometric TechnologiesHand Geometry
34Hand and Finger Geometry
- Based on measurements of the hand
- Successful biometric installations around the
world - Limitations include size of the device
- Limited market applications
- Aging issues, both young and old
35Hand Geometry
36Hand Geometry Applications
- Time and Attendance
- Entry / Exit
- BSPA Lab Experience
- Rec Center Experience
37Biometric TechnologiesIris Recognition
38Iris Recognition
- Iris is the area between the pupil and the sclera
- Iris carries very distinctive information
- 1 in 1078 chance of someone having an identical
iris as you
39Iris
- Anatomy of the Eye
- Sclera
- Cornea
- Lens
40Iris Code
41Iris Pictures
42Iris Recognition Applications
- Entry and Exit at the Border
43Iris Recognition Applications
44Retinal
- Rich structure at the back of the eye
- Difficult to collect
- requires participation of individuals
45Vascular
- Vein recognition
- Finger based
- Top of hand based
- Palm
46Vein Recognition
47Keystroke Dynamics
- How an individual types on a keyboard
Keystroke latency time
Keystroke press time
48Skin Spectroscopy
49Voice
- 2 types of systems
- Text dependent
- Voice recognition system is based on utterances
of a fixed pre-determined phrase - Text independent
- Voice recognition system recognizes the speaker
independent of what they say
50Signature
- Uses variables linked to how an individual signs
their name
51Fusion
- When more than one biometric is combined, fusion
occurs. - Multi-algorithmic
- Multi-instance
- Multi-modal
52Which one is best
- Technical performance
- Reliability, Availability and Maintainability
(RAM) - Vulnerability
- Security
- User acceptance
- Human factors
- Cost/benefit
- Privacy regulation compliance.
-
53Biometric Testing
- Technology
- Scenario
- Operational
54Biometric Testing
55Are biometrics the answer to the security question
56Biometrics or other AIDC Technology?
57What do students and those wishing to get into
the lab already identify themselves with?
58Are we using access control logs to provide any
additional information about lab usage?
59Does everyone have an ID card, and do they bring
it with them?
60If students do not have their ID, can they use
another method of access?
61How positive do we have to be to identify
individuals who gain access into the lab?
62What is the probability of an attack to the
system the estimated likelihood of a security
breach
63What is the population that will be using the lab?
64Does the population exhibit universality of a
biometric?
65How long will the population use this device for?
66What is user psychology
67Common misconceptions
- Biometrics is absolute security.
- Biometrics works for everyone
- Twins have identical biometric traits (identical
fingerprints, irises...). This is the same for
clones. - Iris will always beat fingerprints.
68Lab Activities after lunch
- 3-D face
- 2-D face
- Hand Geometry
- Iris Recognition
- Fingerprint Recognition
69Any Questions