Introduction to Biometrics - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Introduction to Biometrics

Description:

Biometrics are increasingly integrated into large-scale ... and transactional verification has emerged in various public and private sector environments. ... – PowerPoint PPT presentation

Number of Views:120
Avg rating:3.0/5.0
Slides: 19
Provided by: chrisc8
Category:

less

Transcript and Presenter's Notes

Title: Introduction to Biometrics


1
Introduction to Biometrics
  • Dr. Bhavani Thuraisingham
  • The University of Texas at Dallas
  • Lecture 15
  • Biometrics Applications - I
  • October 17, 2005

2
Outline
  • Types of Applications
  • Example Government Applications
  • Grouping of Applications
  • Plan for next few lectures

3
References
  • Course Text Book, Chapter 10
  • http//www.biometricgroup.com/applications.html
  • http//www.biometrics.org/REPORTS/CTSTG96/

4
Types of Applications
  • Identification Systems
  • Biometrics are increasingly integrated into
    large-scale systems for drivers licensing,
    surveillance, health and identity cards, and
    benefits issuance.
  • The need for singular identification and
    transactional verification has emerged in various
    public and private sector environments.
  • IT/Network Security
  • As more and more valuable information is made
    accessible to employees via LAN and WAN, the
    risks associated with unauthorized access to
    sensitive data grow larger.
  • Protecting your network with passwords is
    problematic, as passwords are easily compromised,
    lost, or inappropriately shared.

5
Types of Applications (Continued)
  • e-Commerce and Internet
  • Biometrics are being positioned as a solution for
    e-Commerce and Internet security, designed to
    ensure that only authorized individuals can
    access sensitive data or execute transactions.
  • Access Control
  • Biometrics have proven to be an effective
    solution for high-security access control,
    ensuring that only authorized individuals can
    access protected or secure areas.
  • Biometric systems require controlled and accurate
    enrollment processes, careful monitoring of
    security settings to ensure that the risk of
    unauthorized entry is low, and well-designed
    interfaces to ensure rapid acquisition and
    matching

6
Types of Applications (Concluded)
  • Smart Cards
  • Biometrics are an authentication technology
    smart cards can be a storage, processing, and/or
    authentication technology.
  • In certain applications, the two technologies
    compete, such that an institution may deploy
    smart cards instead of biometrics for access
    control, or vice versa.
  • Increasingly, the two technologies are deployed
    in conjunction, strengthening each others
    capabilities.

7
Some Government Applications
  • Immigration and Naturalization Service's (INS)
    Passenger Accelerated Service System (INSPASS)
  • INSPASS was designed as a means to provide prompt
    admission for frequent travelers to the US by
    allowing them to bypass the personal
    interview/inspection part of the entry process.
    It uses hand geometry to verify the identity of
    the traveler at an automated inspection station.
  • CANPASS
  • It is the Canadian version of INSPASS, except
    that it uses a fingerprint biometric, rather than
    hand geometry, for traveler verification. The
    goal of CANPASS is to ease the transfer of goods
    and people between the US and Canada

8
Some Government Applications (Continued)
  • PORTPASS
  • It is another INS initiative similar to INSPASS
    except that people in vehicles at borders are
    being monitored and it uses a voice recognition
    biometric, instead of hand geometry.
  • PORTPASS is used at a US/Canadian vehicle border
    crossing and is planned for use at US/Mexican
    border crossings.
  • One version of PORTPASS (the Automated Permit
    Port) requires the vehicle to stop. It will also
    have a Video Inspection Service, allowing a
    driver to conference with an Inspector should the
    biometric fail.
  • Another version, known as the Dedicated Commuter
    Lane, uses a radio frequency tag affixed to the
    vehicle in order to obtain the biometric as the
    vehicle is moving.

9
Some Government Applications (Continued)
  • Federal Bureau of Prisons
  • The Federal Bureau of Prisons is using hand
    geometry units to monitor the movements of
    prisoners, staff, and visitors within certain
    Federal prisons.
  • Visitors must enroll upon arrival and are given a
    magnetic stripe card containing information that
    points to his/her identifying information in a
    central database. This card must be carried with
    the visitor at all times
  • Staff and inmates must also enroll. Staff are
    enrolled to reduce the possibility of mistakenly
    identifying them as an inmate or for positive
    identification in the event of a disturbance.
  • Prisoners are enrolled for access control to
    places such as the cafeteria, recreation lounges,
    and the hospital. The system also allows for the
    tracking of prisoners' movements.

10
Some Government Applications (Continued)
  • Automated Fingerprint Image Reporting and Match
    (AFIRM)
  • The fingerprints of new applicants for welfare
    benefits are checked against a central database
    of prior claimants.
  • Spanish National Social Security Identification
    Card (TASS)
  • The TASS program is a smart card initiative
    employing fingerprint technology to eliminate
    enrollment duplication and provide secure access
    to personal information upon retrieval.
  • The Colombian Legislature
  • The Colombian Legislature uses hand geometry
    units to confirm the identity of the members of
    its two assemblies immediately prior to a vote.

11
Some Government Applications (Concluded)
  • Some Other Applications
  • California, Colorado, Florida, and Texas
    Departments of Motor Vehicles, Government
    Accounting Office's Electronic Benefits Transfer
    (EBT) Task Force, FBI's Integrated Automated
    Fingerprint Identification System (IAFIS),
    National Crime Information Center 2000 (NCIC
    2000)
  • Other Agencies
  • The Defense Advanced Research Projects Agency,
    Drug Enforcement Agency, Department of Defense,
    Department of Energy, Department of Public
    Safety, Department of State, Federal Bureau of
    Investigation, Federal Reserve Bank, Hill Air
    Force Base, the Pentagon, and the US Mint have
    several biometric devices with numerous users for
    access control applications

12
Grouping Biometrics Applications
  • Three Categories of Applications
  • (1) Logical Access Applications
  • (2) Physical Access Applications
  • (3) Identify or Verify the Identity of Individuals

13
Additional Criteria for Understanding Biometric
Systems
  • In what manner does the user interact with the
    system?
  • Does the use claim identity before interacting
    with the system?
  • What are the applications requirements for
    accuracy, enrollment and response time?
  • Is the user motivated to comply with the
    biometrics systems? What sanctions are in place
    for misuse?
  • What is the value of the data or material
    protected by the system?
  • With what non-biometrics technologies do
    biometrics compete?

14
Seven Horizontal Classifications
  • Criminal Identification
  • Identify or verify the identity of a suspect or
    criminal
  • Retail ATM Point of Sale
  • Identify/verify individuals carrying out
    transactions
  • E-Commerce/Telephony
  • Identify/verify individuals carrying out remote
    transactions
  • PC/Network access
  • Replace passwords and PINs

15
Seven Horizontal Classifications (Concluded)
  • Physical access / Time Attendance
  • Verify identity of individuals entering and
    leaving the building
  • Citizen identification
  • Identify and verify individual entering and
    leaving the building
  • Surveillance
  • Verify the identity of individuals present in a
    given space

16
Biometrics Solution Matrix
  • How urgent is the authentication problem that
    biometrics are solving
  • What is the scope of the authentication problem
    that biometrics are solving
  • How well can biometrics solve the authentication
    problem?
  • Are biometrics the only possible authentication
    solution?
  • How receptive are users to biometrics as an
    authentication solution

17
Groups of Applications
  • Citizen Facing Applications
  • E.g., Criminal identification
  • Employee Facing Applications
  • PC/Network access, Physical access
  • Customer-facing applications
  • POS Transactions

18
Plan for Remaining Lectures (Tentative)
  • October 19, 2005 Biometrics Applications - II
  • October 24, 2005 Guest Lecture
  • October 26, 2005 Biometrics Applications - III
  • October 31, 2005 Privacy I
  • November 2, 2005 Privacy - II
  • November 7, 2005 Standards and Interoperability
    - I
  • November 9, 2005 Guest lecture
  • November 14, 2005 Standards and Interoperability
    - II
  • November 16, 2005 Secure Biometrics - I
  • November 21, 2005 Secure Biometrics II
  • November 23, 2005 Review for Finals
  • November 28, 2005 Misc. Topics, Review for
    Finals
Write a Comment
User Comments (0)
About PowerShow.com