Title: Introduction to Biometrics
1Introduction to Biometrics
- Dr. Bhavani Thuraisingham
- The University of Texas at Dallas
- Lecture 15
- Biometrics Applications - I
- October 17, 2005
2Outline
- Types of Applications
- Example Government Applications
- Grouping of Applications
- Plan for next few lectures
3References
- Course Text Book, Chapter 10
- http//www.biometricgroup.com/applications.html
- http//www.biometrics.org/REPORTS/CTSTG96/
4Types of Applications
- Identification Systems
- Biometrics are increasingly integrated into
large-scale systems for drivers licensing,
surveillance, health and identity cards, and
benefits issuance. - The need for singular identification and
transactional verification has emerged in various
public and private sector environments. - IT/Network Security
- As more and more valuable information is made
accessible to employees via LAN and WAN, the
risks associated with unauthorized access to
sensitive data grow larger. - Protecting your network with passwords is
problematic, as passwords are easily compromised,
lost, or inappropriately shared.
5Types of Applications (Continued)
- e-Commerce and Internet
- Biometrics are being positioned as a solution for
e-Commerce and Internet security, designed to
ensure that only authorized individuals can
access sensitive data or execute transactions. - Access Control
- Biometrics have proven to be an effective
solution for high-security access control,
ensuring that only authorized individuals can
access protected or secure areas. - Biometric systems require controlled and accurate
enrollment processes, careful monitoring of
security settings to ensure that the risk of
unauthorized entry is low, and well-designed
interfaces to ensure rapid acquisition and
matching
6Types of Applications (Concluded)
- Smart Cards
- Biometrics are an authentication technology
smart cards can be a storage, processing, and/or
authentication technology. - In certain applications, the two technologies
compete, such that an institution may deploy
smart cards instead of biometrics for access
control, or vice versa. - Increasingly, the two technologies are deployed
in conjunction, strengthening each others
capabilities.
7Some Government Applications
- Immigration and Naturalization Service's (INS)
Passenger Accelerated Service System (INSPASS) - INSPASS was designed as a means to provide prompt
admission for frequent travelers to the US by
allowing them to bypass the personal
interview/inspection part of the entry process.
It uses hand geometry to verify the identity of
the traveler at an automated inspection station. - CANPASS
- It is the Canadian version of INSPASS, except
that it uses a fingerprint biometric, rather than
hand geometry, for traveler verification. The
goal of CANPASS is to ease the transfer of goods
and people between the US and Canada
8Some Government Applications (Continued)
- PORTPASS
- It is another INS initiative similar to INSPASS
except that people in vehicles at borders are
being monitored and it uses a voice recognition
biometric, instead of hand geometry. - PORTPASS is used at a US/Canadian vehicle border
crossing and is planned for use at US/Mexican
border crossings. - One version of PORTPASS (the Automated Permit
Port) requires the vehicle to stop. It will also
have a Video Inspection Service, allowing a
driver to conference with an Inspector should the
biometric fail. - Another version, known as the Dedicated Commuter
Lane, uses a radio frequency tag affixed to the
vehicle in order to obtain the biometric as the
vehicle is moving.
9Some Government Applications (Continued)
- Federal Bureau of Prisons
- The Federal Bureau of Prisons is using hand
geometry units to monitor the movements of
prisoners, staff, and visitors within certain
Federal prisons. - Visitors must enroll upon arrival and are given a
magnetic stripe card containing information that
points to his/her identifying information in a
central database. This card must be carried with
the visitor at all times - Staff and inmates must also enroll. Staff are
enrolled to reduce the possibility of mistakenly
identifying them as an inmate or for positive
identification in the event of a disturbance. - Prisoners are enrolled for access control to
places such as the cafeteria, recreation lounges,
and the hospital. The system also allows for the
tracking of prisoners' movements.
10Some Government Applications (Continued)
- Automated Fingerprint Image Reporting and Match
(AFIRM) - The fingerprints of new applicants for welfare
benefits are checked against a central database
of prior claimants. - Spanish National Social Security Identification
Card (TASS) - The TASS program is a smart card initiative
employing fingerprint technology to eliminate
enrollment duplication and provide secure access
to personal information upon retrieval. - The Colombian Legislature
- The Colombian Legislature uses hand geometry
units to confirm the identity of the members of
its two assemblies immediately prior to a vote.
11Some Government Applications (Concluded)
- Some Other Applications
- California, Colorado, Florida, and Texas
Departments of Motor Vehicles, Government
Accounting Office's Electronic Benefits Transfer
(EBT) Task Force, FBI's Integrated Automated
Fingerprint Identification System (IAFIS),
National Crime Information Center 2000 (NCIC
2000) - Other Agencies
- The Defense Advanced Research Projects Agency,
Drug Enforcement Agency, Department of Defense,
Department of Energy, Department of Public
Safety, Department of State, Federal Bureau of
Investigation, Federal Reserve Bank, Hill Air
Force Base, the Pentagon, and the US Mint have
several biometric devices with numerous users for
access control applications
12Grouping Biometrics Applications
- Three Categories of Applications
- (1) Logical Access Applications
- (2) Physical Access Applications
- (3) Identify or Verify the Identity of Individuals
13Additional Criteria for Understanding Biometric
Systems
- In what manner does the user interact with the
system? - Does the use claim identity before interacting
with the system? - What are the applications requirements for
accuracy, enrollment and response time? - Is the user motivated to comply with the
biometrics systems? What sanctions are in place
for misuse? - What is the value of the data or material
protected by the system? - With what non-biometrics technologies do
biometrics compete?
14Seven Horizontal Classifications
- Criminal Identification
- Identify or verify the identity of a suspect or
criminal - Retail ATM Point of Sale
- Identify/verify individuals carrying out
transactions - E-Commerce/Telephony
- Identify/verify individuals carrying out remote
transactions - PC/Network access
- Replace passwords and PINs
15Seven Horizontal Classifications (Concluded)
- Physical access / Time Attendance
- Verify identity of individuals entering and
leaving the building - Citizen identification
- Identify and verify individual entering and
leaving the building - Surveillance
- Verify the identity of individuals present in a
given space
16Biometrics Solution Matrix
- How urgent is the authentication problem that
biometrics are solving - What is the scope of the authentication problem
that biometrics are solving - How well can biometrics solve the authentication
problem? - Are biometrics the only possible authentication
solution? - How receptive are users to biometrics as an
authentication solution
17Groups of Applications
- Citizen Facing Applications
- E.g., Criminal identification
- Employee Facing Applications
- PC/Network access, Physical access
- Customer-facing applications
- POS Transactions
18Plan for Remaining Lectures (Tentative)
- October 19, 2005 Biometrics Applications - II
- October 24, 2005 Guest Lecture
- October 26, 2005 Biometrics Applications - III
- October 31, 2005 Privacy I
- November 2, 2005 Privacy - II
- November 7, 2005 Standards and Interoperability
- I - November 9, 2005 Guest lecture
- November 14, 2005 Standards and Interoperability
- II - November 16, 2005 Secure Biometrics - I
- November 21, 2005 Secure Biometrics II
- November 23, 2005 Review for Finals
- November 28, 2005 Misc. Topics, Review for
Finals