Corrections Technology Association CTA - PowerPoint PPT Presentation

1 / 38
About This Presentation
Title:

Corrections Technology Association CTA

Description:

Biometrics is the science and technology of authentication (i. ... a week ago at the U.S. government-sponsored Biometrics Consortium Conference in Arlington, Va. ... – PowerPoint PPT presentation

Number of Views:59
Avg rating:3.0/5.0
Slides: 39
Provided by: Richard1350
Category:

less

Transcript and Presenter's Notes

Title: Corrections Technology Association CTA


1
Corrections Technology Association (CTA)
  • Annual Conference 2004

Dominique Harrington
2
Program Manager-West Virginia Operations
  • NATIONAL BIOMETRIC SECURITY
  • PROJECT(NBSP)

3
NBSP MISSION
  • The mission of the NBSP is to facilitate the
    application of positive human identification
    technology for the security of the civil national
    infrastructure in direct response to the
    international terrorist threat.
  • Coalition commitment to the war on terror
  • Focused on civil infrastructure security
  • Out-source for homeland security at all levels
  • Non-profit, non-competitive, unbiased

4
(No Transcript)
5
NBSP Initiatives
  • Publications and guides for biometric
    applications in infrastructure security
  • Definition of requirements for new standards
  • Industry and technology surveys and database
    development
  • Technology and product performance assessments
  • Privacy and civil liberty impact analysis
  • Applied research
  • Educational program support
  • Training and seminars

6
  • What is Biometrics?

7
Biometrics Defined
  • Biometrics is the science and technology of
    authentication (i.e. establishing the identity of
    an individual) by measuring the person's
    physiological or behavioral features.
  • In information technology (IT), biometrics
    usually refers to technologies for measuring and
    analyzing human physiological characteristics
    such as fingerprints

8
  • Why Biometrics?

9
Identification and Authentication
  • Identification and Authentication
  • Has Typically Been Driven By
  • Passwords or Physical Devices

10
Password Problems?
11
The Password Dilemma
Passwords are the most common authenticator Passwo
rds are also the easiest to hack Properly used,
Passwords should be alphanumeric, upper lower
case, and random The dilemma Good passwords are
difficult to recall
12
Identification and Authentication
  • Something you KNOW
  • Passwords
  • PINs
  • Mothers maiden name
  • Something you HAVE
  • ATM card
  • Smart card
  • Driver License
  • Something you ARE!
  • Biometrics

13
Biometrics
  • Physiological (Biological) Characteristics of
    Biometrics include
  • Fingerprint
  • Face
  • Hand Geometry
  • Iris
  • Vein
  • Behavioral Characteristics of Biometrics include
  • Signature
  • Voice
  • Keystroke Dynamics

14
Popular Biometric Technologies
  • Fingerprint verification
  • Iris recognition
  • Hand geometry
  • Facial recognition
  • Voice verification
  • Signature verification
  • Bleeding edge biometrics
  • Gait, DNA, ear, vein geometry, thermal imaging

15
Biometric Platforms
  • Four general platforms
  • Access (Cooperative, known subject)
  • Logical Access (Access to computer networks,
    systems, or files)
  • Physical Access (access to physical places or
    resources)
  • Transaction Logging
  • Surveillance (Non-cooperative, known subject)
  • Forensics (Non-cooperative or unknown subject)

16
Time and Attendance
Accu-Time Systems Biometric Readers Fingerprint
or Hand Geometry
17
Fingerprint Technology
Saflink Corporation Authentec Fingerprint Sensor
with PIN
18
Iris Recognition
LG Electronics Iris Recognition
19
Multi-Modal Solutions
20
Enterprise Solutions
21
Mobile Solutions
22
Biometric IndustryAugust 2001
Long evolutionary path (30 years) Fragmented
(120 small companies) Highly competitiveuneven
marketing and focus Hindered by lack of
knowledge and barriers (privacy issue) Ad Hoc
standards, limited in scope Market pull
ambiguous (not enough pain) Proven performance,
reliability, and cost
23
The Attacks of September 2001
  • Cloaked in anonymity and false identity
  • Demonstrated authentication vulnerabilities in
    many areas of the national infrastructure

24
MARKET REPORT
25
The Long Term View
  • Biometric systems are not a quick fix
  • Substantial commitment in time and resources
  • Difficult to reverse course..be right the first
    time
  • Compatibility and interoperability are critical
  • Need for standards, training, and education
  • Need for fast-track, objective acquisition
    process
  • Respond to homeland security and anti-terrorist
    needs
  • Support all government levels and the private
    sector that manages the civil infrastructure

26
The Homeland Security Infrastructure Threat
  • The Transportation System
  • Border security and international travel
  • Civil aviation in general
  • The Economic System
  • The financial network
  • Key financial centers and facilities

27
The Threat (continued)
  • The Social and Support Structure
  • Government operations and facilities (all
    branches)
  • Life Services facilities (food, power, water,
    gas, oil)
  • Historical and symbolic structures and
    functions
  • The Communications System
  • Voice and data
  • Internet availability and function

28
Biometric Applications
  • Transactions via e-commerce
  • Search of digital libraries
  • Network Access via Microsoft GUI
  • Access to internet and local networks
  • Document encryption
  • Credit cards, bank cards, and ATM machines

29
Biometric Applications (continued)
  • Access to office buildings and homes
  • Protecting personal property
  • Tracking and storing time and attendance
  • Law enforcement and prison management
  • Access to medical and official records
  • Prison visitor systems
  • Drivers licenses

30
Common Ideas for Future Applications
  • Passports with biometric identifiers
  • Workstation and network access (NIAP)
  • Travel, hospitality and tourism
  • Frequent flyer, border control, etc.
  • Internet transactions
  • Public ID cards (controversial)
  • Vehicle Access (automobiles)

31
Central Privacy, Sociological, and Legal
Issues/Concerns
  • System Design and Implementation must adequately
    address these issues to the satisfaction of the
    user, the law, and society.
  • Can medical information be derived from the
    biometric data?
  • Does the biometric system store information
    enabling a persons identity to be
    reconstructed or stolen?
  • Is permission received for any third party use of
    biometric information?

32
Central Privacy, Sociological, and Legal
Issues/Concerns (continued)
  • Continued
  • What happens to the biometric data after the
    intended use is over?
  • Is the security of the biometric data assured
    during transmission and storage?
  • Contrast process of password loss or theft with
    that of a biometric.
  • How is a theft detected and new biometric
    recognized?
  • Notice of Biometric Use. Is the public aware a
    biometric system is being employed?

33
Thank You
34
Contact Information
  • Dominique Harrington
  • 150 Clay Street, Suite 350
  • Morgantown, WV 26501
  • (304)292-8800
  • dharrington_at_nationalbiometric.org

35
General Biometric Process
36
Identification Methods
  • Seek to identify an individual within a
    population of possible users.
  • Identity means persons
  • Appearance
  • Physiological makeup
  • Actions
  • Belief Systems, Sense of Self, etc.
  • We need a manageable engineering definition!

37
Automotive Fingerprint
  • Automobile fingerprint ID project announced
  • By Jack Robertson ESM(02/21/2002 1138 AM EST)
      Fingerprint recognition security got a boost
    Thursday when Delphi, a leading supplier of
    automotive parts, entered a joint agreement to
    develop a vehicle security system based on the
    biometric technology.
  • AuthenTec Inc., Melbourne, Fla., will partner
    with Delphi to integrate its fingerprint
    identification sensor into its existing reference
    design security platform.
  • The soaring use of fingerprint ID systems was
    forecast a week ago at the U.S.
    government-sponsored Biometrics Consortium
    Conference in Arlington, Va.
  • Under the new partnership, AuthenTec will provide
    the sensor pad as well as control and matching
    algorithms and Delphi will develop hardware
    architecture and the integration into vehicles.
    After a prototype is developed, the two firms
    will proceed with application and production
    phases of the agreement.

38
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com