An Introduction to AIDC - PowerPoint PPT Presentation

1 / 69
About This Presentation
Title:

An Introduction to AIDC

Description:

... as a means of identification were first used by the Chinese in 500 B.C. ... Are we using access control logs to provide any additional information about lab ... – PowerPoint PPT presentation

Number of Views:451
Avg rating:3.0/5.0
Slides: 70
Provided by: se9983
Category:

less

Transcript and Presenter's Notes

Title: An Introduction to AIDC


1
An Introduction to AIDC
  • Ohio University AIDCTI Conference 2006

2
Agenda
  • Biometrics and their role in AIDC
  • Introduction to Biometrics
  • Biometrics Research at Purdue
  • Biometrics Demonstration / Lab

3
What and Where Can I find AIDC?
  • Its knowing instantly whats in a crate from 30
    feet away
  • Putting your hand in a reader to open a door
    identifying your access
  • Scanning a bar code and getting a price
  • Identifying an individual wanting access at a
    bank account
  • Identifying a car or truck through a toll booth
    and taking the toll money

4
Biometrics and their role in AIDC AIDC
Technologies
  • AIDC technologies are integrated seamlessly into
    the supply chain and everyday life
  • Reduces errors
  • Speeds up processes and delivery times
  • Provides item visibility
  • Provides major cost savings
  • Provides a competitive edge
  • Aids in TQM and Process Improvement

5
Biometrics and their role in AIDC Biometrics
Applications
  • Identity verification / identification of humans
  • Can be used in conjunction with other AIDC
    technologies

6
Who am I?
7
How can you prove it?
8
Biometrics and their role in AIDC Why use
Biometrics
  • Legislative Mandate
  • Consumer Demand

9
Biometrics and their role in AIDC Legislative
Mandate
  • Public Law 107-71 - Aviation and Transportation
    Security
  • For screening of all airline passengers
  • Public Law 107-56 - The USA Patriot Act
  • Called for the use of emerging technologies to
    ensure passengers do not obtain multiple visas
  • Public Law 107-173 - Border Security Act
  • Secure borders with emerging technologies
  • Requires foreign visitors to carry travel
    documents contain

10
Biometrics and their role in AIDC Legislative
Mandate
  • The U.S. VISIT Program
  • Entry and exit system for foreign travels
    requiring a VISA
  • As of January 5, 2004
  • Entry procedures operational at 115 airports and
    14 seaports
  • Exit procedure currently in a pilot test a 1
    airport and 1 seaport
  • By the end of 2004, the US VISIT program should
    be operational at the busiest 50 land ports of
    entry

11
Biometrics and their role in AIDC Manufacturing
Initiatives
  • ISA-TR99.00.01-2004 Security Technologies for
    Manufacturing and Control Systems categorizes
    security issues related to hardware and software
    systems including
  • Distributed Control Systems,
  • Programmable Logic Controllers,
  • Supervisory Control and Data Acquisition Systems,
  • Networked Electronic Sensing Systems and
  • Monitoring, diagnostic, and assessment systems
    (ISA, 2004, pg 2).

12
Biometrics and their role in AIDC Manufacturing
Initiatives
  • The American Society for Industrial Security and
    Price Waterhouse (ASIS/PWC) study determined that
    the greatest losses occur in information related
    to Research and Development (RD) and
    Manufacturing Processes.
  • This is particularly relevant in the
    pharmaceutical industry.
  • The Pharmaceutical Industry Profile for 2002
    pointed out that the pharmaceutical industry
    budget for RD has grown from 1.3B in 1977 to
    and estimated 32B in 2002.

13
Biometrics and their role in AIDC Manufacturing
Initiatives
  • Protection of Intellectual Property
  • FDA has expressed concern regarding the ability
    to authenticate an individual who performs any
    type of transaction, in the manufacturing
    process, that would be governed by the
    regulations associated with electronic signatures
    and the guidance of 21 CFR Part 11.

14
Biometrics and their role in AIDC Consumer Demand
  • Commercial reality
  • Effectiveness of using the system
  • Ease of enrollment
  • Ease of use
  • Stability of the Technology
  • Performance
  • User Perception
  • Price and Effectiveness of Substitution Goods
  • Insurance Infrastructure
  • Legal Structure
  • Human Trust
  • Risk of Loss from Intrusion

15
Identifying Individuals
  • There are three common ways of identifying an
    individuals identity
  • Token
  • What the individual has
  • An identification card, badge, magnetic stripe
    card, or RFID card
  • Secret/Knowledge
  • What the individual knows or owns
  • A password, or Personal Identification Number
    (PIN)
  • Biometric
  • What the individual is or does.

16
Biometrics Applications
  • Biometrics are now becoming pervasive
  • Border control and security
  • Point of sale
  • ATMs
  • Laptops
  • Cell phones

17
Biometrics The definition
  • the automated recognition of individuals based
    on their behavioral and biological
    characteristics

18
Biometrics The definition
  • Universal
  • Each person should have the specific biometric
    trait
  • Unique
  • Any two people should be sufficiently different
    in terms of the characteristic
  • Collectible
  • Biometric traits must be obtainable
  • Permanent
  • Traits remain invariable over time, allowing for
    repeatable measures

19
Biometrics The definition
  • Can operate in two different modes
  • Verification
  • Validates a persons identity by comparing the
    captured biometric already stored in the system
  • PIN
  • 11 comparison

20
Biometrics The definition
  • Identification
  • System does a search on all of the users in the
    database
  • 1M
  • Whose biometric data is this
  • Purpose is to prevent a single person from having
    multiple identities or aliases

21
Biometrics The definition
22
Different Types of Biometrics
  • Each biometric has a strength and weakness
  • No biometric trait or technology is optimal
  • Several types of biometrics

23
Biological Behavioral
  • Behavioral
  • Signature
  • Keystroke
  • Voice
  • Gait
  • Biological
  • Face
  • Hand
  • Finger
  • Iris
  • Vein
  • Retinal Imaging
  • Ear
  • Odor

24
Face Recognition
  • Based on
  • Location and shape of facial attributes such as
    the eyes, eyebrows, nose, lips and chin, as well
    as their relationship to each other
  • Or an overall approach
  • To be successful
  • Detect whether a face is present in an image
  • Locate the face if there is one
  • Recognize the face from a general viewpoint

25
Face Recognition
  • 3D based on multiple planes
  • Recognition Comparison
  • 2D based on a flat plane

26
Face Recognition
  • Recognition Comparison
  • 2D points for matching
  • 3D points for matching

27
Face Recognition Applications
  • Border security
  • Surveillance

28
Fingerprints
  • Flow-like features found on human fingers
  • Friction Ridges
  • Raised surface of your fingers
  • Gives you grip
  • Valleys
  • Lower surface of your fingers
  • Ridges and valleys are unique to each person
  • Fingerprint formations depend on initial
    conditions of the embryonic mesoderm
  • Completely developed by the 21st week after
    conception

29
Biometric TechnologiesFingerprint Recognition
30
Fingerprint
  • The use of fingerprints as a means of
    identification were first used by the Chinese in
    500 B.C.
  • Modern fingerprint
  • classifications were established in the late 19th
    century.
  • 1888 Sir F. Galton introduced minutiae point
    classification for single fingerprints - Galton
    Features

31
Applications
  • Financial Services
  • Credit Unions
  • Health Care
  • Hospitals
  • Telecommunications
  • Cell Phones
  • Government
  • Social Services
  • Electronic Commerce
  • Credit Card

32
Applications
33
Biometric TechnologiesHand Geometry
34
Hand and Finger Geometry
  • Based on measurements of the hand
  • Successful biometric installations around the
    world
  • Limitations include size of the device
  • Limited market applications
  • Aging issues, both young and old

35
Hand Geometry
36
Hand Geometry Applications
  • Time and Attendance
  • Entry / Exit
  • BSPA Lab Experience
  • Rec Center Experience

37
Biometric TechnologiesIris Recognition
38
Iris Recognition
  • Iris is the area between the pupil and the sclera
  • Iris carries very distinctive information
  • 1 in 1078 chance of someone having an identical
    iris as you

39
Iris
  • Anatomy of the Eye
  • Sclera
  • Cornea
  • Lens

40
Iris Code
41
Iris Pictures
42
Iris Recognition Applications
  • Entry and Exit at the Border

43
Iris Recognition Applications
44
Retinal
  • Rich structure at the back of the eye
  • Difficult to collect
  • requires participation of individuals

45
Vascular
  • Vein recognition
  • Finger based
  • Top of hand based
  • Palm

                                                
                                               
46
Vein Recognition
47
Keystroke Dynamics
  • How an individual types on a keyboard

Keystroke latency time
Keystroke press time
48
Skin Spectroscopy
49
Voice
  • 2 types of systems
  • Text dependent
  • Voice recognition system is based on utterances
    of a fixed pre-determined phrase
  • Text independent
  • Voice recognition system recognizes the speaker
    independent of what they say

50
Signature
  • Uses variables linked to how an individual signs
    their name

51
Fusion
  • When more than one biometric is combined, fusion
    occurs.
  • Multi-algorithmic
  • Multi-instance
  • Multi-modal

52
Which one is best
  • Technical performance
  • Reliability, Availability and Maintainability
    (RAM)
  • Vulnerability
  • Security
  • User acceptance
  • Human factors
  • Cost/benefit
  • Privacy regulation compliance.

53
Biometric Testing
  • Technology
  • Scenario
  • Operational

54
Biometric Testing
55
Are biometrics the answer to the security question
56
Biometrics or other AIDC Technology?
57
What do students and those wishing to get into
the lab already identify themselves with?
58
Are we using access control logs to provide any
additional information about lab usage?
59
Does everyone have an ID card, and do they bring
it with them?
60
If students do not have their ID, can they use
another method of access?
61
How positive do we have to be to identify
individuals who gain access into the lab?
62
What is the probability of an attack to the
system the estimated likelihood of a security
breach
63
What is the population that will be using the lab?
64
Does the population exhibit universality of a
biometric?
65
How long will the population use this device for?
66
What is user psychology
67
Common misconceptions
  • Biometrics is absolute security.
  • Biometrics works for everyone
  • Twins have identical biometric traits (identical
    fingerprints, irises...). This is the same for
    clones.
  • Iris will always beat fingerprints.

68
Lab Activities after lunch
  • 3-D face
  • 2-D face
  • Hand Geometry
  • Iris Recognition
  • Fingerprint Recognition

69
Any Questions
  • www.biotown.purdue.edu
Write a Comment
User Comments (0)
About PowerShow.com