Biometrics in Business - PowerPoint PPT Presentation

1 / 37
About This Presentation
Title:

Biometrics in Business

Description:

... stored in databases in a manner similar to the storing of fingerprints or other biometrics. ... http://www.youtube.com/watch?v=meisKzGM3x8. Benefits of ... – PowerPoint PPT presentation

Number of Views:295
Avg rating:3.0/5.0
Slides: 38
Provided by: its69
Category:

less

Transcript and Presenter's Notes

Title: Biometrics in Business


1
Biometrics in Business
  • Cameron Johnson
  • Brett Cole
  • PJ Tantillo
  • Matt Schilling

2
Introduction
  • The kind of security we once associated with
    secret agents and top government facilities has
    become available for the average person.
  • We now have ATM cards that use a fingerprint as
    the pin code.
  • We have systems that can read the image of an eye
    or the way you type on a keyboard.
  • Soon we will be able to use the heat signature of
    the face as a password into secured information.

3
Intro (Cont.)
  • The presentation topics will be presented by the
    following people.
  • Matt Schilling will introduce Biometrics and
    present the drawbacks of this technology
  • Cameron Johnson will present the history of
    biometrics and how a basic system functions.
  • Phillip Tantillo, known as PJ, will be giving the
    audience current business uses for biometric
    security.
  • Brett Cole will present the three top benefits.

4
Intro (Cont.)
  • What you can expect from our presentation and
    outline.
  • This presentation is meant to provide an overview
    of the biometric topic to enable our classmates
    to make an educated decision on their companys
    security.
  • Questions are welcome at the end of the
    presentation.
  • The reasons you need to know this information.
  • Information has become an important resource for
    many companies. Protecting this information in
    todays world requires innovative security.
  • Current key card, metal key, and password only
    security is continually breached on personal and
    large corporation levels.
  • Several companies have been in the news,
    including the Veterans Administration, for having
    lost large amounts of personal data including
    social security numbers.
  • Because the security recognition tool is a part
    of the user it can not be lost or stolen,
    reducing the liability risk of the company.

5
History of Biometrics
  • Definition for Biometrics Biometrics image
    discrimination (BID) is a field of biometrics,
    the statistical analysis of biological
    characteristics. The origin of the word
    biometrics according to Dictionary.com states bio
    is Greek for life and metria is Greek for
    measuring.

6
History (Cont.)
  • The idea of biometrics has been around for a long
    time. Even in the bible a reference to measuring
    some biological behavior can be found.
  • The Book of Judges (12 56) reports that the men
    of Gilead identified enemy Ephraimites in their
    midst by making suspected Ephraimites say
    Shibboleth. When a suspect answered Sibboleth,
    for he could not pronounce it right then they
    seized him and slew him at the fords of the
    Jordan. And there fell at that time forty-two
    thousand of the Ephraimites.

7
History (Cont.)
  • Ancient peoples new that our physical
    characteristics were to some extent unique. They
    used the individual characteristics in the same
    way we do now, however we have technology to
    reduce the risk of miss identification.
  • In Egypts Nile Valley, traders were formally
    identified based on physical characteristics such
    as height, eye color, and complexion.
  • Fingerprinting can be traced as far back as the
    14th century in China. Though the use was most
    likely as a signature and the unique
    identification abilities of the fingerprint not
    entirely known.

8
History
  • In the 1800s man started formalizing the
    measurement of human traits for identification.
  • The first formalized identification analysis was
    called Bertillonage. It was based on the
    measurement of 14 different aspects of a human
    body. Developed by Alphonse Bertillon, it was a
    method for identifying criminals.

9
History
  • Modern biometrics truly began in the 1970s when
    the first commercial use technology was put into
    action.
  • One of the first commercial applications was
    used in 1972 when a Wall Street company, Shearson
    Hamil, installed Identimat, a finger-measurement
    device that served as a time keeping and
    monitoring application.

10
History
  • Events like 9/11, the information leaks of the
    Veterans administration, and several other
    companies who lost large amounts of data have
    increased visibility of the need for better
    security technology.

11
How a Biometrics System Works
http//www.youtube.com/watch?veJxbc8Vl-fo
12
How Biometrics Work
  • Identification of suitable traits to be measured.
  • Traits being measured must meet a certain group
    of criteria. According to Anil Jain (1999) in her
    book Biometrics Personal Identification in
    Networked Society these include universality,
    uniqueness, permanence and collectability.
  • All traits used for biometrics can be divided
    between behavioral and genetic. An example of
    genetic is your fingerprint, which is not changed
    by experience. Behavioral measures are signatures
    and how you use a computer mouse, which are
    different per person and experiences.

13
How Biometrics Work
  • Data Acquisition/ Enrollment
  • Biometric systems use stored data to compare a
    current reading to identify the user. Acquiring
    data is necessary for the system to start
    functioning. Only previously recorded patterns
    will be recognized by the system.
  • For enrollment-multiple samples are taken because
    the match performance of certain algorithms can
    benefit from considering multiple samples at the
    time of enrollment.
  • The biometrics data generally exists in the
    following three forms 1) waveform (e. g., voice,
    signature data), 2) images (e. g., face images,
    fingerprints, palm prints or image sequences, i.
    e., video) and 3) geometric data (e. g., face or
    hand geometric shapes).
  • A persons traits, such as their voice, may
    change over time and require re-entry.
  • There is a certain percentage failure rate to
    acquire the information from an individual for
    each different biometric technology. This rate
    reflects the overall reliability of a system.

14
How Biometrics Work
  • Data Reading and Processing
  • First a sensor takes a reading of some unit
    fingerprint, voice, etc.
  • Each type of biometric will have a unique sensor
    device.
  • The sensor will send the raw measurements.
  • The sensor sends the information along a
    Transmission Channel.
  • The transmission channel can be a private
    intranet, local area network (LAN) , wide area
    network (WAN) or the internet.
  • The number of entries and the distance of the
    network will affect the reaction time to a
    reading.

15
How Biometrics Work
  • Signal Processing is next.
  • Signal processing, sometimes referred to as image
    processing, is a class of algorithms used to
    remove irrelevant noise from data or to help
    enhance important features.
  • The raw material from the sensor is used to
    create a template which can be compared to other
    templates that were made in the data acquisition
    process.
  • This process is called Segmentation, and
    consists of algorithms that strip out irrelevant
    information and use the rest for the template.
  • The template is given a quality score and then
    the template is compared to the stored templates
    and given a match score.

16
How Biometrics Work
  • The final process is the Decision itself.
  • The score from the signal processing is used
    against decision criteria which would consist of
    the lowest score acceptable. If the score was in
    acceptable range the person is allowed access.
  • Some systems allow for a dynamic threshold which
    can be tied to the value or the importance of a
    particular transaction. This allows for some
    areas to be harder to access than others.
  • One to one matches are called verifications, and
    take place when the system is given a template to
    compare the incoming information with.
    Identification is the process of searching an
    entire database for the template that matches the
    incoming information.

17
How Biometrics Work
  • Specific features of face, eye and voice
    recognition systems.
  • Facial recognition is young technology that looks
    at specific parts of the face that do not change
    significantly over time.
  • One face recognition technology is called local
    feature analysis. Upper sections of eye sockets,
    area surrounding the cheek bones, the sides of
    the mouth, and the distance between the eyes are
    all looked at in this method.
  • A second method of face recognition is called the
    eigenface method. It focuses on the face as a
    whole and uses a collection of facial images to
    generate a two-dimensional gray-scale image to
    produce a biometric template.

18
How Biometrics Work
  • Retina and Iris identification are similar and
    coincide with each other.
  • It combines technologies from several fields
    including computer vision, pattern recognition,
    statistical interference and optics.
  • The goal of the technology is near-instant,
    highly accurate recognition of a person's
    identity based on a digitally represented image
    of the scanned eye.
  • While most biometric systems have 13 to 60
    distinct characteristics, the iris has 266 unique
    spots.
  • Each eye is believed to be unique and remain
    stable over time and across environments.

19
How Biometrics Work
  • Voice biometrics work by digitizing a profile of
    a person's speech to produce a stored model voice
    print.
  • It reduces each spoken word to segments composed
    of several dominant frequencies known as
    formants.
  • Each segment has several tones that can be
    captured in a digital format.
  • The tones collectively identify the speaker's
    unique voice print.
  • Voice prints are stored in databases in a manner
    similar to the storing of fingerprints or other
    biometrics.
  • A person's speech is subject to change depending
    on health and emotional state. Matching a voice
    print requires that the person speak in the
    normal voice that was used when the template was
    created.

20
Current and Future Biometric Systems
  • Percent of Market per Biometric Type
  • Source International Biometric Group, New York,
    NY 1.212.809.9491

21
Current and Future Biometrics
  • The current biometric systems available consist
    of fingerprint and hand scanner, iris scanner,
    retina scanner, voice recognition, keystroke
    dynamics, signature recognition, and facial scan.
  • The future of biometric systems are vein pattern,
    facial thermographs, D.N.A. recognition, sweat
    pore recognition, hand grip measurements,
    fingernail bed dynamics, body odor, ear
    recognition, gait measurements, skin
    luminescence, and brain wave patterns.

22
Total Biometric Revenues 1999-2005
Source International Biometric Group, New York,
NY 1.212.809.9491
23
Case Study 1
  • Case Study1 SmartMetric INC., out of New York
    City specializes in using fingerprint scanners on
    A.T.M. cards.
  • It is billed as the worlds first truly portable
    biometric device by the company.
  • The scanner works by storing the fingerprint
    template of the user in the card. Then to use
    the card the owner puts his finger on the card to
    activate it.
  • The sensor is 99.999 accurate, and if there is a
    misreading the user can reapply his fingerprint
    and the reader will work.
  • The company states that this new technology will
    make ATM machines more secure because the
    information is never in plain view and cannot be
    obtained.

24
Case Study 2
  • Case Study 2 Polysius Corp. is a specialty parts
    manufacturer for large scale factory
    environments.
  • As a solution for passwords and keycards the
    company implemented a keystroke dynamic biometric
    system produced by Biopassword Inc.
  • The keystroke dynamic system analyzes the manner
    in which people press the keys of a keyboard as
    they enter their passwords or other required
    authorization info.
  • The company has found great benefit now that the
    system is in place. The lack of keycards and
    other losable items has helped to win the
    employees of the company over.
  • The IT manager Jim Krochmal states Now that
    everyone is past that point( enrollment) I dont
    ever really hear about it.

25
Case Study 3
  • Case Study 3 Scott Air Force Base is currently
    using a hand-geometry system to improve base
    access security.
  • An expert team recently visited Scott A.F.B.to
    determine if the biometrics system was working
    well. They determined that not only was the
    system performing above expectations, but it was
    also saving money due to less manpower.
  • The system uses biometric hand recognition and a
    pin number to provide double security.
  • From June till September 2003 the team did a
    study which had no false admittance reported
    during the studied time period.
  • The team also tried to deceive the system by
    entering the pin number and using a different
    handprint. The system never failed.
  • Other benefits of the system included speed of
    entry, ease of use, and simplicity of access for
    the user.

26
Benefits of Biometrics
  • Security
  • Biometric data are unique characteristics of the
    human body. The likelihood of two people sharing
    identical biometric data is almost zero.
  • Systems can be overwhelmed with new passwords and
    keys can be duplicated.
  • It is impossible to give an exact duplicate of
    your face or hand to another person.
  • New technologies are also ensuring that the
    biometric data is from a live person, so data
    cannot be forged.
  • An I.D. can be lost, but biometric data can only
    be lost by a serious accident causing loss of
    limb.
  • Each person carries the passwords to an estimated
    average of 20 computer functions and websites
    around in their head - so it is no wonder that
    they frequently forget them. Biometric data is
    always with you.
  • http//www.youtube.com/watch?vmeisKzGM3x8

27
Benefits of Biometrics
  • Maintenance
  • Most biometric measurements only need to be
    updated after many years have allowed for the
    feature to change. Our voices change over time,
    but after puberty the change is very slow.
  • Locks and keys need to be changed frequently in
    cases where heavy security is a concern.
  • The system eliminates the burden, the expense
    and the shortcomings of the previous card-based
    system as an employee can no longer exchange or
    borrow cards if she/he has lost or mislaid their
    card
  • The lack of updating allows for less time spent
    by employees having to get new cards, keys or
    passwords.

28
Benefits of Biometrics
  • Track Peoples Movement
  • The biometric systems allow the tracking of
    people through the system.
  • Since the information cannot be falsified a
    person will be unable to contradict the
    information
  • It offers the company a full audit trail of which
    employees have been where and when.

29
Disadvantages of Biometrics
  • High cost of implementing new technologies.
  • High quality images require training and skill
    which will increase cost of implementation.
  • Transferring to a new system will include the
    technology costs as well, which range from
    reasonable for fingerprint technology to very
    expensive for the newest technologies.
  • As computer equipment and programs continue to
    become more affordable so will these
    applications.

30
Disadvantages of Biometrics
  • Public Misunderstanding of the technology.
  • There is a degree of negative public perception
    (People may not want to give up their prints for
    criminal implications or touching the same sensor
    as everyone else.)
  • People dont understand the technology so they
    have unnecessary fears like a fear to have their
    eye scanned from a light source.

31
Disadvantages of Biometrics
  • Not all people can easily use the systems.
  • People who are handicapped may not be able to use
    some devices, especially those missing limbs.
  • People who are sick with diabetes or the flu may
    not be able to use some Iris scanners or voice
    scanners.
  • A persons age or job occupation may cause
    problems with capturing a quality image. For
    instance people who work heavily with their hands
    can wear out their fingerprints over time, making
    it difficult to get a reading or enroll.

32
Conclusion
  • Biometric systems are systems used to improve
    security and recognition by reading and comparing
    the biological traits of a user.
  • The advantages of biometrics are
  • Heightened Security
  • Lower maintenance than current security systems
  • The ability to have a record of the location and
    actions of people in a facility or on a system.
  • The disadvantages of biometrics are
  • A high cost of implementing new technology.
  • Public misunderstanding of the systems.
  • Not all people can easily use the systems.

33
Conclusion
  • Our group believes that the disadvantages of
    biometrics are not significant enough to
    discourage the implementation of this technology.
    Even now these disadvantages are being phased out
    through new systems, and accommodations for those
    who might have a hard time using them.
  • Our group believes as information continues to
    become more valuable to everyone, whether it be
    personal identity or the newest cutting edge
    secrets of corporate America, biometrics will be
    the technology to secure that information in the
    future.

34
Quiz
  • Which is not a benefit of biometrics?
  • Security
  • Maintenance
  • Privacy issues
  • Track peoples movement

35
Quiz
  • What was the first formalized analysis called?
  • Bario
  • Linguine
  • Manegetra
  • Bertillonage

36
Quiz
  • Which are traits of biometrics?
  • A. Behavioral
  • B. Temperament
  • C. Genetic
  • D. All of the above
  • E. Both A C

37
Questions
Write a Comment
User Comments (0)
About PowerShow.com