Biometrische IT-Sicherheitslösungen der BIOMETRY.com AG, CeBIT 2010, Security Plaza

  • 212 views
Uploaded on

Biometrische IT-Sicherheitslösungen der BIOMETRY.com AG, www.biometry.com

Biometrische IT-Sicherheitslösungen der BIOMETRY.com AG, www.biometry.com

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
212
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1.
    • Highest security, easy use + low cost webcam
    • Many applications on various levels of security
    • Leadership in the IT – market with biometric facility
    Werner Blessing, 04.03.10
  • 2.  
  • 3.
    • Various features:
    • Papillar lines (Courbes, Spirals, ..)
    • Form of lines
    • Y-forms, Endings, Points, Centres
    • The capture of the fingerprint can be optic or captive
  • 4.
    • Advantages
      • Existing criminal data bank (AFIS)
      • Long experience
      • ICAO Standard - Option
      • Simple to use
    • Inconveniences
      • Easy to falsify
      • Physical contact
      • Not useful for identificatio
      • due to high data size
  • 5.
    • 2D Face Recognition
      • Most camera qualities are sufficient
      • Use of printed photos is possible
    • 3D Face Recognition (A4Vision)
      • Specific cameras
      • Specific lighting
      • Manufacturers file format
      • High security
  • 6.
    • Advantages
      • Existing criminal files
      • Already in all travel documents
      • It is an ICAO Standard
      • Touchless
    • Inconveniences
      • Sensitive to light conditions
      • Easy to falsify
      • Short need of reenrollement
      • File size
  • 7. A modified Video camera is used for iris identification.
  • 8. Pits Freckles Corona 266 DOF* * Each Degree of Freedom (Freiheitsgrad) has thousands Variations
  • 9.
    • Advantages
      • Long term stability
      • Contactless
      • Fast Identifikation
      • Small data size (512 byte)
    • Inconveniences
      • No existing criminal data bank
      • Large and expensive hardware
      • Higher refusal within population
      • (due to misunderstanding „retina 007“)
  • 10.
      • Comparison of the vain structure
      • Recognition of the vain structure
      • using near infra red lighting
      • Live recognition with temperature sensor
  • 11.
    • Advantages
      • Simple to use
      • Physical and electronic version in one go
    • Inconveniences
      • No existing criminal data bank
      • Long process of verification
      • Large data files
    This procedure is mainly used in banks.
  • 12.  
  • 13. + Face „only“ also underlies the „ replay attack = fakeable“
  • 14.  
  • 15. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template 1 … 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template 2 Template 0 1 2 3 4 5 6 7 8 9 0 Password
  • 16.  
  • 17. Softwaretesting done by specialized Institute
    • This institute has validated the software for the German biometric Passport
    • This institute is recognized to be the great expert in validation of biometric software in Germany
    • This institute has tested our Software ComBiom
    • First results show an EER of Zero, slide 12+13
    • EER = FAR + FRR and Zero is best ever result !
  • 18. Fusion: ComBiom, 4 figures, EER
  • 19.
    • High Security (4 x Biometrics Multimodal / Random Password)
    • Simple
    • contactless
    • Low Cost Hardware (WebCam)
  • 20.  
  • 21. ID ComBiom is an All in One Software. The user is always free to decide whether he wants to use ComBiom as a package or just single parts of it, such as PermaFace only or PermaVoice only. ID Perma Face will do a permanent biometric face control. If the wrong user is trying to steal data, the system would identify the thief and switch off. ID Perma Voice identifies the user on it‘s biometric voice identification only. For example at night, without light.
  • 22.  
  • 23. Man in the Middle Modification Trojan
  • 24. 2708 2708
    • Login to server (sso ComBiom)
    • Random challenge (4 x digits 2708)
    • Response (4 x digits 2708)
    • Transaction incl. modification trojan
    • Content calculation = 4 digits
    • Biometric Transaction Confirmation
    • Different digits = refuse transaction
    • Use Checksum, or different Procedure
    • Alternating the different procedures
    2500 00 Checksum of 2500,00 = 07 Checksum of 40 633452 0 = 27 ComBiom digits: 07 27 0727 Start Transfer Confirmed + Stop ComBiom digits: 07 27 0727
  • 25.  
  • 26.
    • SmartID
    • SmartPass
    • SmartVisa
    • SmartDrive
    • SmartHealth
    • SmartBadge
  • 27.  
  • 28. Softbutton Start MobiComBiom
  • 29.  
  • 30. Trust % Value Time 100 % 10 % Trust-Level Your individual/personal Trust Level: - Maximum Payment - Level of Credit at bank - Personal Setting 10 Min. 60 Min. = Maximum 100% = Adds 10% = Adds 5%
  • 31.  
  • 32. Smartcard
  • 33. Webcam
  • 34.  
  • 35. „ out of the box products“
  • 36. Permanent Authentication: ID – Perma Face Biometric Face Recognition Initial Authentication with four figures Face, Voice, and Word Recognition
  • 37.  
  • 38.  
  • 39. Quelle: Frost & Sullivan, World Biometric Market, 2007
  • 40.  
  • 41. Global e-Access e-Security e-Comfort One Software Once enroled Many applications on adaptive use
  • 42.