Your SlideShare is downloading. ×
Bioslimdisk Presentation V1.1
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Bioslimdisk Presentation V1.1

476
views

Published on

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
476
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. BioSlimDiskpresentation v1.1RiTech International LtdProduct (Signature)Website www.bioslimdisk.comMarcus ChanDate: 14th August 2009
  • 2. Overview • Company Profile • Biometric Technology • Bioslimdisk Signature2 © RiTech International Ltd, Confidential & Proprietary
  • 3. COMPANY PROFILE
  • 4. RiTech International Ltd • Ritech was established in 1994 as Designer, developer, manufacturer and distributor of innovative products, services & systems in the area of biometrics security and portable data storage. • Specializes in biometrics security technology with in-house R&D. • Overseas operation network: Malaysia, Hong Kong, China, India and Europe.4 © RiTech International Ltd, Confidential & Proprietary
  • 5. Vision First Choice Solution provider in the Biometric security industry Biometric Process Algorithms Implementation knowledge Customised Solutions Ergonomics and desgin Sensors5 © RiTech International Ltd, Confidential & Proprietary
  • 6. Objectives Advanced Research and Development • Biometrics products for portable information storage and transportation • Biometrics products for Intellectual Property Protection • Biometrics products for secure identification over networks • Biometrics products for as a secure replacement over existing keys, cards, password which tend to be a burden6 © RiTech International Ltd, Confidential & Proprietary
  • 7. BIOMETRIC TECHNOLOGY
  • 8. What is Biometric? The Science of measuring and statistically analyzing biological data8 © RiTech International Ltd, Confidential & Proprietary
  • 9. What is Biometric? Biometric Technology Authentication can be divided into three different factors: • something you know • something you have • something you are9 © RiTech International Ltd, Confidential & Proprietary
  • 10. Something you know Common • Pin Numbers/Code • Learn it , You have to remember the Code Number • Forced to memorize passwords Disadvantage:- Software hacking tools via internet, easy to steal by anyone. (e.g. Keylogger)10 © RiTech International Ltd, Confidential & Proprietary
  • 11. Something you have Example Smart cards • Cash Card • ATM Card • Visa/Master Card • Door/Building Access Card Disadvantage:- If picked up by anyone, it can still be used. (e.g. Paying at a Petrol Station)11 © RiTech International Ltd, Confidential & Proprietary
  • 12. Something you are Biometrics is what you are! What you have: 1. Your Finger > Fingerprint 2. You cannot loose it 3. You cannot give it away You cannot tell a friend to use your prints.12 © RiTech International Ltd, Confidential & Proprietary
  • 13. Types of Biometric 1. BEHAVIOURAL – Voice Patterns – Signature Verification – Key Stroke Patterns (Signatures) 2. PHYSIOLOGICAL – Fingerprints – Hand Geometry – Retinal & Iris Scanning – Facial Recognition – DNA Fingerprinting13 © RiTech International Ltd, Confidential & Proprietary
  • 14. Biometric Comparison Comparison of various biometric technologies It is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters: • Universality => each person should have the characteristic • Uniqueness => is how well the biometric separates individually from another. • Permanence => measures how well a biometric resists aging. • Collectability => ease of acquisition for measurement. • Performance => accuracy, speed, and robustness of technology used. • Acceptability => degree of approval of a technology. • Circumvention => ease of use of a substitute.14 © RiTech International Ltd, Confidential & Proprietary
  • 15. Biometric Comparison Comparison of existing biometric systems Comparison of various biometric technologies, modified from Jain et al., 2004 (H=High, M=Medium, L=Low)Biometrics: Universality Uniqueness Permanence Collectability Performance Acceptability CircumventionFace H L M H L H LFingerprint M H H M H M HHand geometry M M M H M M MKeystrokes L L L M L M MHand veins M M M M M M HIris H H H M H L HRetinal scan H H M L H L HSignature L L L H L H LVoice M L L M L H LFacial H H L H M H HthermographOdor H H H L L M LDNA H H H L H L LGait M L L H L H MEar Canal M M H M M H M 15 © RiTech International Ltd, Confidential & Proprietary
  • 16. Fingerprint Identification Minutiae Definition • Form of Fingerprint • Number of Lines • Distance Between Marks16 © RiTech International Ltd, Confidential & Proprietary
  • 17. Processing & Identification Fingerprint How many minutiae are needed for comparison? –Generally, a complete fingerprint is made up of up to 100 minutiae –Fingerprint recognition normally requires 20~30 minutiae for processing17 © RiTech International Ltd, Confidential & Proprietary
  • 18. The Biometrics’ Dilemma18 © RiTech International Ltd, Confidential & Proprietary
  • 19. Biometric Advantages Advantages of Biometrics for Access Control Copy Theft Forgotten Lost Key X X X X Badge - X X X PIN Code X - X - Biometric - - - - Feature19 © RiTech International Ltd, Confidential & Proprietary
  • 20. BIOSLIMDISK SIGNATURE
  • 21. WHY? • Threat of data theft is real and costly • Affects employees negatively • Affects company negatively • Loss of productivity and credibility • Loss of profits and sustainability21 © RiTech International Ltd, Confidential & Proprietary
  • 22. HOW? • Physical theft and hacking Actual device is stolen and tapped for data • Social engineering Passwords or access keys can be coaxed • Virtual hacking and theft Popular method of data theft • Man-in-the-Middle attacks Spying and snooping on communications22 © RiTech International Ltd, Confidential & Proprietary
  • 23. Securing Data Signature can meet security challenges with Tamper-proof with self-destruct function Fingerprint recognition (biometric) Built-in AES-128 bit data encryption Features to protect user identification23 No passwords during usage © RiTech International Ltd, Confidential & Proprietary
  • 24. Safekeeping Self Destruct Feature  Activated when tampering is detected  All data drive is destroyed  Keeps confidential data out of reach No backdoor access  No password or function to reset security  Only valid fingerprints are allowed access24 © RiTech International Ltd, Confidential & Proprietary
  • 25. Hardware Benefits AES-128bit hardware encryption  Keys never leave Signature  Avoids tapping/snooping of keys  All data on drive is encrypted  On the fly encrypt and decrypt Totally hardware-based  Resistant to software-based attacks  Security methods are encapsulated in hardware25 © RiTech International Ltd, Confidential & Proprietary
  • 26. Protecting Fingerprints  Dual-finger authentication  Reduces latent fingerprint copy  Intruder requires 2 unique fingerprints  Limiting fingerprint retries  Intruder has less time to guess correct fingerprint  Limits tries and time for correct fingerprint26 © RiTech International Ltd, Confidential & Proprietary
  • 27. Convenience • Anti-static rubberized casing  Hard to copy fingerprints on device  Less dust attraction to protect sensor • Cross platform compatibility  Nofurther software or software needed  Works in Windows, MAC, Linux, Solaris, etc.27 © RiTech International Ltd, Confidential & Proprietary
  • 28. Unique Service • Our technology is mature and battletested Our company is the leader in this field • Quick response to security breaches Product is constantly updated • Customization to end users Security tokens, 3rd party software28 © RiTech International Ltd, Confidential & Proprietary
  • 29. Summary of Features 1) Dual-Finger Authentication 2) Unique Self Destruct 3) Hardware Crypto AES-128bit 4) Worldwide Patents Awarded United Kingdom, Netherlands, Germany, France, China, Hong Kong, Singapore, Malaysia and many more.29 © RiTech International Ltd, Confidential & Proprietary
  • 30. END