SlideShare a Scribd company logo
1 of 28
Werner Blessing,  Founder of BIOMETRY
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A modified Video camera is used for iris identification.
Pits Freckles Corona 266 DOF* * Each Degree of Freedom (Freiheitsgrad) has thousands Variations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template  1 … 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template  2 Template  0 1  2  3  4  5  6  7  8  9  0   number
 
[object Object],[object Object],[object Object],[object Object]
www.tabularasa-euproject.org 7th Framework  Research Programme  of the European Union  Trusted Biometrics under Replay & Spoofing Attacks
 
„ out of the box products“
Permanent  Authentication: ID – Perma Face Biometric Face Recognition Initial Authentication  with four figures Face, Voice, and Word Recognition
ID ComBiom  is an All in One Software. The user is always free to decide whether he wants to use  ComBiom  as a package or just single parts of it, such as  PermaFace  only or  PermaVoice  only.  ID Perma Face  will do a permanent biometric face control. If the wrong user is trying to steal data, the system would identify the thief and switch off. ID Perma Voice  identifies the user on it‘s biometric voice identification only. For example at night, without light.
 
API - ID Start MobiComBiom
 
Trust %  Value  Time  100 % 10 % Adaptive Trust Level Your individual/personal Trust Level: - Maximum Payment - Level of Credit at bank - Personal Setting  10  Min. 60  Min. = Maximum 100% = Adds  10% = Adds 5%
One Software Once enroled Many applications very adaptive use
[email_address]

More Related Content

What's hot

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
anasz
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
BIOMETRYsso
BIOMETRYssoBIOMETRYsso
BIOMETRYsso
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometric
Biometric Biometric
Biometric
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
 
Biometric
BiometricBiometric
Biometric
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 

Viewers also liked

Millenniumonderwijs
MillenniumonderwijsMillenniumonderwijs
Millenniumonderwijs
SuperPOLL
 
교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]
혁 김
 
Completa presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguisticCompleta presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguistic
ontinyentina
 
toekomstproject
toekomstprojecttoekomstproject
toekomstproject
SuperPOLL
 
Politics of the street
Politics of the streetPolitics of the street
Politics of the street
SuperPOLL
 
Erasmus, heaven or hell?
Erasmus, heaven or hell?Erasmus, heaven or hell?
Erasmus, heaven or hell?
SuperPOLL
 
детям о пожарной безопасности
детям о пожарной безопасностидетям о пожарной безопасности
детям о пожарной безопасности
virtualtaganrog
 
кружок соловушк визиткаа
кружок соловушк  визиткаакружок соловушк  визиткаа
кружок соловушк визиткаа
virtualtaganrog
 
пед психолог кузнецова портфолио
пед психолог кузнецова портфолиопед психолог кузнецова портфолио
пед психолог кузнецова портфолио
virtualtaganrog
 
Linea y Punto sobre Plano
Linea y Punto sobre PlanoLinea y Punto sobre Plano
Linea y Punto sobre Plano
marap163
 

Viewers also liked (20)

Resolucion judicial
Resolucion judicialResolucion judicial
Resolucion judicial
 
Millenniumonderwijs
MillenniumonderwijsMillenniumonderwijs
Millenniumonderwijs
 
교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]
 
EAS321 essay prep and units 5 & 6
EAS321 essay prep and units 5 & 6EAS321 essay prep and units 5 & 6
EAS321 essay prep and units 5 & 6
 
Eas321 seminar 10
Eas321 seminar 10Eas321 seminar 10
Eas321 seminar 10
 
Semiotica
SemioticaSemiotica
Semiotica
 
Completa presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguisticCompleta presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguistic
 
Get a give
Get a giveGet a give
Get a give
 
toekomstproject
toekomstprojecttoekomstproject
toekomstproject
 
Politics of the street
Politics of the streetPolitics of the street
Politics of the street
 
Erasmus, heaven or hell?
Erasmus, heaven or hell?Erasmus, heaven or hell?
Erasmus, heaven or hell?
 
Wehrpflicht - Neujahrsempfang
Wehrpflicht - NeujahrsempfangWehrpflicht - Neujahrsempfang
Wehrpflicht - Neujahrsempfang
 
группа № 5
группа № 5группа № 5
группа № 5
 
детям о пожарной безопасности
детям о пожарной безопасностидетям о пожарной безопасности
детям о пожарной безопасности
 
солнце
солнцесолнце
солнце
 
Emotional focused-therapy-greenberg
Emotional focused-therapy-greenbergEmotional focused-therapy-greenberg
Emotional focused-therapy-greenberg
 
Vortrag Cartes in Asia
Vortrag Cartes in AsiaVortrag Cartes in Asia
Vortrag Cartes in Asia
 
кружок соловушк визиткаа
кружок соловушк  визиткаакружок соловушк  визиткаа
кружок соловушк визиткаа
 
пед психолог кузнецова портфолио
пед психолог кузнецова портфолиопед психолог кузнецова портфолио
пед психолог кузнецова портфолио
 
Linea y Punto sobre Plano
Linea y Punto sobre PlanoLinea y Punto sobre Plano
Linea y Punto sobre Plano
 

Similar to Vortrag CeBIT 2011 - Biometric Security

Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
MobileMonday Estonia
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
suniljoshi151
 
MobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication BiometricsMobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication Biometrics
BIOMETRY.com AG
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
STO STRATEGY
 

Similar to Vortrag CeBIT 2011 - Biometric Security (20)

Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
 
2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch
 
2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
MobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication BiometricsMobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication Biometrics
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
E banking security
E banking securityE banking security
E banking security
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Vortrag CeBIT 2011 - Biometric Security

  • 1. Werner Blessing, Founder of BIOMETRY
  • 2.  
  • 3.  
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. A modified Video camera is used for iris identification.
  • 10. Pits Freckles Corona 266 DOF* * Each Degree of Freedom (Freiheitsgrad) has thousands Variations
  • 11.
  • 12.  
  • 13.  
  • 14.  
  • 15. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template 1 … 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template 2 Template 0 1 2 3 4 5 6 7 8 9 0 number
  • 16.  
  • 17.
  • 18. www.tabularasa-euproject.org 7th Framework Research Programme of the European Union  Trusted Biometrics under Replay & Spoofing Attacks
  • 19.  
  • 20. „ out of the box products“
  • 21. Permanent Authentication: ID – Perma Face Biometric Face Recognition Initial Authentication with four figures Face, Voice, and Word Recognition
  • 22. ID ComBiom is an All in One Software. The user is always free to decide whether he wants to use ComBiom as a package or just single parts of it, such as PermaFace only or PermaVoice only. ID Perma Face will do a permanent biometric face control. If the wrong user is trying to steal data, the system would identify the thief and switch off. ID Perma Voice identifies the user on it‘s biometric voice identification only. For example at night, without light.
  • 23.  
  • 24. API - ID Start MobiComBiom
  • 25.  
  • 26. Trust % Value Time 100 % 10 % Adaptive Trust Level Your individual/personal Trust Level: - Maximum Payment - Level of Credit at bank - Personal Setting 10 Min. 60 Min. = Maximum 100% = Adds 10% = Adds 5%
  • 27. One Software Once enroled Many applications very adaptive use