Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Vortrag CeBIT 2011 - Biometric Security


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Vortrag CeBIT 2011 - Biometric Security

  1. 1. Werner Blessing, Founder of BIOMETRY
  2. 4. <ul><li>Biometrics in General </li></ul><ul><li>Advantages of ComBiom (Communication Biometrics) </li></ul><ul><li>BIOMETRYsso </li></ul><ul><li>(single sign on) </li></ul><ul><li>MobiComBiom </li></ul><ul><li>(Mobile Communication Biometrics) </li></ul>
  3. 5. <ul><li>Various features: </li></ul><ul><li>Papillar lines (Courbes, Spirals, ..) </li></ul><ul><li>Form of lines </li></ul><ul><li>Y-forms, Endings, Points, Centres </li></ul><ul><li>The capture of the fingerprint can be optic or captive </li></ul>
  4. 6. <ul><li>Advantages </li></ul><ul><ul><li>Existing criminal data bank (AFIS) </li></ul></ul><ul><ul><li>Long experience </li></ul></ul><ul><ul><li>ICAO Standard - Option </li></ul></ul><ul><ul><li>Simple to use </li></ul></ul><ul><li>Inconveniences </li></ul><ul><ul><li>Easy to falsify </li></ul></ul><ul><ul><li>Physical contact </li></ul></ul><ul><ul><li>Not useful for identificatio </li></ul></ul><ul><ul><li>due to high data size </li></ul></ul>
  5. 7. <ul><li>2D Face Recognition </li></ul><ul><ul><li>Most camera qualities are sufficient </li></ul></ul><ul><ul><li>Use of printed photos is possible </li></ul></ul><ul><li>3D Face Recognition (A4Vision) </li></ul><ul><ul><li>Specific cameras </li></ul></ul><ul><ul><li>Specific lighting </li></ul></ul><ul><ul><li>Manufacturers file format </li></ul></ul><ul><ul><li>High security </li></ul></ul>
  6. 8. <ul><li>Advantages </li></ul><ul><ul><li>Existing criminal files </li></ul></ul><ul><ul><li>Already in all travel documents </li></ul></ul><ul><ul><li>It is an ICAO Standard </li></ul></ul><ul><ul><li>Touchless </li></ul></ul><ul><li>Inconveniences </li></ul><ul><ul><li>Sensitive to light conditions </li></ul></ul><ul><ul><li>Easy to falsify </li></ul></ul><ul><ul><li>Short need of reenrollement </li></ul></ul><ul><ul><li>File size </li></ul></ul>
  7. 9. A modified Video camera is used for iris identification.
  8. 10. Pits Freckles Corona 266 DOF* * Each Degree of Freedom (Freiheitsgrad) has thousands Variations
  9. 11. <ul><li>Advantages </li></ul><ul><ul><li>Long term stability </li></ul></ul><ul><ul><li>Contactless </li></ul></ul><ul><ul><li>Fast Identifikation </li></ul></ul><ul><ul><li>Small data size (512 byte) </li></ul></ul><ul><li>Inconveniences </li></ul><ul><ul><li>No existing criminal data bank </li></ul></ul><ul><ul><li>Large and expensive hardware </li></ul></ul><ul><ul><li>Higher refusal within population </li></ul></ul><ul><ul><li>(due to misunderstanding „retina 007“) </li></ul></ul>
  10. 15. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template 1 … 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template 2 Template 0 1 2 3 4 5 6 7 8 9 0 number
  11. 17. <ul><li>High Security (4 x Biometrics Multimodal / Random Password) </li></ul><ul><li>Simple </li></ul><ul><li> contactless </li></ul><ul><li>Low Cost Hardware (WebCam) </li></ul>
  12. 18. 7th Framework Research Programme of the European Union  Trusted Biometrics under Replay & Spoofing Attacks
  13. 20. „ out of the box products“
  14. 21. Permanent Authentication: ID – Perma Face Biometric Face Recognition Initial Authentication with four figures Face, Voice, and Word Recognition
  15. 22. ID ComBiom is an All in One Software. The user is always free to decide whether he wants to use ComBiom as a package or just single parts of it, such as PermaFace only or PermaVoice only. ID Perma Face will do a permanent biometric face control. If the wrong user is trying to steal data, the system would identify the thief and switch off. ID Perma Voice identifies the user on it‘s biometric voice identification only. For example at night, without light.
  16. 24. API - ID Start MobiComBiom
  17. 26. Trust % Value Time 100 % 10 % Adaptive Trust Level Your individual/personal Trust Level: - Maximum Payment - Level of Credit at bank - Personal Setting 10 Min. 60 Min. = Maximum 100% = Adds 10% = Adds 5%
  18. 27. One Software Once enroled Many applications very adaptive use
  19. 28. [email_address]