BioSlimDiskpresentation v1.1RiTech International LtdProduct (Signature)Website www.bioslimdisk.comMarcus ChanDate: 14th Au...
Overview    • Company Profile    • Biometric Technology    • Bioslimdisk Signature2   © RiTech International Ltd, Confiden...
COMPANY PROFILE
RiTech International Ltd    • Ritech was established in 1994 as      Designer, developer, manufacturer and      distributo...
Vision         First Choice Solution provider in the         Biometric security industry                                  ...
Objectives    Advanced Research and Development    • Biometrics products for portable information      storage and transpo...
BIOMETRIC TECHNOLOGY
What is Biometric?         The Science of measuring         and statistically analyzing         biological data8   © RiTec...
What is Biometric?    Biometric Technology         Authentication can be divided into three         different factors:    ...
Something you know     Common     • Pin Numbers/Code     • Learn it , You have to remember the       Code Number     • For...
Something you have     Example Smart cards     • Cash Card     • ATM Card     • Visa/Master Card     • Door/Building Acces...
Something you are     Biometrics is what you are!     What you have:     1. Your Finger > Fingerprint     2. You cannot lo...
Types of Biometric     1. BEHAVIOURAL                     – Voice Patterns                     – Signature Verification   ...
Biometric Comparison          Comparison of various biometric          technologies          It is possible to understand ...
Biometric Comparison              Comparison of existing biometric systems                     Comparison of various biome...
Fingerprint Identification                                                              Minutiae Definition               ...
Processing & Identification     Fingerprint       How many minutiae are needed for       comparison?     –Generally,     a...
The Biometrics’ Dilemma18   © RiTech International Ltd, Confidential & Proprietary
Biometric Advantages     Advantages of Biometrics     for Access Control                                          Copy    ...
BIOSLIMDISK SIGNATURE
WHY?     • Threat of data theft is real and costly     • Affects employees negatively     • Affects company negatively    ...
HOW?     • Physical theft and hacking       Actual device is stolen and tapped for data     • Social engineering       Pas...
Securing Data                                          Signature can meet security                                        ...
Safekeeping     Self Destruct Feature      Activated  when tampering is detected      All data drive is destroyed      ...
Hardware Benefits     AES-128bit hardware encryption      Keys  never leave Signature      Avoids tapping/snooping of ke...
Protecting Fingerprints      Dual-finger authentication            Reduces latent fingerprint             copy          ...
Convenience     • Anti-static rubberized casing      Hard to copy fingerprints on device      Less dust attraction to pr...
Unique Service     • Our technology is mature and       battletested        Our company is the leader in this field     • ...
Summary of Features     1) Dual-Finger Authentication     2) Unique Self Destruct     3) Hardware Crypto AES-128bit     4)...
END
Upcoming SlideShare
Loading in …5
×

Bioslimdisk Presentation V1.1

724 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
724
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Bioslimdisk Presentation V1.1

  1. 1. BioSlimDiskpresentation v1.1RiTech International LtdProduct (Signature)Website www.bioslimdisk.comMarcus ChanDate: 14th August 2009
  2. 2. Overview • Company Profile • Biometric Technology • Bioslimdisk Signature2 © RiTech International Ltd, Confidential & Proprietary
  3. 3. COMPANY PROFILE
  4. 4. RiTech International Ltd • Ritech was established in 1994 as Designer, developer, manufacturer and distributor of innovative products, services & systems in the area of biometrics security and portable data storage. • Specializes in biometrics security technology with in-house R&D. • Overseas operation network: Malaysia, Hong Kong, China, India and Europe.4 © RiTech International Ltd, Confidential & Proprietary
  5. 5. Vision First Choice Solution provider in the Biometric security industry Biometric Process Algorithms Implementation knowledge Customised Solutions Ergonomics and desgin Sensors5 © RiTech International Ltd, Confidential & Proprietary
  6. 6. Objectives Advanced Research and Development • Biometrics products for portable information storage and transportation • Biometrics products for Intellectual Property Protection • Biometrics products for secure identification over networks • Biometrics products for as a secure replacement over existing keys, cards, password which tend to be a burden6 © RiTech International Ltd, Confidential & Proprietary
  7. 7. BIOMETRIC TECHNOLOGY
  8. 8. What is Biometric? The Science of measuring and statistically analyzing biological data8 © RiTech International Ltd, Confidential & Proprietary
  9. 9. What is Biometric? Biometric Technology Authentication can be divided into three different factors: • something you know • something you have • something you are9 © RiTech International Ltd, Confidential & Proprietary
  10. 10. Something you know Common • Pin Numbers/Code • Learn it , You have to remember the Code Number • Forced to memorize passwords Disadvantage:- Software hacking tools via internet, easy to steal by anyone. (e.g. Keylogger)10 © RiTech International Ltd, Confidential & Proprietary
  11. 11. Something you have Example Smart cards • Cash Card • ATM Card • Visa/Master Card • Door/Building Access Card Disadvantage:- If picked up by anyone, it can still be used. (e.g. Paying at a Petrol Station)11 © RiTech International Ltd, Confidential & Proprietary
  12. 12. Something you are Biometrics is what you are! What you have: 1. Your Finger > Fingerprint 2. You cannot loose it 3. You cannot give it away You cannot tell a friend to use your prints.12 © RiTech International Ltd, Confidential & Proprietary
  13. 13. Types of Biometric 1. BEHAVIOURAL – Voice Patterns – Signature Verification – Key Stroke Patterns (Signatures) 2. PHYSIOLOGICAL – Fingerprints – Hand Geometry – Retinal & Iris Scanning – Facial Recognition – DNA Fingerprinting13 © RiTech International Ltd, Confidential & Proprietary
  14. 14. Biometric Comparison Comparison of various biometric technologies It is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters: • Universality => each person should have the characteristic • Uniqueness => is how well the biometric separates individually from another. • Permanence => measures how well a biometric resists aging. • Collectability => ease of acquisition for measurement. • Performance => accuracy, speed, and robustness of technology used. • Acceptability => degree of approval of a technology. • Circumvention => ease of use of a substitute.14 © RiTech International Ltd, Confidential & Proprietary
  15. 15. Biometric Comparison Comparison of existing biometric systems Comparison of various biometric technologies, modified from Jain et al., 2004 (H=High, M=Medium, L=Low)Biometrics: Universality Uniqueness Permanence Collectability Performance Acceptability CircumventionFace H L M H L H LFingerprint M H H M H M HHand geometry M M M H M M MKeystrokes L L L M L M MHand veins M M M M M M HIris H H H M H L HRetinal scan H H M L H L HSignature L L L H L H LVoice M L L M L H LFacial H H L H M H HthermographOdor H H H L L M LDNA H H H L H L LGait M L L H L H MEar Canal M M H M M H M 15 © RiTech International Ltd, Confidential & Proprietary
  16. 16. Fingerprint Identification Minutiae Definition • Form of Fingerprint • Number of Lines • Distance Between Marks16 © RiTech International Ltd, Confidential & Proprietary
  17. 17. Processing & Identification Fingerprint How many minutiae are needed for comparison? –Generally, a complete fingerprint is made up of up to 100 minutiae –Fingerprint recognition normally requires 20~30 minutiae for processing17 © RiTech International Ltd, Confidential & Proprietary
  18. 18. The Biometrics’ Dilemma18 © RiTech International Ltd, Confidential & Proprietary
  19. 19. Biometric Advantages Advantages of Biometrics for Access Control Copy Theft Forgotten Lost Key X X X X Badge - X X X PIN Code X - X - Biometric - - - - Feature19 © RiTech International Ltd, Confidential & Proprietary
  20. 20. BIOSLIMDISK SIGNATURE
  21. 21. WHY? • Threat of data theft is real and costly • Affects employees negatively • Affects company negatively • Loss of productivity and credibility • Loss of profits and sustainability21 © RiTech International Ltd, Confidential & Proprietary
  22. 22. HOW? • Physical theft and hacking Actual device is stolen and tapped for data • Social engineering Passwords or access keys can be coaxed • Virtual hacking and theft Popular method of data theft • Man-in-the-Middle attacks Spying and snooping on communications22 © RiTech International Ltd, Confidential & Proprietary
  23. 23. Securing Data Signature can meet security challenges with Tamper-proof with self-destruct function Fingerprint recognition (biometric) Built-in AES-128 bit data encryption Features to protect user identification23 No passwords during usage © RiTech International Ltd, Confidential & Proprietary
  24. 24. Safekeeping Self Destruct Feature  Activated when tampering is detected  All data drive is destroyed  Keeps confidential data out of reach No backdoor access  No password or function to reset security  Only valid fingerprints are allowed access24 © RiTech International Ltd, Confidential & Proprietary
  25. 25. Hardware Benefits AES-128bit hardware encryption  Keys never leave Signature  Avoids tapping/snooping of keys  All data on drive is encrypted  On the fly encrypt and decrypt Totally hardware-based  Resistant to software-based attacks  Security methods are encapsulated in hardware25 © RiTech International Ltd, Confidential & Proprietary
  26. 26. Protecting Fingerprints  Dual-finger authentication  Reduces latent fingerprint copy  Intruder requires 2 unique fingerprints  Limiting fingerprint retries  Intruder has less time to guess correct fingerprint  Limits tries and time for correct fingerprint26 © RiTech International Ltd, Confidential & Proprietary
  27. 27. Convenience • Anti-static rubberized casing  Hard to copy fingerprints on device  Less dust attraction to protect sensor • Cross platform compatibility  Nofurther software or software needed  Works in Windows, MAC, Linux, Solaris, etc.27 © RiTech International Ltd, Confidential & Proprietary
  28. 28. Unique Service • Our technology is mature and battletested Our company is the leader in this field • Quick response to security breaches Product is constantly updated • Customization to end users Security tokens, 3rd party software28 © RiTech International Ltd, Confidential & Proprietary
  29. 29. Summary of Features 1) Dual-Finger Authentication 2) Unique Self Destruct 3) Hardware Crypto AES-128bit 4) Worldwide Patents Awarded United Kingdom, Netherlands, Germany, France, China, Hong Kong, Singapore, Malaysia and many more.29 © RiTech International Ltd, Confidential & Proprietary
  30. 30. END

×