Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Khaled al amri using fingerprints as private and public keys


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Khaled al amri using fingerprints as private and public keys

  1. 1.
  2. 2. Agenda<br />About Genkey<br />The Problem<br />Traditional Solutions<br />Genkey’s Solution<br />Development Principles<br />Q&A<br />
  3. 3. About GenKey – History<br />Part of the Meltwater family (like MEST)/a<br />Created by Norwegian entrepreneur Jørn Lyseggen in 2001.<br />7 years of research in Biometrics and Crypto-technology before approaching market<br />a different approach to Biometrics<br />
  4. 4. About GenKey – Presence<br />Bergen, Norway<br />Cambridge, UK<br />Chicago, Il<br />Amersfoort, Holland<br />Mountain View, CA<br />Delhi, India<br />Accra, Ghana<br />
  5. 5. The Need<br />REALITY<br />
  6. 6. ?<br />Exam Fraud<br />Fraud?<br />?<br />?<br /><ul><li>How do you know?</li></ul>Exam Verification<br />
  7. 7. ATM Fraud<br />?<br />Thief?<br />?<br /><ul><li>How do you know?</li></ul>Secure Banking<br />
  8. 8. Election Fraud<br />?<br />?<br />Dual Voter?<br /><ul><li>How do you know?</li></ul>Election Day<br />
  9. 9. The Common Problem<br />Reliable and Secure Authentication of Individuals<br />Mobility<br />Remote Areas<br />Infrastructure Connectivity and bandwidth<br />Cost<br />Limited Budget<br />per Individual<br /> Privacy<br /> Protecting the individual<br />
  10. 10. FOUR layers of Security<br />1. Possession of an object<br />Cards can be lost<br />2. Knowledge of information<br />Pin can be compromised<br />3. Physical Presence<br />Secure<br />System<br />?<br />Fear of compromising biometrics<br />4. Genkey Biocryptics<br />
  11. 11. A New Approach<br />Genkey Biocryptics<br />Patented technology collapses biometrics <br />and converts it into crypto keys<br />Public Crypto Key <br />Biometric Sources<br />
  12. 12. Image Analysis<br />Genkey Biocryptics<br />Enrollment<br />Image<br />Acquisition<br />GENKEY<br />PUBLIC KEY<br />Public Biocryptic Key Generation<br />Crytpo-Key <br />Generation<br />Key<br /> Algorithm<br />Base Key<br />Crypto-Key<br /> Generation<br />GenKeyBiocryptic® Technology<br />ZBSKEAAAUyLbmovmfVmPfNbrledWmQgCAQ==.<br />
  13. 13. f1<br />f5<br />f1<br />f5<br />f1<br />f5<br />f2<br />f6<br />f2<br />f6<br />f2<br />f6<br />f3<br />f7<br />f3<br />f7<br />f3<br />f7<br />f4<br />f8<br />f4<br />f8<br />f4<br />f8<br />X<br />Biocrypticsvs. Biometrics<br />Traditional Biometric Technology – Minutia Based<br /><ul><li>Non-Reversible PUBLIC KEY (<100bytes)
  14. 14. Key fits on small barcode, magnetic stripe,…
  15. 15. No biometric data (image, template,…) is stored
  16. 16. Minimal Storage Requirement
  17. 17. Asymmetric Authentication
  18. 18. Search 10,000,000 references/second! </li></ul>Image Analysis<br />Reference template<br />Feature analysis<br />Verification template<br />Public Biocryptic Key Generation<br />Crytpo-Key <br />Generation<br />Key<br /> Algorithm<br />GenKey Biocryptics <br />Base Key<br />Crypto-Key<br /> Generation<br />GenkeyPublic<br />Key<br />
  19. 19. f1<br />f5<br />f1<br />f5<br />f2<br />f6<br />f2<br />f6<br />f3<br />f7<br />f3<br />f7<br />f4<br />f8<br />f4<br />f8<br />Traditional Biometric Authentication with templates<br />Reference template<br />Feature analysis<br />Enrolment<br />Template matching engine<br />Match score<br />Feature analysis<br />Verification template<br />Verification<br />
  20. 20. Genkey Biocryptics<br />Authentication<br />
  21. 21. GenkeyBiocrypticsBenefits<br />1<br />Cost Efficiency <br />Cost Efficiency<br /><ul><li>No chip card required
  22. 22. Inexpensive Sensors
  23. 23. Utilizes existing Computers
  24. 24. No costly infrastructure or central database</li></ul>2<br />Off Line Mode<br />3<br />Privacy<br />Revocation of <br />Biometric ID<br />4<br />Supports multimodal<br />biometric systems <br />5<br />
  25. 25. GenkeyBiocrypticsBenefits<br />1<br />Cost Efficiency <br />Off Line Mode<br /><ul><li>GenKey provides authentication
  26. 26. without any connection
  27. 27. issuance and verification</li></ul>2<br />Off Line Mode<br />3<br />Privacy<br />Revocation of <br />Biometric ID<br />4<br />Supports multimodal<br />biometric systems <br />5<br />
  28. 28. GenkeyBiocrypticsBenefits<br />1<br />Cost Efficiency <br />Privacy<br /><ul><li>With GenKey, biometric data is never stored
  29. 29. Security cannot be compromised
  30. 30. Privacy is not compromised</li></ul>2<br />Off Line Mode<br />3<br />Privacy<br />Revocation of <br />Biometric ID<br />4<br />Supports multimodal<br />biometric systems <br />5<br />
  31. 31. GenkeyBiocrypticsBenefits<br />1<br />Cost Efficiency <br />Revocation of <br />Biometric ID<br />In case of security breach, GenKey crypto keys can be revoked<br />and new keys generated<br />2<br />Off Line Mode<br />3<br />Privacy<br />4<br />Revocation of <br />Biometric ID<br />Supports multimodal<br />biometric systems <br />5<br />
  32. 32. GenkeyBiocrypticsBenefits<br />1<br />Cost Efficiency <br />Support of <br />multimodal<br />biometric systems <br /><ul><li>A GenKey key can represents multiple biometrics
  33. 33. A system of multiple biometrics can be searched at the same speed as a single finger system</li></ul>2<br />Off Line Mode<br />3<br />Privacy<br />Revocation of <br />Biometric ID<br />4<br />Supports multimodal<br />biometric systems <br />5<br />
  34. 34. GenkeyBiocrypticsBenefits<br />
  35. 35. Biocrypticsvs. Biometrics<br />Side-by-Side<br />
  36. 36. Comparison with templatesKey Points (2)<br />
  37. 37. Genkey Biocryptics The Big Picture<br /><ul><li>Genkey ABISCross-Solutions
  38. 38. Cross Application Biometrics
  39. 39. Fully integrated with Biocryptic Applications
  40. 40. State-of-the-art technology
  41. 41. Fully compliant with ANSI/NIST standard
  42. 42. Extensible to Criminal AFIS
  43. 43. Multi-modal, multi-algorithm duplicate checking </li></ul>Genkey Biocryptic Solutions<br />Application-Context Sensitive<br />Complete ID Management <br />Flexible enrollment/verification flow<br />State-of-the-art technology<br />The best and most cost-effective solution<br />Offline capability with transparent, bi-directional synchronization<br />Robust and proven in harsh conditions<br />Tamper proof<br />
  44. 44. Thank You<br />Khaled Al-Amri <br />+966 544 613 441<br /><br />