SlideShare a Scribd company logo
Biometric Security
for Mobile
THE “WHO YOU ARE” OF AUTHENTICATION
JERRY RUGGIERI / CITIZENS BANK
1
All Authentication Options
 What you know, e.g. password
 What you have, e.g. soft- or hard-token
 Who you are, e.g. any biometric
 How you behave, e.g. adaptive
authentication
2
Passwords
Your password is “dinosaur”
 October 2013 – Adobe announces 38 M passwords are compromised
 Password hints posted in cleartext
 Passwords not salted
 Days later they’re posted online and many are soon broken
 June 2012 – LinkedIn announces 7M of 150M passwords stolen
 Passwords not salted
 Days later they’re posted online and …
 Customers using same password for Facebook, garage door openers,
and banking
 Passwords heavily re-used or shared
 Passwords have to be remembered (and typed)
 Passwords can be “cracked” (recovered)
3
Biometric Authentication Methods 4
Biometric Categories 5
Facial Recognition
 Pro’s
 Convenient
 Liveness Test
 Con’s
 Lighting condition requirement
 Can be faked with static and/or animated gif from
public photos
 Repudiation
6
Fingerprint
 Pro’s
 EER of around 1%
 Convenience
 Liveness Test
 Non-repudiation
 Con’s
 Specialized Hardware
 Finger cleanliness
 Cuts to finger
 Angle or pressure of placement
 Biometric privacy concerns
 Fingerprints can be captured easily
 Search for “MythBusters Fingerprints Busted” on YouTube
7
Voice
 Pro’s
 Convenience
 Cost
 EER of around 2-3%
 Liveness Test
 Non-repudiation
 Can be authenticated remotely
 Con’s
 Cold or illness affecting voice
 Environmental noise
 Behavioral or temporal speaking differences
 User education or awareness to use
8
Biometric Evaluation Factors
 Accuracy Factors
 False Acceptance Rate (FAR)
 False Rejection Rate (FRR)
 Equal Error Rate (EER)
 Failure To Enroll (FTE)
 Failure To Capture (FTC)
 Security
 Usability
 Integration
 Cost
 Privacy and Regulatory Factors
9
Equal Error Rate Curve 10
11
Apple’s Fingerprint Hardware 12
True Speaker Recordings 13
Imposter Speaker Recordings 14
Enrollment, Authentication Process 15
Biometric Distance for Imposters 16
Voice Biometric Use Cases
 Use Cases
 Fast Balance
 Step up authentication option
 Online Account Opening
 Login authentication
 Male v. Female voices
 Male frequency 85-180 Hz
 Female frequency 165-255 Hz
 We hear frequency as the pitch
 Double the frequency we perceive it as “twice as high”
17
VoiceKeyID™ Algorithm
Authenticates in ½ second
Runs on device, no servers needed
Configurable for low FAR (False Acceptance Rate)
Multi-lingual, any language or song or repeatable gibberish will work
Requires 10-12 syllables or 4-6 seconds of speech
Robustness against recorded attacks
Low Failure To Enroll Errors
Low Storage Requirement (50-100KB)
Secure Storage
Can identify forced failure attempts and deny them
Available for use anywhere in apps
Patent protected in US and China
18
19
VoiceKeyID™ Demo App

More Related Content

What's hot

Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
Sn Moddho
 
Biometrics
BiometricsBiometrics
Biometric
Biometric Biometric
Biometric
Pratish Sardar
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
Anivar Aravind
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
amee yaami
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
Biometrics
BiometricsBiometrics
Biometrics
Divya Shah
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
twuniversity
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 

What's hot (20)

Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 

Viewers also liked

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024Frank Maiorca
 
Identity_Management_Vendor_Evaluation
Identity_Management_Vendor_EvaluationIdentity_Management_Vendor_Evaluation
Identity_Management_Vendor_EvaluationJerry Ruggieri
 
Skyfi Labs Biometric Authentication Project
Skyfi Labs Biometric Authentication ProjectSkyfi Labs Biometric Authentication Project
Skyfi Labs Biometric Authentication Project
vasanthvidyakar
 
New Trends in Mobile Authentication
New Trends in Mobile AuthenticationNew Trends in Mobile Authentication
New Trends in Mobile Authentication
Nok Nok Labs, Inc
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
Jignesh Prajapati
 
brain machine interface ppt
brain machine interface pptbrain machine interface ppt
brain machine interface ppt
Soumee Pattnaik
 
Anomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) EnglishAnomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) English
Adam Gibson
 
The Top 6 FINTECH TRENDS for 2017
The Top 6 FINTECH TRENDS for 2017The Top 6 FINTECH TRENDS for 2017
The Top 6 FINTECH TRENDS for 2017
The Pathway Group
 
Using Machine Learning & AI to Enhance Fraud Detection
Using Machine Learning & AI to Enhance Fraud DetectionUsing Machine Learning & AI to Enhance Fraud Detection
Using Machine Learning & AI to Enhance Fraud Detection
White Clarke Group
 
Machine learning use cases in finance
Machine learning use cases in financeMachine learning use cases in finance
Machine learning use cases in finance
David Guerineau
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
Amazon Web Services
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
Self
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
Navin Kumar
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Deep Learning for Fraud Detection
Deep Learning for Fraud DetectionDeep Learning for Fraud Detection
Deep Learning for Fraud Detection
DataWorks Summit/Hadoop Summit
 
PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014
Sri Ambati
 
brain computer-interfaces PPT
 brain computer-interfaces PPT brain computer-interfaces PPT
brain computer-interfaces PPT
Vijay Mehta
 

Viewers also liked (20)

CISSP_Exam_Prep_Guide
CISSP_Exam_Prep_GuideCISSP_Exam_Prep_Guide
CISSP_Exam_Prep_Guide
 
KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024
 
Identity_Management_Vendor_Evaluation
Identity_Management_Vendor_EvaluationIdentity_Management_Vendor_Evaluation
Identity_Management_Vendor_Evaluation
 
Skyfi Labs Biometric Authentication Project
Skyfi Labs Biometric Authentication ProjectSkyfi Labs Biometric Authentication Project
Skyfi Labs Biometric Authentication Project
 
New Trends in Mobile Authentication
New Trends in Mobile AuthenticationNew Trends in Mobile Authentication
New Trends in Mobile Authentication
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
brain machine interface ppt
brain machine interface pptbrain machine interface ppt
brain machine interface ppt
 
Anomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) EnglishAnomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) English
 
The Top 6 FINTECH TRENDS for 2017
The Top 6 FINTECH TRENDS for 2017The Top 6 FINTECH TRENDS for 2017
The Top 6 FINTECH TRENDS for 2017
 
Using Machine Learning & AI to Enhance Fraud Detection
Using Machine Learning & AI to Enhance Fraud DetectionUsing Machine Learning & AI to Enhance Fraud Detection
Using Machine Learning & AI to Enhance Fraud Detection
 
Machine learning use cases in finance
Machine learning use cases in financeMachine learning use cases in finance
Machine learning use cases in finance
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Deep Learning for Fraud Detection
Deep Learning for Fraud DetectionDeep Learning for Fraud Detection
Deep Learning for Fraud Detection
 
PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014PayPal's Fraud Detection with Deep Learning in H2O World 2014
PayPal's Fraud Detection with Deep Learning in H2O World 2014
 
brain computer-interfaces PPT
 brain computer-interfaces PPT brain computer-interfaces PPT
brain computer-interfaces PPT
 

Similar to Biometric Security Mobile

Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in androidAnshuli Mittal
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in androidAnshuli Mittal
 
Speaker Recognition System
Speaker  Recognition SystemSpeaker  Recognition System
Speaker Recognition SystemKiran Conquer
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
samirapdcosden
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfarestuimrozsm
 
L05-biometrics best for the lresentation
L05-biometrics best for the lresentationL05-biometrics best for the lresentation
L05-biometrics best for the lresentation
saugatmainali9
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Making User Authentication More Usable
Making User Authentication More UsableMaking User Authentication More Usable
Making User Authentication More Usable
Jim Fenton
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
Alisha Korpal
 
Identity authentication using voice biometrics technique
Identity authentication using voice biometrics techniqueIdentity authentication using voice biometrics technique
Identity authentication using voice biometrics technique
eSAT Journals
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
Deepanshu Saini
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
Shah Mohammad Miraz
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Software Guru
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
vineeth chepuri
 

Similar to Biometric Security Mobile (20)

Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Speaker Recognition System
Speaker  Recognition SystemSpeaker  Recognition System
Speaker Recognition System
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfare
 
Class 8, 9 and 10
Class 8, 9 and 10Class 8, 9 and 10
Class 8, 9 and 10
 
L05-biometrics best for the lresentation
L05-biometrics best for the lresentationL05-biometrics best for the lresentation
L05-biometrics best for the lresentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Making User Authentication More Usable
Making User Authentication More UsableMaking User Authentication More Usable
Making User Authentication More Usable
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Identity authentication using voice biometrics technique
Identity authentication using voice biometrics techniqueIdentity authentication using voice biometrics technique
Identity authentication using voice biometrics technique
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 
Bio metrics
Bio metricsBio metrics
Bio metrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 

Biometric Security Mobile

  • 1. Biometric Security for Mobile THE “WHO YOU ARE” OF AUTHENTICATION JERRY RUGGIERI / CITIZENS BANK 1
  • 2. All Authentication Options  What you know, e.g. password  What you have, e.g. soft- or hard-token  Who you are, e.g. any biometric  How you behave, e.g. adaptive authentication 2
  • 3. Passwords Your password is “dinosaur”  October 2013 – Adobe announces 38 M passwords are compromised  Password hints posted in cleartext  Passwords not salted  Days later they’re posted online and many are soon broken  June 2012 – LinkedIn announces 7M of 150M passwords stolen  Passwords not salted  Days later they’re posted online and …  Customers using same password for Facebook, garage door openers, and banking  Passwords heavily re-used or shared  Passwords have to be remembered (and typed)  Passwords can be “cracked” (recovered) 3
  • 6. Facial Recognition  Pro’s  Convenient  Liveness Test  Con’s  Lighting condition requirement  Can be faked with static and/or animated gif from public photos  Repudiation 6
  • 7. Fingerprint  Pro’s  EER of around 1%  Convenience  Liveness Test  Non-repudiation  Con’s  Specialized Hardware  Finger cleanliness  Cuts to finger  Angle or pressure of placement  Biometric privacy concerns  Fingerprints can be captured easily  Search for “MythBusters Fingerprints Busted” on YouTube 7
  • 8. Voice  Pro’s  Convenience  Cost  EER of around 2-3%  Liveness Test  Non-repudiation  Can be authenticated remotely  Con’s  Cold or illness affecting voice  Environmental noise  Behavioral or temporal speaking differences  User education or awareness to use 8
  • 9. Biometric Evaluation Factors  Accuracy Factors  False Acceptance Rate (FAR)  False Rejection Rate (FRR)  Equal Error Rate (EER)  Failure To Enroll (FTE)  Failure To Capture (FTC)  Security  Usability  Integration  Cost  Privacy and Regulatory Factors 9
  • 10. Equal Error Rate Curve 10
  • 11. 11
  • 16. Biometric Distance for Imposters 16
  • 17. Voice Biometric Use Cases  Use Cases  Fast Balance  Step up authentication option  Online Account Opening  Login authentication  Male v. Female voices  Male frequency 85-180 Hz  Female frequency 165-255 Hz  We hear frequency as the pitch  Double the frequency we perceive it as “twice as high” 17
  • 18. VoiceKeyID™ Algorithm Authenticates in ½ second Runs on device, no servers needed Configurable for low FAR (False Acceptance Rate) Multi-lingual, any language or song or repeatable gibberish will work Requires 10-12 syllables or 4-6 seconds of speech Robustness against recorded attacks Low Failure To Enroll Errors Low Storage Requirement (50-100KB) Secure Storage Can identify forced failure attempts and deny them Available for use anywhere in apps Patent protected in US and China 18