SlideShare a Scribd company logo
BioSlimDisk
presentation v1.1

RiTech International Ltd
Product (Signature)
Website www.bioslimdisk.com
Marcus Chan
Date: 14th August 2009
Overview
    • Company Profile

    • Biometric Technology

    • Bioslimdisk Signature


2   © RiTech International Ltd, Confidential & Proprietary
COMPANY PROFILE
RiTech International Ltd
    • Ritech was established in 1994 as
      Designer, developer, manufacturer and
      distributor of innovative products,
      services & systems in the area of
      biometrics security and portable data
      storage.
    • Specializes in biometrics security
      technology with in-house R&D.
    • Overseas operation network: Malaysia,
      Hong Kong, China, India and Europe.
4   © RiTech International Ltd, Confidential & Proprietary
Vision
         First Choice Solution provider in the
         Biometric security industry
                                                             Biometric
                                                                         Process

                                                                         Algorithms

                                                                         Implementation knowledge

                                                                         Customised Solutions

                                                                         Ergonomics and desgin

                                                                         Sensors

5   © RiTech International Ltd, Confidential & Proprietary
Objectives
    Advanced Research and Development
    • Biometrics products for portable information
      storage and transportation
    • Biometrics products for Intellectual Property
      Protection
    • Biometrics products for secure identification
      over networks
    • Biometrics products for as a secure
      replacement over existing keys, cards,
      password which tend to be a burden

6   © RiTech International Ltd, Confidential & Proprietary
BIOMETRIC TECHNOLOGY
What is Biometric?

         The Science of measuring

         and statistically analyzing

         biological data

8   © RiTech International Ltd, Confidential & Proprietary
What is Biometric?
    Biometric Technology

         Authentication can be divided into three
         different factors:

    • something you know
    • something you have
    • something you are




9   © RiTech International Ltd, Confidential & Proprietary
Something you know
     Common
     • Pin Numbers/Code
     • Learn it , You have to remember the
       Code Number
     • Forced to memorize passwords

     Disadvantage:-
        Software hacking tools via
        internet, easy to steal by
        anyone. (e.g. Keylogger)
10   © RiTech International Ltd, Confidential & Proprietary
Something you have
     Example Smart cards
     • Cash Card
     • ATM Card
     • Visa/Master Card
     • Door/Building Access Card

     Disadvantage:-
        If picked up by anyone, it can still be
        used. (e.g. Paying at a Petrol Station)
11   © RiTech International Ltd, Confidential & Proprietary
Something you are
     Biometrics is what you are!

     What you have:
     1. Your Finger > Fingerprint
     2. You cannot loose it
     3. You cannot give it away

     You cannot tell a friend to use your prints.

12   © RiTech International Ltd, Confidential & Proprietary
Types of Biometric
     1. BEHAVIOURAL
                     – Voice Patterns
                     – Signature Verification
                     – Key Stroke Patterns (Signatures)

     2. PHYSIOLOGICAL
                     –      Fingerprints
                     –      Hand Geometry
                     –      Retinal & Iris Scanning
                     –      Facial Recognition
                     –      DNA Fingerprinting
13   © RiTech International Ltd, Confidential & Proprietary
Biometric Comparison
          Comparison of various biometric
          technologies
          It is possible to understand if a human characteristic can be
          used for biometrics in terms of the following parameters:
     •    Universality => each person should have the characteristic
     •    Uniqueness => is how well the biometric separates individually
          from another.
     •    Permanence => measures how well a biometric resists aging.
     •    Collectability => ease of acquisition for measurement.
     •    Performance => accuracy, speed, and robustness of
          technology used.
     •    Acceptability => degree of approval of a technology.
     •    Circumvention => ease of use of a substitute.

14   © RiTech International Ltd, Confidential & Proprietary
Biometric Comparison
              Comparison of existing biometric systems
                     Comparison of various biometric technologies, modified from Jain et al.,
                                       2004 (H=High, M=Medium, L=Low)

Biometrics:       Universality          Uniqueness           Permanence   Collectability Performance Acceptability Circumvention

Face                      H                     L                    M         H             L            H             L
Fingerprint               M                     H                    H         M             H            M             H
Hand geometry             M                     M                    M         H             M            M             M
Keystrokes                L                     L                    L         M             L            M             M
Hand veins                M                     M                    M         M             M            M             H
Iris                      H                     H                    H         M             H            L             H
Retinal scan              H                     H                    M         L             H            L             H
Signature                 L                     L                    L         H             L            H             L
Voice                     M                     L                    L         M             L            H             L
Facial
                          H                     H                    L         H             M             H            H
thermograph
Odor                      H                     H                    H         L             L            M             L
DNA                       H                     H                    H         L             H             L            L
Gait                      M                     L                    L         H             L             H            M
Ear Canal                 M                     M                    H         M             M             H            M
      15    © RiTech International Ltd, Confidential & Proprietary
Fingerprint Identification
                                                              Minutiae Definition
                                                              • Form of Fingerprint

                                                              • Number of Lines

                                                              • Distance Between Marks



16   © RiTech International Ltd, Confidential & Proprietary
Processing & Identification
     Fingerprint
       How many minutiae are needed for
       comparison?
     –Generally,     a complete
        fingerprint is made up
        of up to 100 minutiae
     –Fingerprint   recognition
        normally requires 20~30
        minutiae for processing
17   © RiTech International Ltd, Confidential & Proprietary
The Biometrics’ Dilemma




18   © RiTech International Ltd, Confidential & Proprietary
Biometric Advantages
     Advantages of Biometrics
     for Access Control
                                          Copy                Theft   Forgotten   Lost
     Key
                                           X                  X         X         X
     Badge
                                             -
                                                              X         X         X
     PIN Code
                                           X                   -
                                                                        X         -

     Biometric
                                             -                 -         -        -
     Feature


19   © RiTech International Ltd, Confidential & Proprietary
BIOSLIMDISK SIGNATURE
WHY?
     • Threat of data theft is real and costly
     • Affects employees negatively
     • Affects company negatively
     • Loss of productivity and credibility
     • Loss of profits and sustainability




21   © RiTech International Ltd, Confidential & Proprietary
HOW?
     • Physical theft and hacking
       Actual device is stolen and tapped for data
     • Social engineering
       Passwords or access keys can be coaxed
     • Virtual hacking and theft
       Popular method of data theft
     • Man-in-the-Middle attacks
       Spying and snooping on communications


22   © RiTech International Ltd, Confidential & Proprietary
Securing Data
                                          Signature can meet security
                                            challenges with
                                          Tamper-proof with self-destruct
                                           function
                                          Fingerprint recognition
                                           (biometric)
                                          Built-in AES-128 bit data
                                           encryption
                                          Features to protect user
                                           identification
23
                                          No passwords during usage
     © RiTech International Ltd, Confidential & Proprietary
Safekeeping
     Self Destruct Feature
      Activated  when tampering is detected
      All data drive is destroyed
      Keeps confidential data out of reach


     No backdoor access
      No password or function to reset security
      Only valid fingerprints are allowed access




24   © RiTech International Ltd, Confidential & Proprietary
Hardware Benefits
     AES-128bit hardware encryption
      Keys  never leave Signature
      Avoids tapping/snooping of keys
      All data on drive is encrypted
      On the fly encrypt and decrypt


     Totally hardware-based
      Resistant to software-based attacks
      Security methods are encapsulated in
       hardware
25   © RiTech International Ltd, Confidential & Proprietary
Protecting Fingerprints
      Dual-finger authentication
            Reduces latent fingerprint
             copy
            Intruder requires 2 unique
             fingerprints

      Limiting fingerprint retries
            Intruder has less time to guess correct
             fingerprint
            Limits tries and time for correct fingerprint

26   © RiTech International Ltd, Confidential & Proprietary
Convenience
     • Anti-static rubberized casing
      Hard to copy fingerprints on device
      Less dust attraction to protect sensor


     • Cross platform compatibility
      Nofurther software or software needed
      Works in Windows, MAC, Linux, Solaris, etc.




27   © RiTech International Ltd, Confidential & Proprietary
Unique Service
     • Our technology is mature and
       battletested
        Our company is the leader in this field
     • Quick response to security breaches
        Product is constantly updated
     • Customization to end users
        Security tokens, 3rd party software



28   © RiTech International Ltd, Confidential & Proprietary
Summary of Features

     1) Dual-Finger Authentication

     2) Unique Self Destruct

     3) Hardware Crypto AES-128bit

     4) Worldwide Patents Awarded
        United Kingdom, Netherlands, Germany, France, China, Hong
        Kong, Singapore, Malaysia and many more.
29   © RiTech International Ltd, Confidential & Proprietary
END

More Related Content

Similar to Bioslimdisk Presentation V1.1

Biometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart IdentificationBiometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart IdentificationIDEX ASA
 
Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012Seb Reeve
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsVeridium
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Girish Kengar
 
IDG TechNetwork Consumer Audience Survey Snapshot
IDG TechNetwork Consumer Audience Survey SnapshotIDG TechNetwork Consumer Audience Survey Snapshot
IDG TechNetwork Consumer Audience Survey Snapshotidgtechnetwork
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
Providing new customer_experience(final)
Providing new customer_experience(final)Providing new customer_experience(final)
Providing new customer_experience(final)Tsukasa Makino
 
Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix
 

Similar to Bioslimdisk Presentation V1.1 (20)

Biometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart IdentificationBiometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart Identification
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & Rewards
 
Biometrics Final Visionics
Biometrics Final VisionicsBiometrics Final Visionics
Biometrics Final Visionics
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
IDG TechNetwork Consumer Audience Survey Snapshot
IDG TechNetwork Consumer Audience Survey SnapshotIDG TechNetwork Consumer Audience Survey Snapshot
IDG TechNetwork Consumer Audience Survey Snapshot
 
Bio matrix
Bio matrixBio matrix
Bio matrix
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biomatric
BiomatricBiomatric
Biomatric
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Providing new customer_experience(final)
Providing new customer_experience(final)Providing new customer_experience(final)
Providing new customer_experience(final)
 
Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Bioslimdisk Presentation V1.1

  • 1. BioSlimDisk presentation v1.1 RiTech International Ltd Product (Signature) Website www.bioslimdisk.com Marcus Chan Date: 14th August 2009
  • 2. Overview • Company Profile • Biometric Technology • Bioslimdisk Signature 2 © RiTech International Ltd, Confidential & Proprietary
  • 4. RiTech International Ltd • Ritech was established in 1994 as Designer, developer, manufacturer and distributor of innovative products, services & systems in the area of biometrics security and portable data storage. • Specializes in biometrics security technology with in-house R&D. • Overseas operation network: Malaysia, Hong Kong, China, India and Europe. 4 © RiTech International Ltd, Confidential & Proprietary
  • 5. Vision First Choice Solution provider in the Biometric security industry Biometric Process Algorithms Implementation knowledge Customised Solutions Ergonomics and desgin Sensors 5 © RiTech International Ltd, Confidential & Proprietary
  • 6. Objectives Advanced Research and Development • Biometrics products for portable information storage and transportation • Biometrics products for Intellectual Property Protection • Biometrics products for secure identification over networks • Biometrics products for as a secure replacement over existing keys, cards, password which tend to be a burden 6 © RiTech International Ltd, Confidential & Proprietary
  • 8. What is Biometric? The Science of measuring and statistically analyzing biological data 8 © RiTech International Ltd, Confidential & Proprietary
  • 9. What is Biometric? Biometric Technology Authentication can be divided into three different factors: • something you know • something you have • something you are 9 © RiTech International Ltd, Confidential & Proprietary
  • 10. Something you know Common • Pin Numbers/Code • Learn it , You have to remember the Code Number • Forced to memorize passwords Disadvantage:- Software hacking tools via internet, easy to steal by anyone. (e.g. Keylogger) 10 © RiTech International Ltd, Confidential & Proprietary
  • 11. Something you have Example Smart cards • Cash Card • ATM Card • Visa/Master Card • Door/Building Access Card Disadvantage:- If picked up by anyone, it can still be used. (e.g. Paying at a Petrol Station) 11 © RiTech International Ltd, Confidential & Proprietary
  • 12. Something you are Biometrics is what you are! What you have: 1. Your Finger > Fingerprint 2. You cannot loose it 3. You cannot give it away You cannot tell a friend to use your prints. 12 © RiTech International Ltd, Confidential & Proprietary
  • 13. Types of Biometric 1. BEHAVIOURAL – Voice Patterns – Signature Verification – Key Stroke Patterns (Signatures) 2. PHYSIOLOGICAL – Fingerprints – Hand Geometry – Retinal & Iris Scanning – Facial Recognition – DNA Fingerprinting 13 © RiTech International Ltd, Confidential & Proprietary
  • 14. Biometric Comparison Comparison of various biometric technologies It is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters: • Universality => each person should have the characteristic • Uniqueness => is how well the biometric separates individually from another. • Permanence => measures how well a biometric resists aging. • Collectability => ease of acquisition for measurement. • Performance => accuracy, speed, and robustness of technology used. • Acceptability => degree of approval of a technology. • Circumvention => ease of use of a substitute. 14 © RiTech International Ltd, Confidential & Proprietary
  • 15. Biometric Comparison Comparison of existing biometric systems Comparison of various biometric technologies, modified from Jain et al., 2004 (H=High, M=Medium, L=Low) Biometrics: Universality Uniqueness Permanence Collectability Performance Acceptability Circumvention Face H L M H L H L Fingerprint M H H M H M H Hand geometry M M M H M M M Keystrokes L L L M L M M Hand veins M M M M M M H Iris H H H M H L H Retinal scan H H M L H L H Signature L L L H L H L Voice M L L M L H L Facial H H L H M H H thermograph Odor H H H L L M L DNA H H H L H L L Gait M L L H L H M Ear Canal M M H M M H M 15 © RiTech International Ltd, Confidential & Proprietary
  • 16. Fingerprint Identification Minutiae Definition • Form of Fingerprint • Number of Lines • Distance Between Marks 16 © RiTech International Ltd, Confidential & Proprietary
  • 17. Processing & Identification Fingerprint How many minutiae are needed for comparison? –Generally, a complete fingerprint is made up of up to 100 minutiae –Fingerprint recognition normally requires 20~30 minutiae for processing 17 © RiTech International Ltd, Confidential & Proprietary
  • 18. The Biometrics’ Dilemma 18 © RiTech International Ltd, Confidential & Proprietary
  • 19. Biometric Advantages Advantages of Biometrics for Access Control Copy Theft Forgotten Lost Key X X X X Badge - X X X PIN Code X - X - Biometric - - - - Feature 19 © RiTech International Ltd, Confidential & Proprietary
  • 21. WHY? • Threat of data theft is real and costly • Affects employees negatively • Affects company negatively • Loss of productivity and credibility • Loss of profits and sustainability 21 © RiTech International Ltd, Confidential & Proprietary
  • 22. HOW? • Physical theft and hacking Actual device is stolen and tapped for data • Social engineering Passwords or access keys can be coaxed • Virtual hacking and theft Popular method of data theft • Man-in-the-Middle attacks Spying and snooping on communications 22 © RiTech International Ltd, Confidential & Proprietary
  • 23. Securing Data Signature can meet security challenges with Tamper-proof with self-destruct function Fingerprint recognition (biometric) Built-in AES-128 bit data encryption Features to protect user identification 23 No passwords during usage © RiTech International Ltd, Confidential & Proprietary
  • 24. Safekeeping Self Destruct Feature  Activated when tampering is detected  All data drive is destroyed  Keeps confidential data out of reach No backdoor access  No password or function to reset security  Only valid fingerprints are allowed access 24 © RiTech International Ltd, Confidential & Proprietary
  • 25. Hardware Benefits AES-128bit hardware encryption  Keys never leave Signature  Avoids tapping/snooping of keys  All data on drive is encrypted  On the fly encrypt and decrypt Totally hardware-based  Resistant to software-based attacks  Security methods are encapsulated in hardware 25 © RiTech International Ltd, Confidential & Proprietary
  • 26. Protecting Fingerprints  Dual-finger authentication  Reduces latent fingerprint copy  Intruder requires 2 unique fingerprints  Limiting fingerprint retries  Intruder has less time to guess correct fingerprint  Limits tries and time for correct fingerprint 26 © RiTech International Ltd, Confidential & Proprietary
  • 27. Convenience • Anti-static rubberized casing  Hard to copy fingerprints on device  Less dust attraction to protect sensor • Cross platform compatibility  Nofurther software or software needed  Works in Windows, MAC, Linux, Solaris, etc. 27 © RiTech International Ltd, Confidential & Proprietary
  • 28. Unique Service • Our technology is mature and battletested Our company is the leader in this field • Quick response to security breaches Product is constantly updated • Customization to end users Security tokens, 3rd party software 28 © RiTech International Ltd, Confidential & Proprietary
  • 29. Summary of Features 1) Dual-Finger Authentication 2) Unique Self Destruct 3) Hardware Crypto AES-128bit 4) Worldwide Patents Awarded United Kingdom, Netherlands, Germany, France, China, Hong Kong, Singapore, Malaysia and many more. 29 © RiTech International Ltd, Confidential & Proprietary
  • 30. END