1 / 17

Stuff and things about things and stuff

Josh Tate. Stuff and things about things and stuff. Josh Tate. Advanced Authentication: A more secure way of identifying yourself. Advanced Authentication. Introduction. Very broad subject and highly researched. Focused on topics that could be quick to implement and (somewhat) inexpensive.

vianca
Download Presentation

Stuff and things about things and stuff

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Josh Tate Stuff and things about things and stuff

  2. Josh Tate Advanced Authentication: A more secure way of identifying yourself

  3. Advanced Authentication Introduction • Very broad subject and highly researched. • Focused on topics that could be quick to implement and (somewhat) inexpensive. • Solutions that could be used at home/work/public.

  4. Advanced Authentication What is Authentication: • Most common ways to authenticate today: Something you know Something you know/have Something you have ?

  5. Advanced Authentication What is Authentication: (easily)

  6. Advanced Authentication Authentication Methods I will cover: • Fingerprint / Knuckle Identification • Fingerprint & smart card combinations • EyePassShape

  7. Advanced Authentication Fingerprint / Knuckle Identification • “No two fingerprints have ever been found alike in many billions of human and automated computer comparisons.  Fingerprints are the very basis for criminal history foundation at every police agency on earth. Fingerprinting established the first forensic professional organization, the International Association for Identification (IAI), in 1915.” [1] • Researchers noticed that fingerprints could uniquely identify people as early as the 1800’s.

  8. Advanced Authentication Fingerprint / Knuckle Identification

  9. Advanced Authentication Fingerprint / Knuckle Identification

  10. Advanced Authentication Fingerprint & smart card combinations • Very secure because it combines all 3 authentication techniques (are/have/know) • The research paper pitched this idea as a replacement for Passports / Drivers License / Credit Cards etc. • Stolen Wallet?

  11. Advanced Authentication Fingerprint & smart card combinations

  12. Advanced Authentication EyePassShape • Public authentication is time-critical. • Authentication token should be easy to remember. • Authentication has to be secure. • Authentication methods have to be easily deployable .

  13. Advanced Authentication EyePassShape EyePIN Not very Time-Critical Very Secure Pass Shape Not very Secure Very Fast Both are easy to deploy and are easy to remember

  14. Advanced Authentication EyePassShape • Fast • Easy to Remember • Secure • Deployable

  15. Advanced Authentication EyePassShape

  16. Advanced Authentication EyePassShape

  17. Advanced Authentication References [1] The History of Fingerprints, January 2012, http://onin.com/fp/fphistory.html [2] Biometric Education » Fingerprint, http://www.barcode.ro/tutorials/biometrics/fingerprint.html [3] Pallav Gupta, Srivaths Ravi, Anand R, Kiral K. Jha, Efficient fingerprint-based user authentication for embedded systemsmDAC 2005 Proceedings of the 42nd annual Design Automation Conference, 244-247. [4] Lionel Beauge, AndrzejDrygallo, 2010, Fully featured secure biometric smart card device for fingerprint-based authentication and identification, MM&Sec 2010 Proceedings of the 12th ACM workshop on multimedia and security, 181-186. [5] Alexander De Luca, Martin Denzel, Heinrich Hussmann, 2009, Look Into My Eyes!: can you guess my password?, SOUPS 2009 5th Symposium on Usable Privacy and Security, Article 8.

More Related