140 likes | 321 Views
Biometric standards An overview of biometrics and identity management. Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen 120070494. The need to identify. Every day we are required to identify ourselves Using a bank card with a PIN at a cash machine
E N D
Biometric standardsAn overview of biometrics and identity management UNIVERSITY OF PALESTINE Supervisor : Ahmed Abu Mosameh Prepared by samaherel nbahen 120070494
The need to identify • Every day we are required to identify ourselves • Using a bank card with a PIN at a cash machine • A password to log on to a computer • Using a key to open a door • Punching a code into a keypad to enter the workplace • Using passwords on the Internet • Providing a passport and driving licence as proof of identity • We need to be able to accurately IDENTIFY an individual to minimize current issues and threats UNIVERSITY OF PALESTINE
Current attributes used to identify • Name • Address • Postcode • Date of Birth • Account no. • Passwords • PINs • Phone no. • Mother’s maiden name • Passport • Birth certificate • Driving licence • Credit cards • Utility bills • Membership cards • Salary slip UNIVERSITY OF PALESTINE
Is biometrics the answer? • A biometric is part of the person and is not easily compromised through: • Theft • Collusion • Loss • Simplifies user management resulting in cost savings • Users do not need to remember passwords • Users do not need to remember PINs • User accounts cannot be shared • Easy to use UNIVERSITY OF PALESTINE
Biometric definition • The automated recognition of individuals based on their behavioural and biological characteristics • The general meaning of biometrics encompasses counting, measuring and statistical analysis of any kind of data in the biological sciences including the relevant medical sciences • The term is derived from the Greek words “bios” meaning life and “metron” meaning measure UNIVERSITY OF PALESTINE
Biological and behavioural • Behavioural • Signature • Gait • Voice • Keystroke dynamics • Biological • Fingerprint • Face (2D & 3D) • Iris • Vein pattern • Hand geometry • DNA UNIVERSITY OF PALESTINE
Iris • Captures the pattern of flecks on the iris • Uses conventional cameras • Average 2 seconds for identification • No physical contact between user and reader UNIVERSITY OF PALESTINE
Face • Based upon the geometric shape and position of features of the face • Resistant to changes in skin tone, facial hair, hair style, and eyeglasses • No active user involvement required in order to perform identification/verification • Limited success in practical applications UNIVERSITY OF PALESTINE
Voice • Analyses voice patterns and characteristics of speech e.g. pitch, tone, etc. • High user acceptance – perceived as least intrusive biometric technology • Easy for end users to implement • Ideal for telephone systems/mobile environments UNIVERSITY OF PALESTINE
Hand geometry • Measures the physical characteristics of the user’s hand and fingers • Low level infrared light and camera used to capture an image • Suited to applications where there is a large user base or users access the system infrequently • Systems are easy to use and robust UNIVERSITY OF PALESTINE
Signature • Based on analysis of the dynamics of a handwritten signature e.g. shape, speed, stroke order, pen pressure • Generally use pressure sensitive tablets or wired pens • User friendly • Non intrusive – minimal public acceptance issues • Captured signature can be used for digitally signing documents UNIVERSITY OF PALESTINE
Keystroke dynamics • Monitors rate of typing and intervals between letters • Verification based on typing rhythm – intruders may guess password but fail to key in with correct rhythm • Neither enrolment nor verification disturbs the regular flow of work • Low cost – only hardware required is keyboard UNIVERSITY OF PALESTINE
Fingerprint • Variety of fingerprint devices available (silicon and optical) • Template constructed by analysing patterns that make the fingerprint (minutiae) UNIVERSITY OF PALESTINE
DNA • Forensic genetics use deoxyribonucleic acid (DNA) profiling in a number of important human identity applications • 0.01% of a person's entire genome is unique to each individual • This represents 3 million base pairs of DNA • 95% of the human genome are non-coding sequences (called junk DNA) • Standard profiling systems only exploit the junk DNA to maintain the privacy and civil rights of the donor UNIVERSITY OF PALESTINE