1 Biometric Authentication and Multilateral Security
|
|
|
- Lindsey Porter
- 10 years ago
- Views:
Transcription
1 1 Biometric Authentication and Multilateral Security Gerrit Bleumer AT&T Labs-Research, Shannon Laboratory, Florham Park, NJ Abstract: We are currently facing industrial societies turning rapidly into information societies. Computer systems that were previously separated and dedicated to specific tasks become a more and more integrated global information system. The driving force is competition of service providers of all kinds and perhaps the most visible indicator is the convergence of telephone, cell phone and satellite networks, TV cable networks and the Internet. This global system provides a multitude of services and at the same time controls access to services, resources and funds. In order to enforce access authorizations effectively, and also to overcome the notorious disadvantages of passwords and PINs, which need to be memorized, it will become common practice to recognize human individuals biometrically. Biometric technology is already available and will soon be cheap enough to be applied on a large-scale basis. If this leads to an uncontrolled proliferation of biometric data, then not only the privacy of individuals is at serious risk, but democracies as such are so. It may sound paradoxical, but biometric recognition is possible, without individuals giving away their personal biometric data to any device under the control of a verifying organization or corporation. We draft a cryptographic solution based on recent research results. This work focuses less on the biometric techniques themselves, but rather on how the resulting biometric data is handled in the authentication process. Subject descriptor codes: Communications networks (D04), Computer architecture (D05), Encryption (D07), Human computer interaction (D10), Remote sensing (D30), Market application codes: Biosensors (A05), Data/information security (D07), Mobile communications/cellular radio (D25), System security (D30) 1.1 Introduction More and more biometric technology is getting employed in order to detect and recognize individuals. Criminal investigation and intelligence are still the dominant areas of application, but it is becoming commonplace in the commercial sector and in the public. For example, scarce and/or valuable resources in everyday life are increasingly protected by video controls. Governments enforce their immigration laws by taking fingerprints of certain people entering their countries. Companies, hospitals and organizations protect the entrances
2 of their buildings, interior rooms, computers and safes by fingerprint readers. Some companies keep track of working hours by automatically recognizing incoming and outgoing employees. Banks monitor their tellers and ATMs in order to defeat theft and credit card fraud. Car manufacturers are developing biometrically protected door locks and ignition locks in order to discourage theft and keep minors from driving. Drivers are getting video monitored when passing road tollbooths, bridges or tunnels. More sophisticated biometric technology will soon lead to non-transferable membership cards, passports, driver s licenses, season tickets or election ballots. Biometric technology tends to cost more than password or token-based systems, because the hardware required to sense and analyze biometric patterns is more complicated. However, biometrics provide a very high level of security because the authentication is directly related to a unique physiological or behavioral characteristic of the individual, which is more difficult to counterfeit. Recent technological advances have also helped to reduce the cost of biometrics. Moreover, biometric technology can be easier and more convenient to use than password or token-based systems. Biometric samples cannot be forgotten or lost, and they need not (and cannot) be changed on a regular basis. According to Frost & Sullivan the worldwide revenues for biometric systems in 1998 were about US$ 113 million. This amount breaks down into the following application areas: Physical access control (52.8%), law enforcement (12.9%), healthcare (10.2%) banking (8.3%), immigration (4.9%), computer security (4.1%), welfare (4.1%) and telecommunications (2.7%) [23]. In principle, biometric samples can be used more or less reliably to recognize individuals quickly, anywhere, and at any time throughout their entire life. So the technology opens the possibility to link all the political, economic and social roles and behaviors of an individual. How someone behaves as a customer, patient, car driver, member of the armed forces or as a tenant may have consequences on his treatment as an insurance policy holder, bank account owner, employee, or seeker of employment and vice versa. If biometric technology gets deployed on a large scale basis and thus individuals cannot prevent the proliferation of their personal biometric data unless facing serious disadvantages in everyday life, then automatic biometric recognition becomes the default; avoiding it will require criminal activity [13, 14, 20]. Another risk of biometric technology is that personal biometric data could be interpreted in medical terms and therefore may reveal certain medical diagnoses. Some methods of obtaining biometric data may even harm individuals. For example, taking blood samples may cause infection with debilitating diseases. The higher these risks are, the more invasive or intrusive the biometric method is called. Some governments and international organizations already acknowledge and address the risks of intrusive biometric methods by specific legislation. See for example the Convention 108 of the Council of Europe for the Protection of Individuals with regard to Automatic Proc-
3 essing of Personal Data [16] and the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data [24]. We give an overview of how current biometric technology works and then draft a new cryptographic solution for personal credentials. Our solution combines the security of biometrics with strong data protection. In previous work, it has been shown how personal credentials can be used to implement drivers licenses [7] or to invoice and remunerate medical expenses in a health care system [6]. 1.2 Biometric Authentication The purpose of user authentication is to determine whether or not a user at hand has a required privilege, such as an access right. Every user first needs to be enrolled in the system by providing some unique individual pattern or characteristic which is then digitized and stored by the system as a (binary) template for the respective user. In the simplest case, the pattern is a keyed-in password, digitization is obsolete and the template is the password in clear, compressed or encrypted form. During each authentication later on, 1. the user first reproduces the pattern and lets the system sense it (sensing). 2. The system then compares the actual pattern with the templates in order to recognize the user (recognition). 3. Finally, the system determines whether the recognized user is assigned the required credential(s) (authorization). If the patterns are biometric samples, then we speak of biometric recognition and authentication. In principle there are two types of recognition. The most frequent case is (biometric) verification. During the enrollment process, users are assigned some index such as a username or PIN, and their biometric templates are stored together with these indexes. In order to be recognized, users provide their index and their actual pattern, while the system verifies that the actual pattern matches the template stored for the provided index. The other case is (biometric) identification. During the enrollment process, users only leave their biometric templates. Whenever an actual pattern is presented to the system, it looks-up the best matching templates. This is how AFIS (Automated Fingerprint Identification Systems) work, which are used to automate the identification of culprits for crimes where a fingerprint has been left behind. For biometric recognition, unique physiological or behavioral characteristics are used. Common characteristics include the following [1]: Fingerprints are the recognized worldwide standard for identifying individuals; they are unique (even for identical twins) and non-transferable. Reliable and mature fingerprint readers are available off-the-shelf. About 30.4% of the worldwide revenue in biometric systems in 1998 is due to fingerprint technology [23].
4 Hand geometry looks at the three-dimensional size and shape of the hand. The results of over ninety measurements, including length, width, thickness and surface areas are converted into a nine-byte template. A new technique checks the vein pattern at the back of the hand. About 35.3% of the worldwide revenue in biometric systems (1998) is due to hand geometry technology [23]. Voice patterns still have problems that have not been solved satisfactorily. If the voice pattern depends on a single static phrase, it is very easy to masquerade by using a tape recorder. At the other extreme, text independent voice patterns require longer phrases, which in turn increases the time needed for recognition. The most promising trade-off may be voice patterns that depend on text that is chosen from a specified and large enough pool of phrases [18]. Other problems are background noise, effects of colds and other voice changes. About 21.4% of the worldwide revenue in biometric systems (1998) is due to voice recognition technology [23]. Vein patterns on the eye s retina are known as one of the most unique characteristics owned by humans. This pattern is not genetically determined, but is randomly developed by each individual. It is one of the most stable characteristics in the life of a person. Only extreme wounds can alter the retina pattern. A typical retinal template is 40 byte long and a scan takes 1.5s. This and each of the following technologies contribute to the worldwide revenues in biometric systems (1998) by less than 5%. Optical or thermal face patterns are the ideal characteristics in terms of intrusiveness and user acceptance. However, the ways in which the appearance of the face of the same person may change are so many that most recognition systems are only in research state and have never performed well enough for actual use. Physiological characteristics like fingerprints, hand geometry etc. are usually called static because they cannot be altered deliberately. Behavioristic characteristics like voice patterns, typing patterns and written signatures are called dynamic although they may contain a (small) physiological component. The performance and quality of a given biometric recognition method is stated in terms of the following criteria: 1. false acceptance rate (FAR), 2. false rejection rate (FRR), 3. processing time (time to reproduce a pattern and to match it with a template) 4. size of templates (short templates are important for smart card based solutions) 5. vulnerability to fraud (authorized individuals may or may not collaborate in fraud.) 6. acceptability (social acceptability, intrusiveness, discrimination of minorities) 7. long-term stability (period over which a biometric pattern remains stable) The interpretation of FAR, FRR and processing time is not easy, because they are inherently related [18]. In practical systems, the rate of false acceptances can be decreased at the expense of a higher rate of false rejections and vice versa. Also repeat-
5 ing the number of scans of the biometric pattern can decrease both rates. That of course reduces the time to recognize. More information about available products can be found on the homepage of the Biometrics Consortium [5] System Architectures From now on, we consider distributed biometric verification architectures with a number of access points where users from a given population can be biometrically verified and optionally be authenticated to have a required privilege. In the latter case we call them biometric authentication architectures. The standard solution is an online architecture where one or more verification servers run a (distributed) database of biometric templates and make it available to each access point by means of wired or wireless networks. For each verification the access points need to contact the verification servers. In order to match the actual biometric pattern to a template, the access point can send the actual pattern to a verification server and wait for a response (push-model). Alternatively, it can request one or more templates from a verification server to make the match itself (pull-model). Software applications can use these services through a BioAPI, which is currently under development by the BioAPI consortium [4]. If the access points have enough storage and computing capacity and the database of templates does not need to be updated too frequently, then the templates can be stored right at the access points. This results in an offline architecture because the access points can recognize individuals without connecting to any verification servers online [16] Security and Acceptability Sensing static patterns like blood samples, retina or iris scans, fingerprints, or DNA samples tends to be more intrusive than sensing dynamic patterns, and therefore the latter is more acceptable to the general public. Sensing dynamic patterns, however, usually leads to higher false acceptance and rejection rates because dynamic patterns cannot be produced as accurately as static ones, in particular so in case of illness, stress, intoxication or other environmental influences. Another problem is that dynamic patterns can be counterfeited to a certain extent. Fingerprint readers are currently the most mature and most widely deployed devices for biometric recognition in part because they have a long history in criminal investigation. For example, the Touchsafe II Fingerprint Identity Verification Terminals by Identix achieves FAR <.001% and FRR < 2% at 2s per recognition. Besides there are devices to distinguish live fingers from dead fingers or latex gloves. The long tradition in criminal investigation, however, stigmatizes fingerprint scanners and makes them less acceptable in many civil areas. There are off-the-shelf products that produce the templates in a data format incompatible to that used by law enforcement. But it is unclear how much effort is necessary to convert the format of a commercial product with sufficient accuracy into a format used in law enforcement.
6 In terms of privacy protection, online verification architectures pose a much bigger threat of surveillance than traditional paper based systems where persons identify themselves by means of passports, badges, etc, with imprinted photographs. The problem with online verification architectures is that the verification servers can gather enough information in order to compile the histories of users with respect to certain activities. For example, road tollbooths can be used to compile moving profiles; computer login data and cookie information can be used to compile detailed profiles of interest and behavior of each member enrolled in a system. This is already becoming reality in online marketing (e.g. Offline verification architectures are less threatening per se, but they bear the potential for large-scale surveillance because the separate access points can of course be connected at some later time. So in terms of privacy protection, the problem is not so much, which biometric characteristics are used for verification, but rather who is in control of the biometric templates and the actual biometric data resulting from the numerous verifications every day. 1.3 Personal Assistants and Observers From now on, we consider an offline authentication architecture, where each individual holds a personal mobile device (assistant) that is capable of biometrically verifying its holder. In order to prevent individuals from counterfeiting, the biometric sensor is embedded into a tamper resistant security module [14, 25] (observer) inside of each assistant. Whenever an assistant communicates with an access point, it needs the help of its observer, but the communication protocols are designed such that the assistant can effectively prevent its observer from leaking unintended information to the access point, or receive unintended information from there. All the observer does is to authenticate legitimate transactions of its assistant, which may or may not require a biometric verification of the actual holder. In this offline authentication architecture, the access points are effectively split into two pieces, a machine (verifier) controlled by the verifying organization, and an observer controlled by the respective user seeking access. The two pieces are physically and logically separated by the user s assistant, which hosts the respective observer and provides the communication interface to the verifier. This way, each user keeps her biometric templates and all her actual biometric data under her exclusive control. Users cannot inspect their observers, but they can effectively prevent their observers from leaking any information to the outside world. No proliferation of personal biometric data can occur, unless observers are lost or stolen. The general concept of a personal assistant hosting a tamper resistant security module has been introduced by Chaum and Pedersen as the wallet-with-observer architecture [14, 13]. Candidates for assistants are cell phones, organizers, palm pilots or computer cards, i.e., the next generation of smart cards, which can have a biometric sensor implanted. An overview of existing and upcoming personal devices is found in [15, editor: include reference to the reachability manager in this volume]. Assistants must have their own power supply and user interface in order to be independent of the verifiers.
7 Assistants must be capable to communicate with verifiers, for example, by wireless or infrared connections. Observers are preferably implemented by chips that integrate a biometric sensor and a digital signature functionality. Single chip solutions of biometric sensors already exist. See for example AuthenTec s FingerLoc system [2]. Cell phones with integrated biometric identification are under development by a consortium of GEMPlus (France), ARM (UK) and Nokia (Finland) sponsored by the European Union through their project ESPRIT-CASCADE [10]. Each observer comes from the manufacturer with a built in secret signing key (native key) and a corresponding registered public verification key. Before an observer can be used, it needs to be personalized with a biometric template of its legitimate holder. During this irreversible process, the holder s biometric template is created and stored inside the observer. From then on, the observer can biometrically verify its actual holder. Offline identification by assistants with observers keeps personal biometric data under the control of their holders unless observers are lost or stolen. Even in this case, adversaries learn only one biometric template at a time, not hundreds or thousands as in the case of verification servers broken into. The most interesting potential of offline verification by assistants is the possibility of anonymous, even untraceable, transactions that require biometric verification or authentication. For example, showing a driver s license could be done anonymously, if the assistant guarantees that the person showing the driver s license to an automatic road check point is indeed the owner of the driver s license. Nothing must be revealed about the driver except that he has a valid license. Drivers licenses may even be shown in an untraceable way. That is if two cars pass an automated road check point, the system need not even be able to find out if it is the same driver. In principle, an online verification system cannot support untraceable biometric verification or authentication, because verification servers can link each individual s transactions by its index and biometric template. 1.4 Untraceable Biometric Credentials The third step of user authentication is to look up if the verified user holds the authorization or credential that is required by the application, for example, a valid driver s license. Only then is the user successfully authenticated. In online and offline authentication architectures, the database of credentials, i.e., who has what privileges, can be implemented in the same database as the biometric templates. Furthermore, if users choose pseudonyms as their indexes, then they can be authenticated anonymously, i.e. without revealing their real identity. Alternatively users might keep their own credentials locally in their assistants in an unforgeable way. The advantages are twofold: It is more natural for users to keep their credentials under their own control, and users can be authenticated not only in an anonymous but also in an untraceable way. We are now going to sketch an efficient cryptographic solution for untraceable personal credentials. Our principals are the issuers, the holders and the verifiers of cre-
8 dentials. Holders are equipped with assistants each hosting an observer into which a biometric sensor is implanted. The basic idea underlying the following solution is that holders show their credentials in an untraceable way by using one-time pseudonyms. We consider three basic transactions: A credential holder introduces herself to an issuer under a chosen pseudonym. An issuer issues a credential to a holder under a pseudonym introduced to him. A holder shows a credential to a verifier using a new pseudonym. During each of these transactions, the holder s assistant interacts with the machine of the respective issuer or verifier. Pseudonyms for which credentials are issued and shown are called source pseudonyms and target pseudonyms, respectively. The following solution makes use of two cryptographic building blocks, namely interactive proofs of knowledge [3] and blind signatures [11, 12]. Conceptually, they are applied as follows. Credentials tie an authorization to a user identifier (real name, pseudonym, etc.) in a publicly verifiable way. Here, they are implemented by digital signatures given for pseudonyms. A pseudonym represents a credential holder, and a public verification key represents an authorization also called the type of a credential. For example, if there are 3 types of club members, then the issuer provides signatures with respect to 3 different verification keys. Special blind signature schemes allow to obtain a signature for a source pseudonym with respect to a given public key and to transform it into a signature for a target pseudonym with respect to the same and only the same verification key. This way, the holder can produce many different and unlinkable representations of the same credential, which allows her to show a credential many times without revealing that all the shows have resulted from the same holder. Next, the pseudonyms of a user need to be tied to her biometric template in a way that is enforceable by the observer in her assistant. We therefore introduce pseudonym witnesses, which are secrets that unlock a pseudonym in the following sense. 1 For each pseudonym there is at least one witness. In order to use a pseudonym, users have to prove knowledge of a matching witness. This is done by an interactive proof of knowledge that does not disclose the prover s witness to the verifier. Pseudonym witnesses are split into two shares, one chosen and held privately by the user s assistant, and the other by its observer. Finally, the observer participates in proving knowledge of its share of a pseudonym witness only if it verifies its holder successfully. Any transfer of credentials among individuals is thus prevented unless observers are broken. Now we sketch the three transactions in some more detail. A technical cryptographic description in found in [7] and an implementation of the special blind signature scheme is found in [8]. 1 The term witness is established in the cryptographic literature for proofs of knowledge.
9 1.4.1 Introducing Source Pseudonyms Assistant and observer together form a new source pseudonym ψ for the user. Each of them independently chooses one respective witness share a and b. Together, they hold the complete witness z = ( a, b) without learning each other s shares. Finally, they compute the source pseudonym ψ for the witness z. Then the user introduces herself to an issuer by submitting the source pseudonym ψ and attaching a valid native signature from its observer. The observer produces this signature by its native key, which assures the issuer that a registered observer co-operates in the introduction of a pseudonym. Finally, the assistant asks its observer to co-operate in proving knowledge of the witness z for ψ. The observer verifies the actual user biometrically and, if successful, co-operates in the proof of knowledge (Figure 1). The issuer registers the new source pseudonym as successfully introduced. When showing this credential later on, the assistant needs to ask its observer to re-use its witness share b. ψ Assistant Issuer with native signature of observer Interactive proof a ψ b of knowledge of witness of ψ Observer Figure 1: Introducing a source pseudonym Issuing Credentials The user connects her assistant either directly or remotely to the issuer s machine. She then asks for a certain type of credential for the source pseudonym ψ introduced earlier. The issuer provides a credential of the requested type for the suggested source pseudonym. The blind signature protocol enables the assistant to compute a signature σ for a new intermediate pseudonym ψ without the issuer learning any of the two. At the same time, the assistant is able to update its witness share to a, so that the two shares ( a, b ) make up a witness of the intermediate pseudonym ψ (Figure 2). A user can request several credentials from the same issuer for the same or different source pseudonyms.
10 Assistant Issuer Blind signature for intermediate pseudonym ψ' a' ψ' b Observer σ' Figure 2: Issuing a credential Using Credentials The user connects her assistant either directly or remotely to the verifier s machine. For each show, the assistant transforms its intermediate pseudonym and signature into a target pseudonym ψ and signature σ. Again, this transformation allows the assistant to update its witness share to a, so that the two shares ( a, b ) make up a witness of the target pseudonym ψ (Figure 3). Next, the assistant asks its observer to co-operate in proving knowledge of a witness for the target pseudonym. Here, the assistant asks its observer to use the same witness share b as during the issuing of the credential. The observer co-operates only if it now verifies the actual holder successfully. Otherwise, the verifier is not convinced and rejects access. ψ'', σ'' Assistant Verifier Interactive proof a'' ψ'' b σ'' of knowledge of witness of ψ'' Observer Figure 3: Showing a credential Interdependent Credentials In real life, users often get issued a new credential if they have previously presented another credential and in addition pass a certain test. In case of the driver s license, it is usually required to present some document of identification and a medical report. Upon passing a written test and/or a driving test, a driver s license is issued. The document of identity, the medical report and the driver s license can all be regarded as personal credentials and in real life, many other examples of personal credentials exist and much more complex interdependencies occur. It appears that not many pseudonyms need to be introduced in advance. For example, the driver s license can be issued for the pseudonym for which the medical exam is shown. In other words, target pseudonyms of one credential can be re-used as source pseudonyms of another. Not only is this more efficient because it saves the explicit introduction of a new pseudonym, but rather is it vital to sustain untraceability. Note that every time a user introduces a new pseudonym explicitly (Section 1.4.1), its observer provides a signa-
11 ture with respect to its native key. Since each native key is unique and specific to one observer, all explicitly introduced pseudonyms are linkable by the respective issuers. In general, a user is better off to re-use target pseudonyms which have been introduced implicitly by showing other credentials (Section 1.4.3). 1.5 Security In mathematical terms, the transformation of source pseudonyms into intermediate pseudonyms is the same as the transformation of intermediate pseudonyms into target pseudonyms (including the respective signatures). If the assistant performs the transformation correctly and uses unbiased coins as a source of randomness in the protocol, each possible pseudonym and signature is equally likely to result from any given pseudonym and signature. Hence, source-, intermediate- and target pseudonyms are mutually unlinkable. So the assistant may show the same credential arbitrarily often without releasing more tracing information to the verifiers than what the type of this credential tells them anyway. For example, if a certain type of credential has been issued only once, then all shows of this type are easily linkable. In order to prevent users from loaning their credentials to others, the assistants must not be able to transform a given intermediate pseudonym and signature into a target pseudonym and signature, so that the assistant knows a complete witness for the target pseudonym. This would allow the user to bypass her observer, thereby also bypassing the biometric verification. The credential would be freely transferable to anyone. An efficient way to enforce this requirement is to employ a restrictive blind signature scheme. Such schemes guarantee that valid signatures can only be obtained for pseudonyms that are correctly transformed. It is then left to the relation of witnesses and pseudonyms to ensure that if an observer holds one witness share b of the source pseudonym, then it is feasible to find a witness of the intermediate pseudonym only if the observer s witness share b is known. Non-transforming restrictive blind signatures have been introduced by Brands [9], who built on work of Chaum and Pedersen [14]. These signature schemes allow elegant and efficient implementations of offline electronic cash with double spender detection. A transforming restrictive blind signature scheme, which is required for untraceable credentials as sketched above, was developed by the author [8]. What happens if an attacker breaks one or more observers? In the above solution, at most all credentials that have been issued using the broken observer(s) become transferable and can then be shown by anyone. However, the credentials of honest users are not affected, and the attacker is not enabled to create new credentials. 1.6 Conclusion Personal devices like cell phones, organizers, palm pilots, and others bear the potential to integrate various functionalities at a unified and convenient user interface. This is already apparent in devices by Qualcomm and Nokia, which combine the functionalities of a cell phone, pager, client, calendar and organizer. Personal devices
12 have an even bigger potential to increase the ease of biometric user verification for different services offered by various providers and at the same time enforce a level of personal data protection that could not be achieved by previous solutions. The importance of personal assistants for personal and multilateral security has been demonstrated in other work of the Daimler-Benz Kolleg [editor: could perhaps include one or two references here; preferably in one of these 3 volumes.] A solution is sketched how personal devices can be used in order to verify users biometrically, while their anonymity is maintained. A further solution is sketched for untraceable personal credentials using assistants that host security modules. Only non-transferability relies on the assumption that the security modules are tamper resistant, but unforgeability and untraceability hold without such an assumption. This distinguishes the new solution from a previous proposal by Chaum and Pedersen [8] where both unforgeability and non-transferability depend on tamper resistant observers. The new solution is applicable to many areas where personal membership is an issue. Holding a health insurance policy is one example. The whole billing process revolving around invoicing and remunerating medical expenses in a health care system can be designed based on patient held assistants [6]. All cryptographic building blocks used in this implementation are efficiently computable, can be employed in small personal devices and can be combined with any biometric recognition technology. 1.7 Bibliography [1] AND Identification B.V.: Comparison of Biometric Identification Methods; [2] AuthenTec Inc.: [3] Mihir Bellare, Oded Goldreich: On Defining Proofs of Knowledge; Crypto '92, LNCS 740, Springer Verlag, Berlin 1993, [4] The BioAPI Consortium: [5] The Biometrics Consortium: [6] Gerrit Bleumer, Matthias Schunter: Digital Patient Assistants: privacy vs cost in compulsory health insurance; Health Informatics Journal 4/3-4 (1998) [7] Gerrit Bleumer: Biometric yet Privacy Protecting Person Authentication; Information Hiding Workshop '98, LNCS 1525, Springer-Verlag, Berlin 1998, [8] Gerrit Bleumer: Many-Time Restrictive Blind Signatures; AT&T Technical Report ; [9] Stefan Brands: Untraceable Off-line Cash in Wallet with Observers; Crypto '93, LNCS 773, Springer-Verlag, Berlin 1994, [10] ESPRIT-CASCADE: Chip Architecture for Smart CArds and portable intelligent DEvices; [11] David Chaum: Blind Signature System; Crypto '83, Plenum Press, New York 1984, 153. [12] David Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; Communications of the ACM 28/10 (1985) [13] David Chaum: Achieving Electronic Privacy; Scientific American (August 1992) [14] David Chaum, Torben Pryds Pedersen: Wallet Databases with Observers. Crypto '92, LNCS 740, Springer Verlag, Berlin 1993, [15] Richard Comerford: Pocket Computers ignite OS Battle; IEEE Spectrum 35/5 (1998), [16] Coucil of Europe: Convention for the protection of individuals with regard to automatic processing of personal data;
13 [17] George I. Davida, Yair Frankel, Brian J. Matt, B. J. On Enabling Secure Applications Through Off- Line Biometric Identification; IEEE Symposium on Security and Privacy, IEEE Press 1998, [18] Sadaoki Furui, Aaron Rosenberg: Speaker Verification; in Vijay K Madisetti, Douglas B. Williams (eds.): The Digital Signal Processing Handbook; CRC-Press [19] Identix Inc.: [20] Constance Loizos: Biometrics The identification that you ll never leave home without; Red Herring, 9/98, [21] Benjamin Miller: Vital signs of identity; IEEE spectrum 31/2 (1994) [22] Klaus Müller, Axel Pfau: Biometrische Verfahren zur Verifikation der Personenidentität; DuD 16/7 (1992) [23] Emma Newham, Calum Bunney, Carolan Mearns: The Biometrics Report; SJB Services, Langport UK 1998; [24] OECD: Guidelines on the Protection of Privacy and Transborder Flows of Personal Data; [25] Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules; Computer 30/2 (1997)
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems
Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems A Smart Card Alliance White Paper May 2002 Smart Card Alliance 191 Clarksville Road Princeton Junction, NJ 08550 www.smartcardalliance.org
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
Trends in Finger Vein Authentication and Deployment in Europe
Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Biometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
BIOMETRIC AUTHENTICATION SECURITY AND USABILITY
BIOMETRIC AUTHENTICATION SECURITY AND USABILITY Václav Matyáš and Zdeněk Říha Faculty of Informatics, Masaryk University Brno, Czech Republic {matyas, zriha} @fi.muni.cz Abstract We would like to outline
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
Smart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Online Banking Customer Awareness and Education Program
Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
SECURITY SOLUTIONS BANKING AND FINANCE
SECURITY SOLUTIONS BANKING AND FINANCE Pacom has developed a distinguished reputation as a global leader in the field of remote security management for the banking and financial market. Over 25 years of
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
A Taxonomy of Single Sign-On Systems
A Taxonomy of Single Sign-On Systems Andreas Pashalidis and Chris J. Mitchell Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {A.Pashalidis, C.Mitchell}@rhul.ac.uk http://www.isg.rhul.ac.uk
Payment systems. Tuomas Aura T-110.4206 Information security technology
Payment systems Tuomas Aura T-110.4206 Information security technology Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2 MONEY TRANSFER 3 Common payment systems Cash Electronic credit
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control
A guide to access control for manufacturing sites
A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round
Accessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: [email protected] [1], [email protected]
WHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
Electronic Cash Payment Protocols and Systems
Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview
Global Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel
Strengths and Weaknesses of Access Control Systems Eric Schmiedl and Mike Spindel Choosing a System Error rate Environment Cost Physical Vulnerability Additional Constraints Error Rate False Reject Rate
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Data Security 2. Implement Network Controls
UNIT 19 Data Security 2 STARTER Consider these examples of computer disasters. How could you prevent them or limit their effects? Compare answers within your group. 1 You open an email attachment which
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
PalmSecureID for the EDUCATION MARKETPLACE
PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
Application of Biometric Technology Solutions to Enhance Security
Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
Two-Factor Authentication Making Sense of all the Options
Two-Factor Authentication Making Sense of all the Options The electronic age we live in is under attack by information outlaws who love profiting from the good record of others. Now more than ever, organizations
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
How To Secure Cloud Computing
Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,
Driving License. National Insurance Number
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
Information Security for Modern Enterprises
Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.
PTE ACADEMIC www.pearsonpte.com SECURE
PTE ACADEMIC www.pearsonpte.com We believe fair tests should be as secure as possible Cheating is unfair and undermines the efforts of the honest majority. We believe PTE Academic is the most secure test
Voice Authentication On-Demand: Your Voice as Your Key
Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment
Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to
White paper. Biometrics and the mitigation of card-related fraud
White paper Biometrics and the mitigation of card-related fraud The Aadhaar scheme, primarily envisaged to provide every resident proof of identity, holds a great deal of promise for other applications
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures
Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Identity Management: Key Technologies
Identity Management: Key Technologies Michael Huth imperial.ac.uk/quads Page 1 Key Concepts Subjects: agents that can request access to resources, e.g. you or Microsoft Word Subjects get access by claiming
