Importance of Open Discussion on Adversarial Analyses for Mobile Security Technologies --- A Case Study for User Identification ---
|
|
|
- Osborn Woods
- 9 years ago
- Views:
Transcription
1 ITU-T Workshop on Security, Seoul Importance of Open Discussion on Adversarial Analyses for Mobile Security Technologies --- A Case Study for User Identification May 2002 Tsutomu Matsumoto Graduate School of Environment and Information Sciences Yokohama National University [email protected]
2 Security Architecture Operating Systems Security Software Tamper Resistance Mobile Code Security Physical Tamper Resistance Communications Security Cryptographic Protocol User Identification Mobile Security Technologies
3 Adversarial Analysis Security assessment of biometric user identification systems should be conducted not only for the accuracy of authentication, but also for security against fraud. In this presentation we focus on Fingerprint Systems which may become widespread for Mobile Terminals. Examine Adversarial Analysis as A Third Party Can we make artificial fingers that fool fingerprint systems? What are acceptance rates?
4 Fingerprint Systems Typical structure of a fingerprint system Finger Data Result Finger Capturing Feature Extraction Comparison Presenting Recording Referring Finger Information Database Fingerprint System Enrollment Types of sensors Optical sensors Capacitive sensors Thermal sensors, Ultrasound sensors, etc. Verification or Identification Live and Well Detection
5 A Risk Analysis for Fingerprint Systems Attackers may present 1) the registered finger, by an armed criminal, under duress, or with a sleeping drug, 2) an unregistered finger (an imposter's finger), i.e., non-effort forgery, 3) a severed fingertip from the registered finger, 4) a genetic clone of the registered finger, 5) an artificial clone of the registered finger, and 6) the others, such as a well-known method as a fault based attack.
6 Fraud with Artificial Fingers Part of patterns of dishonest acts with artificial fingers against a fingerprint system. L(X): A Live Finger corresponding to Person X A(Y): An Artificial Finger corresponding to Person Y A(Z): An Artificial Finger corresponding to Nobody
7 Fraud with Artificial Fingers I Enrollment X Y obtains A(X). X L(X) Authentication L(X) Y A(X) X Distribution of A(X)s A(X)s A(X) X or Y
8 Fraud with Artificial Fingers II X obtains A(Y). X enrolls A(Y). X Y Authentication A(Y) X X A(Y) A(Y) Distribution of A(Y)s A(Y)s A(Y) or L(Y) X or Y
9 Fraud with Artificial Fingers III Enrollment X Y makes A(X). L(X) X L(X) Authentication L(X) X Y A(X)s A(X) Distribution of A(X)s A(X) Y
10 Mapping a Fingerprint onto Artificial Fingers Finegerprint e.g., Live Fingers, Generators,... Impression e.g., Molds, Residual Fingerprints,... Artificial Finger
11 Known Results Process 0 (1) Finger (2) Mold (3) Silicone Rubber Finger
12 Fact Optical Sensor Capacitive Sensor Finger Finger Light Source Detector Array of Electrodes Often Accepts Silicone Rubber Fingers Usually Rejects Silicone Rubber Fingers
13 Our Result Gummy Fingers Process 1 (1) Finger (2) Plastic Mold (3) Gummy Finger
14 Recipe 1-1 Making an Artificial Finger directly from a Live Finger Materials Free molding plastic FREEPLASTIC by Daicel FineChem Ltd. Solid gelatin sheet GELATINE LEAF by MARUHA CORP 350JPY/35grams 200JPY/30grams
15 Recipe 1-2 Making an Artificial Finger directly from a Live Finger How to make a mold Put the plastic into hot water to soften it. Press a live finger against it. It takes around 10 minutes. The mold
16 Recipe 1-3 Making an Artificial Finger directly from a Live Finger Preparation of material A liquid in which immersed gelatin at 50 wt.%. Add boiling water (30cc) to solid gelatin (30g) in a bottle and mix up them. It takes around 20 minutes.
17 Recipe 1-4 Making an Artificial Finger directly from a Live Finger How to make a gummy finger Pour the liquid into the mold. Put it into a refrigerator to cool. It takes around 10 minutes. The gummy finger
18 Similarity with Live Fingers The photomicrographs of fingers (a) Live Finger (b) Silicone Finger (c) Gummy Finger
19 Captured Images Captured images with the device C (an optical sensor). (a) Live Finger (b) Silicone Finger (c) Gummy Finger Captured images with the device H (a capacitive sensor). (a) Live Finger (b) Gummy Finger
20 Fingerprint systems: 11 types Experiments Subjects: five persons whose ages are from 20 s to 40 s We attempted one-to-one verification 100 times counting the number of times that it accepts a finger presented. Types of experiments Experiment Enrollment Verification Type 1 Live Finger Live Finger Type 2 Live Finger Gummy Finger Type 3 Gummy Finger Live Finger Type 4 Gummy Finger Gummy Finger
21 The List of Fingerprint Devices Device A M anufacturer / Selling Agency Compaq Computer Corporation Product Name Compaq Stand-Alone Fingerprint Identification Unit H ardw are S pecifications Type DFR -200 Product Number E03811US001 Sensor Optical Sensor Live and Well Detection unknown M anufa cturer / S elling Agency Compaq Computer Corporation Software Specifications Product Name (Application) F ingerprint Identification T echnology Software version 1.1 Comparison Levels 1 through 3 Methods fo r Verification Minutiae Matching Device B MITSUBISHI ELECT RIC CORPORATION Fingerprint Recognizer FPR-DT mkii Optical Sensor unknown Sumikin Izumi Computer Service co. Ltd. S ecfp V1.11 Fixed Minutiae Matching Device C NEC Corporation Fingerprint Identification Unit (P rism) N Y00003 Optical Sensor unknown NEC Corporation B a sic U tilit ie s for F ingerprint Identification Fixed Minutiae Matching (Minutia and Relation) Device D OMRON Corporation Fingerprint Recognition Sensor FPS Optical Sensor unknown OM RON Corporation "YUBI PASS " U.a re.u Fingerprint Verification Software Fixed Minutiae Matching Device E Sony Corporation Sony Fingerprint Identification Unit FIU-002-F Optical Sensor Live Finger detection TSUBASA SYSTEM CO.,LTD. F ingerprint Identification Unit W indows 95 Interactive Demo Version 1.0 Build 13 1 through 5 Pattern matching Device F FUJITSU LIMITED Fingsensor FS-200U 00AA Capacitive Sensor unknown FUJIT SU LIMITED Logon for Fingsensor V1.0 for W indows 95/98 Fixed Minutiae Matching (Correlation) Device G Device H NEC Corporation Siemens A G (Infineon Technologies AG) Fingerprint Identification Unit (S erial) FingerTIP EVALUATION KIT PK-FP002 EVALUATION- KIT S C D6100-A900-4 Capacitive Sensor Capacitive Sensor unknown unknown NEC Corporation Siemens AG(Infineon T echnologies AG) B a sic U tilit ie s for F ingerprint Identification FingerTIP Software Development Kit (SDK) Version: V0.90, Beta 3 "Demo Program" Fixed Fixed Minutiae Matching (Minutia and Relation) Minutia matching Device I Sony Corporation Sony Fingerprint Identification Unit FIU Capacitive Sensor Live Finger detection S ystemneeds Inc. 1 through 5 Pattern matching Device J Secugen EyeD mouse II SM B-800 unknown Device K Ethentica ethenticatior M S 3000 PC Card MS 3000 Ethentica
22 Experimental Results Making an Artificial Finger directly from a Live Finger
23 Our Result Gummy Fingers Process 2 (1) Residual Fingerprint (2) Digital Image Data (3) Printed Circuit Board (4) Gummy Finger
24 Recipe 2-1 Making an Artificial Finger from a Residual Fingerprint Materials A photosensitive coated Printed Circuit Board (PCB) 10K by Sanhayato Co., Ltd. Solid gelatin sheet GELATINE LEAF by MARUHA CORP 320JPY/sheet 200JPY/30grams
25 Residual Fingerprint Enhancing Capturing Cyanoacrylate Adhesive Recipe 2-2 Digital Microscope Image Processing Fingerprint Image Printing Mask Exposing Developing Etching Mold Adobe Photoshop 6.0 Transparent Film UV light Photosensitive Coated PCB KEYENCE VH6300: 900k pixels Inkjet Printer Canon BJ-F800: 1200x600dpi
26 Recipe 2-3 An Enhanced Fingerprint A Fingerprint Image A Mask with Fingerprint Images
27 Recipe 2-4 Gelatin Liquid Drip the liquid onto the mold. Put this mold into a refrigerator to cool, and then peel carefully. 40wt.%
28 The Mold and the Gummy Finger Mold: 70JPY/piece (Ten molds can be obtained in the PCB.) Gummy Finger: 50JPY/piece
29 Resolution of Fingerprint Images Pores can be observed. Enhanced Fingerprint Captured Fingerprint Image of the Gummy Finger with the device H (a capacitive sensor)
30 Experimental Results from Residual Fingerprints (for 1 subject)
31 Characteristics of Gummy Fingers Moisture Electric Resistance Live Finger 16% 16 Mohms/cm Gummy Finger 23% 20 Mohms/cm Silicone Finger impossible to measure impossible to measure Gummy Finger Live Finger The compliance was also examined for live and gummy fingers.
32 Conclusions There can be various dishonest acts using artificial fingers against the fingerprint systems. Gummy fingers, which are easy to make with cheep, easily obtainable tools and materials, can be accepted by 11 types of fingerprint systems. The experimental study on the gummy fingers will have considerable impact on security assessment of fingerprint systems. Manufacturers,vendors, and users of biometric systems should carefully examine security of their system against artificial clones. How to treat such information should be an important issue.
33 For Details Paper: T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, Impact of Artificial Gummy Fingers on Fingerprint Systems Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV. Send any comments to
On the Operational Quality of Fingerprint Scanners
BioLab - Biometric System Lab University of Bologna - ITALY http://biolab.csr.unibo.it On the Operational Quality of Fingerprint Scanners Davide Maltoni and Matteo Ferrara November 7, 2007 Outline The
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Prof. Davide Maltoni [email protected]. DEIS - University of Bologna - ITALY. Summer School - BIOMETRICS: AUTHENTICATION and RECOGNITION
6XPPHU6FKRROIRU$GYDQFHG6WXGLHVRQ %,20(75,&6 $87+(17,&$7,21DQG5(&2*1,7,21 $OJKHUR,WDO\-XQH² Fingerprint Recognition Sensing, feature extraction and matching Prof. Davide Maltoni [email protected] DEIS
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES
"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES Dr. Marino Tapiador Technical Manager of the Certification Area Spanish Certification Body National Cryptologic Center
Embedded and mobile fingerprint. technology. FingerCell EDK
Embedded and mobile fingerprint identification technology FingerCell EDK FingerCell EDK Embedded and mobile fingerprint identification technology Document updated on August 30, 2010 CONTENTS FingerCell Algorithm
Fingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id [email protected] [email protected] Contact Numbers 8097031667 9167689265
EDUCATOR Plus Color Poster Printer VariQuest Poster Maker 3600
Inkjet Technology with Spot and Full Color Printing EDUCATOR Plus Full Color Poster Printer Package $4995 EDUCATOR Software Package Included EDUCATOR Supply Package Included PASS Educational Templates
Under Real Spoofing Attacks
Security Evaluation of Biometric Authentication Systems Under Real Spoofing Attacks Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli Department of Electrical and Electronic
Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview
4050-350-39 Computer System Fundamentals, Prof. Hill, 1/20/2007 Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview Submitted by: Alex Getty Getty 1 With the current mindset of
Fingerprint Characteristic Extraction by Ridge Orientation: An Approach for a Supervised Contactless Biometric System
Fingerprint Characteristic Extraction by Ridge Orientation: An Approach for a Supervised Contactless Biometric System M. Kokou Assogba LETIA, Ecole Polytech. Ab-Calavi (EPAC) 01 BP 2009 COTONOU BENIN Amine
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
David Yambay, Stephanie Schuckers Clarkson University. Luca Ghiani, Gian Luca Marcialis, Fabio Roli, University of Cagliari, Italy CITeR Spring 2011
LivDet 2011- Fingerprint Liveness Detection Competition 2011 Final Report David Yambay, Stephanie Schuckers Clarkson University Luca Ghiani, Gian Luca Marcialis, Fabio Roli, University of Cagliari, Italy
Good Boards = Results
Section 2: Printed Circuit Board Fabrication & Solderability Good Boards = Results Board fabrication is one aspect of the electronics production industry that SMT assembly engineers often know little about.
- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected]
Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected] Biometric Systems Biometrics
SecuGen USB Fingerprint Reader User Guide
SecuGen USB Fingerprint Reader User Guide Installation, Usage, Care and Troubleshooting SG1-0007B-017 (01/14) Copyright 1998-2014 SecuGen Corporation. ALL RIGHTS RESERVED. Specifications are subject to
Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008
Spanish Certification Body New Challenges on Biometric Vulnerability Analysis on Fingerprint Devices Technical Manager September 2008 Contents Introduction: Biometric Technology Security Evaluation New
DENSITY MEASURING SYSTEMS
SHIBAYAMA SCIENTIFIC CO., LTD. DENSITY MEASURING SYSTEMS Density Gradient Tube Method Direct Reading Type A / Type B Comply with the standards below: JIS K-0061-1992, K-7112 1980 ASTM D1505 Type A /Left
Introduction. Inkjet Technology Explained
Introduction The concept of inkjet in theory is straightforward. A print head ejects tiny drops of ink onto a substrate. However, in practice implementation of the technology is complex and requires multidisciplinary
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Security of Biometric Authentication Systems Parvathi Ambalakat
Security of Biometric Authentication Systems Parvathi Ambalakat ABSTRACT Biometric based authentication, the science of using physical or behavioral characteristics for identity verification is becoming
AN588 ENERGY HARVESTING REFERENCE DESIGN USER S GUIDE. 1. Kit Contents. 2. Introduction. Figure 1. Energy Harvesting Sensor Node
ENERGY HARVESTING REFERENCE DESIGN USER S GUIDE 1. Kit Contents The RF to USB Reference Design contains the following items: Si1012 Energy Harvesting Wireless Sensor Node EZRadioPRO USB Dongle ToolStick
SCREEN PRINTING INSTRUCTIONS
SCREEN PRINTING INSTRUCTIONS For Photo-Imageable Solder Masks and Idents Type 5600 Two Part Solder Masks and Idents Mega Electronics Ltd., Mega House, Grip Industrial Estate, Linton, Cambridge, ENGLAND
The Government-wide Implementation of Biometrics for HSPD-12
The Government-wide Implementation of Biometrics for HSPD-12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy September 24, 2008 1 The HSPD-12 Mandate Home Security
Penetration Testing Biometric System
Penetration Testing Biometric System A Penetration Testers Guide to Finger Print Authentication [FB1H2S aka Rahul Sasi] http://fb1h2s.com http://www.garage4hackers.com Presented @ NullCon International
Biometric authentication systems today and in the future
Biometric authentication systems today and in the future Birgit Kaschte Computer Science Department University of Auckland [email protected] 24 October 2005 Abstract. Biometric data has been a widely discussed
Polyimide labels for Printed Circuit Boards
Polyimide labels for Printed Circuit Boards The right match for any PCB labelling application Labels on Printed Circuit Boards Matching product performance with application needs Printed Circuit Boards
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
MYOB EXO Electronic Timeclocks
MYOB EXO Electronic Timeclocks MYOB EXO Timeclocks are the ultimate in time and attendance management. The MYOB Electronic Timeclock provides a magnetic swipe card and/or biometric fingerprint interface
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
L-1 Fingerprint Reader Solutions. V-Flex 4G
L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in
New Advances in Rapid Prototyping using Inkjet-based 3D Printing
New Advances in Rapid Prototyping using Inkjet-based 3D Printing April 2011 Objet Geometries Ltd. DISCLAIMER: Objet Geometries Ltd. ("Objet") does not guarantee the final release and availability of materials,
The Development of a Pressure-based Typing Biometrics User Authentication System
The Development of a Pressure-based Typing Biometrics User Authentication System Chen Change Loy Adv. Informatics Research Group MIMOS Berhad by Assoc. Prof. Dr. Chee Peng Lim Associate Professor Sch.
The Anatomy of a Label
The Anatomy of a Label Three key elements make up a label: face stock, release liner, and adhesive. Face Stock: Face stock is the material of the label that carries the imprint. The print can be applied
Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 Mira.LaCous@bio-key.
Biometric Security: Client-Server Systems Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 [email protected] The Session Private vs Public / Personal vs Public Forms
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum
Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
Biometrics Unique, simple, convenient
Biometrics Unique, simple, convenient Biometrics Unique personal identification.. Simply place your finger on the sensor - job done! As convenient as it gets. 2 Why biometrics? Your benefits at a glance
Full page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
Auditing Contract Manufacturing Processes
Auditing Contract Manufacturing Processes Greg Caswell and Cheryl Tulkoff Introduction DfR has investigated multiple situations where an OEM is experiencing quality issues. In some cases, the problem occurs
Why Touch Technology?
Touch panel technology Touchscreen applications are developing into a major display market niche as they ramp up their utilization of Liquid Crystal Display (LCD) flat panels into their designs. Touch
AX.S Series Access Control and I.AM Series Identity Access Management
AX.S Series Access Control and I.AM Series Identity Access Management We selected the Kaba Embedded Access Control System for its features and functions, but what we like the most is how rock solid the
Paper-based Document Authentication using Digital Signature and QR Code
2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department
Abstract. 1. Introduction. 1.1. Methodology
Fingerprint Recognition System Performance in the Maritime Environment Hourieh Fakourfar 1, Serge Belongie 2* 1 Department of Electrical and Computer Engineering, and 2 Department of Computer Science and
Low Pressure Molding Solutions
Low Pressure Molding Solutions PROCESS TRADITIONAL POTTING PROCESS FLOW MOLD CASE PALLETIZE INSERT ELECTRONICS PRE-HEAT ENCAPSULATE SETTLING OR VACUUM CURE TEST LOW PRESSURE PROCESS FLOW INSERT ELECTRONICS
TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions
TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS Mary Olson, Senior Marketing Manager, Citizen Solutions INTRODUCTION Government organizations are regularly challenged
DASH KIT INSTALLATION
ÿÿÿÿÿ ÿÿÿÿÿÿÿÿÿÿÿÿ ÿÿÿ ÿÿÿÿÿ ÿÿ ÿÿÿ ÿÿÿÿÿÿÿÿÿÿÿÿÿÿ ÿÿÿÿÿÿÿÿÿÿ ÿÿÿÿ ÿÿÿÿ ÿÿ ÿÿÿÿÿ ÿÿÿÿÿÿÿÿ PROUDLY MADE IN THE USA DASH KIT INSTALLATION These instructions are aimed at the do-it-yourself installer. Read
Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN
ATM Terminal Security Using Fingerprint Reconition. Prof. B.Jolad, Tejshree Salunkhe, Rutuja Patil, Puja Shindgi Padmashree Dr. D. Y. Patil Institute Of Engineering and Technology,Pimpri,Pune - 411018
High Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
Eddy-current testing - Non-destructive testing for flaw detection of metals, coatings and carbon fibres
Technology Offer Eddy-current testing - Non-destructive testing for flaw detection of metals, coatings and carbon fibres Summary A German SME offers the development of task specific eddy-current based
Robot Service Network Protocol Developed by Robot Service initiative
Robot Service Network Protocol Developed by Robot Service initiative 5 th Japan Korea Service Robot Workshop November 26, 2009 Takashi Uchiyama, President of Robot Service initiative and Advisor of Fujitsu
Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology
MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS K.Jaikumar 1, M.Santhosh Kumar 2, S.Rajkumar 3, A.Sakthivel 4 1 Asst. Professor-ECE, P. A. College of Engineering and Technology 2
RAPID PROTOTYPING. Learning Objectives: By the end of the lecture the student should be able to: Explain the fundamentals of Rapid Prototyping
RAPID PROTOTYPING Learning Objectives: By the end of the lecture the student should be able to: Explain the fundamentals of Rapid Prototyping Outline and explain differences of Rapid Prototyping Technologies
Analysis of a Biometric Authentication Protocol for Signature Creation Application
Analysis of a Biometric Authentication Protocol for Signature Creation Application A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
Biometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
Biometrics: Trading Privacy for Security
Werner 1 Biometrics: Trading Privacy for Security Chris Werner April 23, 2006 Werner 2 Biometric identification has been around for many years, but due to the recent need of tightened security, and the
Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel
Strengths and Weaknesses of Access Control Systems Eric Schmiedl and Mike Spindel Choosing a System Error rate Environment Cost Physical Vulnerability Additional Constraints Error Rate False Reject Rate
Examples of Large Scale Biometrics Systems:
Examples of Large Scale Biometrics Systems: International Solutions for Exit/Entry, Border Control, National ID and Secure Passport Systems Biometrics Consortium Conference Pat Sankar, Behnam Bavarian
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
An Analysis of the Effect of IEEE Publications on the Apple Computer Inc. Patent Portfolio
An Analysis of the Effect of IEEE Publications on the Computer Inc. Patent Portfolio Prepared by IEEE for Computer Inc. Based on a study conducted by CHI Research, Inc. An Analysis of the Effect of IEEE
Neal O Hara. Business Development Manager
Neal O Hara Business Development Manager PCS OFFERING User Interface Flex Circuit Solutions Sensor Systems Multilayer Copper Flex Circuits LED Lighting 2 VERTICAL INTEGRATION FPC Connector Picoflex on
MegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
PTFE Teflon Glass Fabric Grades & Material Data Sheets
PTFE Teflon Glass Fabric Grades & Material Data Sheets Taconic TAC-TAPES Taconic TAC-TAPES are constructed with high-quality adhesives and backing materials to deliver superior performance. A choice of
Rapid Prototyping. Training Objective
Training Objective After watching the program and reviewing this printed material, the viewer will understand the principles and practical applications of Rapid Prototyping. Basic concepts are explained
DOCUMENT SECURITY ISSUES
DOCUMENT SECURITY ISSUES Part of a Series of Datacard Group White Papers for the Secure Document Issuer DESIGNING AN ID DOCUMENT FOR ENHANCED SECURITY Overview Governments today are being driven to increase
SCB Access Single Sign-On PC Secure Logon
SCB Access Single Sign-On PC Secure Logon Manage all your passwords One smart card to access all your applications past & future Multi-factor authentication Dramatically increase your security Save $150
SC, FC and ST * Hot Melt Fiber Optic Connectors
SC, FC and ST * Hot Melt Fiber Optic Connectors Instructions September 1998 78-8073-7873-8 2 Contents 1.0 Safety and Helpful Hints...4 2.0 Field Termination Kit Contents...4 3.0 STÑInstallation on 900
Prof. Dr. M. H. Assal
Prof. Dr. M. H. Assal AS 26/10/2014 Computer hardware is the collection of physical elements that comprise a computer system Computer hardware can be classified as following: o Input devices o Output devices
Apr 17, 2000 LAB MANUAL 1811.0
Apr 17, 2000 LAB MANUAL 1811.0 1811 BULK SPECIFIC GRAVITY (GMB) AND DENSITY OF COMPACTED BITUMINOUS SPECIMENS USING PARAFFIN OR PARAFILM ASTM Designation D 1188 (MN/DOT Modified) 1811.1 SCOPE This test
Make up Epoxy adhesive
Epoflex Base Materials series of MSC Polymer AG offers flexible base materials from simple single side flexible boards, flex-rigid applications up to highly complex multilayer boards. The dielectric is
Keysight Technologies Quickly Identify and Characterize Thermal Measurement Points
Keysight Technologies Quickly Identify and Characterize Thermal Measurement Points Application Brief Test Challenges: Temperature characterization of a prototype Long-term building inspection 02 Keysight
Labels. Avery Dennison. Avery Easy Peel Labels. Avery Ink Jet Labels. Avery Laser Labels. Avery Labels for the Personal Label Printer
Labels Avery Easy Peel Labels Avery Ink Jet Labels Avery Laser Labels Avery Labels for the Personal Label Printer For all Avery Label Products, visit our product catalog at: avery.com/us/products Avery
Computer Peripherals
Computer Peripherals School of Computer Engineering Nanyang Technological University Singapore These notes are part of a 3rd year undergraduate course called "Computer Peripherals", taught at Nanyang Technological
Treatment of a surface or structure to resist the passage of water in the absence of hydrostatic pressure. presence of hydrostatic pressure.
Recommend Approval: Team Leader Date Division Chief Date Approved: Director Date Maryland Department of Transportation State Highway Administration Office of Materials Technology MARYLAND STANDARD METHOD
To make audiovisuals useful they have to be available in a wide choice and to be continuously updated to match the technological development.
Teaching is a very important activity that requires a great deal of effort from teachers and instructors to make it easy to understand from students the subject of lessons. A large part of time is spent
Thermal Paper Construction
Thermal Paper Construction Thermal Printing Technology provides for instant printing on command. No warm-up time is required for the first page. Laser printers can take 20 seconds or more to start printing
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
EaSy: Efficient and Secure System for Utility Service Registration
EaSy: Efficient and Secure System for Utility Service Registration 1 Nor Zaidi Haron, 2 Siti Aisah Md Junos@Yunus, 3 Mohd Sa'ari Mohamad Isa, 4 Azmi Awang Md Isa *1 Universiti Teknikal Malaysia Melaka,
Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance
Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance María del Carmen Prudente-Tixteco [email protected] Linda Karina Toscano-Medina [email protected] Gualberto
Sensitivity to both h- and i-line makes AZ 9200 photoresist capable for both broadband and i-line steppers.
Product Data Sheet AZ 9200 Photoresist 1µm Film Thickness 4.6 µm High-Resolution Thick Resist AZ 9200 thick film photoresist is designed for the more demanding higher-resolution thick resist requirements.
Cost Effective Automated Test Framework for Touchscreen HMI Verification
Cost Effective Automated Test Framework for Touchscreen HMI Verification Aby N Raj 1, P. Booma Devi, M.E., (Ph.D.) 2, Sajan Kumar 3, P. Sreekalesh 4,, S. Arathy 5 1 PG Scholar, R.V.S College of Engineering,
MoniUPS Software and Service. with an expert
MoniUPS Software and Service Monitor your UPS with an expert A service expert at your fingertips innovative remote monitoring System MoniUPS for critical applications MoniUPS is the innovative remote monitoring
Chain of evidence refers to the continuity of custody of material and items collected as evidence.
University of Wisconsin Madison Police Policy: 83.2 SUBJECT: EVIDENCE PROCESSING EFFECTIVE DATE: 06/01/10 REVISED DATE: 12/31/11, 11/01/13 REVIEWED DATE: 01/07/15 INDEX: 83.2.1 COLLECTING, PROCESSING,
Biologger A Biometric Keylogger
Biologger A Biometric Keylogger Matt Lewis, Black Hat Europe 2008 Agenda Background and research aims Worked example Protocol investigation Identifying template formats Identifying image data Fake biometric
The Keyboard One of the first peripherals to be used with a computer and is still the primary input device for text and numbers.
Standard Methods of Input Input device enables you to input information and commands into the computer. The Keyboard One of the first peripherals to be used with a computer and is still the primary input
III. MEMS Projection Helvetica 20 Displays
Helvetica 26 Helvetica 22 III. MEMS Projection Displays Micro Mirror Projection - Texas Instruments DMD - Daewoo Elec. AMA Grating Light Valve - Silicon Light Machines Image Projection Color Synthesis
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication IehabALRassan, HananAlShaher Department of Computer Science,King Saud University,Riyadh, Saudi Arabia ABSTRACT Mobile cloud computing becomes part
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
Specification of 5 Wire Analog Touch Panel
Specification of 5 Wire Analog Touch Panel 5 WIRE ANALOG RESISTIVE TOUCH PANEL A. Application This specification applies to the 5 Wire Analog Resistive Touch Panel. B. Environmental Conditions 1. Operating
