ONYX Mobile Touchless Fingerprint Biometrics



Similar documents
Brainloop Secure Dataroom Version QR Code Scanner Apps for ios Version 1.1 and for Android

May For other information please contact:

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

solutions Biometrics integration

Research Information Security Guideline

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Two Factor Authentication. Software Version (SV) 1.0

FreeConference iphone Mobile App

Kony Mobile Application Management (MAM)

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

WHITE PAPER. Let s do BI (Biometric Identification)

True Authentication & Compliant Archiving

Mobile App Frequently Asked Questions

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

SCB Access Single Sign-On PC Secure Logon

Secure communications via IdentaDefense

Nomophobia Rules! Connect: ID Terry Hartmann VP Industry Applications 23 March 2014

NetIQ Advanced Authentication Framework - Smartphone Applications

Biometrics for payments. The use of biometrics in banking

Device-Centric Authentication and WebCrypto

DigitalPersona Pro Enterprise

De-duplication The Complexity in the Unique ID context

- BIOMETRIC. Tel : Website : marketing@litestar.com.sg

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

The 4 forces that generate authentication revenue for the channel

MOBILE BANKING USER GUIDE

22 nd NISS Conference

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Mobile Online Banking

Two Factor Authentication for VPN Access

Kaspersky Security 10 for Mobile Implementation Guide

Bell Mobile Device Management (MDM)

BIOMETRIC SOLUTIONS 2013 ISSUE

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Opinion and recommendations on challenges raised by biometric developments

How Secure is Authentication?

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System

Enhancing Organizational Security Through the Use of Virtual Smart Cards

One Platform for all your Print, Scan and Device Management

Multi-factor authentication

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

ID Director for Windows

MOBILE PHONE BANKING MADE EASY.

Trends in Finger Vein Authentication and Deployment in Europe

White paper Fujitsu Identity Management and PalmSecure

SINGLE DEVICE FOR MULTIPLE TASKS

Understanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners

Welcome Guide for MP-1 Token for Microsoft Windows

Northeast Bank Mobile Deposit Service FAQ

Aegis Padlock for business

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers

Samsung Mobile Security

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P:

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Samsung SED Security in Collaboration with Wave Systems

Application of Biometric Technology Solutions to Enhance Security

What does the First Mobile app do for me? What else can I do with the mobile banking app beyond the basics? Why should I use the mobile banking app?

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

APPLE & ANDROID. User Guide BNC ONLINE BANKING

Guideline on Safe BYOD Management

ONE PLATFORM FOR ALL YOUR PRINT, SCAN, AND DEVICE MANAGEMENT

BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY 1 BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY INCREASES

SecureD Technical Overview

Application-Specific Biometric Templates

Fingerprint Time Attendance Access System with Data Recording

Kaspersky Security for Mobile Administrator's Guide

EXTENDING ORACLE WEBCENTER TO MOBILE DEVICES: BANNER ENGINEERING SUCCEEDS WITH MOBILE SALES ENABLEMENT

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

Resco Mobile CRM Security

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

BlackShield Authentication Service

BYOD Guidance: BlackBerry Secure Work Space

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Special Report: Trends in Mobile Payment April 2015

Biometrics in Physical Access Control Issues, Status and Trends White Paper

The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Mobile Users Charging your PayClip. 2. Downloading the PayClip app.

Using Devices. Chapter 3

AVG Business SSO Partner Getting Started Guide

RSA SecurID Two-factor Authentication

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

Guidance End User Devices Security Guidance: Apple ios 7

Kaspersky Lab Mobile Device Management Deployment Guide

CA ArcotOTP Versatile Authentication Solution for Mobile Phones

Global Deployment of Finger Vein Authentication

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

How To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device

Home Monitoring and Control service provided by Verizon Online LLC

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Frequently Asked Questions About Mobile Banking/Deposit App

BlackShield ID MP Token Guide. for Java Enabled Phones

The Benefits of an Industry Standard Platform for Enterprise Sign-On

Improving Online Security with Strong, Personalized User Authentication

Reviewer Guide Core Functionality

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Fingerprint Based Biometric Attendance System

Transcription:

ONYX Mobile Touchless Fingerprint Biometrics

Mobile Touchless Fingerprint Biometrics P a g e 2 Diamond Fortress Technologies 210 Inverness Pkwy, Birmingham, AL 35242 (205) 282-4509 www.diamondfortress.com 1. Introduction / Background Onyx TM is biometric "touchless" authentication software developed by Diamond Fortress Technologies. Our product uses a mobile device's camera to capture and identify a user's unique fingerprint. Onyx doesn't require additional hardware, and forever eliminates the need to remember or store passwords and PINs. Onyx avoids many of the distorting variables present with hardware scanners because it is touchless, resulting in a fingerprint that is a more exact copy of the actual finger. Internal testing and observation has revealed that Onyx creates fingerprints for matching which are superior to those created by hardware scanners. Accordingly, fingerprints generated by Onyx result in more accurate matches. More accurate matches equal greater security. Greater security available to mobile device users right now by only a simple software download, without the need for any additional hardware, resulting in a drastically reduced cost. 2. Business Case: The Future of Mobile Authentication...Today Usage of biometrics is not anymore a question of why?, the questions are now more which one?, where? and when? Onyx addresses the following business issues: Data breach and data theft in enterprises: o o passwords stolen, transferred smartcards forgotten, lost, stolen, transferred Identity theft o unauthorized prescriptions o unauthorized building access o unauthorized social welfare services Skimming, Fraud o manipulated ATMs o manipulated e-banking

Mobile Touchless Fingerprint Biometrics P a g e 3 o manipulated ID cards A recent report from biometricupdate.com shows that there is a race to incorporate fingerprint biometrics among industry leaders such as Apple and Samsung. Analyst Brian White of Topeka Capital Markets compared Apple's fingerprint scanning technology to Siri, the defining feature of the iphone 4S when it launched in 2011. He -- and others -- believes a secure fingerprint reader will be continue to be a main selling point of an "iphone 5S." Because Onyx is a software library, we can be first-to-market with a new class of touchless biometric authentication...one that not only outperforms touch-based sensor solutions, but one that can be offered at a fraction of the cost. 3. ONYX: First-of-its-kind Biometric Security Our mission is to bring fundamental change in the way businesses and users interact on mobile devices. We give businesses more flexibility in delivering their data, products, and services, while providing their customers with a game-changing combination of increased security and convenience. a). Technology Onyx is a software library written in C++, wrapped with Java for use on Android and Objective C for use on ios, that acquires, processes, and matches images captured with the rear-facing camera of mobile devices. Accuracy: the high res images we capture from a mobile devices' camera are "normalized" with our software resulting in more accurate fingerprint rendering and identification. Reliability: our touchless solution is more reliable than touch-based or capacitive authentication solutions which are subject to inherent physical limitations, including their vulnerability to wear and tear. Many other solutions have had problems dealing with different age groups and certain ethnicities, however our internal tests have yielded excellent results in these areas. Faster, Broader Deployment: unlike the more common hardware solutions, ours is entirely software-based, which gives us the ability to deploy Onyx on any

Mobile Touchless Fingerprint Biometrics P a g e 4 mobile device that has a rear-facing camera faster than those that are hardwarebased. As manufacturers iterate and improve their camera/lens technology, they are simultaneously improving the accuracy of our authentication. Ease-of-Integration: Onyx can be quickly and easily integrated into a broad array of systems. Since it is software, any customization can be done on-the-fly without any form factor redesign. Upgradeability: our ability to push out over-air upgrades, fixes, and updates, enables us to continually improve the user experience and "future proof" our technology. b). How it works The user places two fingers (like the sign-language letter H) in view of the rear facing camera. They then center their index finger inside the ellipse. The user's finger should be approximately 3-4 inches from the back of the phone, as this is the minimum focal distance of most smart phone cameras. Users must make sure their fingertip is approximately the size of the ellipse on the screen. Once the fingers are in place, the user taps anywhere on the screen to capture an image of their fingerprint. Images (actual captured fingerprint images) c). Deployment Models

Mobile Touchless Fingerprint Biometrics P a g e 5 Device-based Solution: securely stores all user fingerprint information and performs all authentication functions on the mobile device, thereby providing the greatest available control of personal identity information. This solution is perfect for device access authentication, application authentication, and e-commerce authentication. By utilizing the existing cameras available on mobile smart devices, with just an easy software download any individual can experience the benefits of biometric authentication -- without the need to purchase expensive peripheral hardware or a new device with an integrated biometric sensor. Diamond Fortress' Device-Based Solution is a product of our dedication to user identity protection. Server-Based Solution: enables mobile devices to capture and process fingerprint images for authentication. Once processed on the mobile device the template is securely transported to a remote server for matching against fingerprint images stored on the remote server. Diamond Fortress' Server-Based Solution is ideal for enterprise authentication where users regularly join and leave the system. It can be integrated into limitless applications such as existing physical facility access control systems and enterprise network authentication systems. This enables system administrators to easily control roles, permission sets, and add or remove users, while ensuring the highest degree of confidence that access is being granted only to approved users. d). Additional Features in Next SDK User Experience Improvements Improved Scale Tolerance Improved Rotation and Angle Tolerance Auto Capture

Mobile Touchless Fingerprint Biometrics P a g e 6 4. Implementation Scenarios Financial Transactions Market mobile banking; point-of-sale purchases; mobile stock trading; currency transfers. In-App Purchases Market consumers are making more purchases within mobile applications and enhanced security is desired by both businesses and consumers to prevent fraud. Mobile Device Management Market enterprise solutions for identification and verification to protect proprietary, confidential and personal data; handle BYOD management, network infrastructure access. Health Care Industry easy and inexpensive identification of medical care providers, pharmacists, patients, anyone who views or stores medical records or works in a medical facility as required by law; Onyx is also a perfect fit for mobile prescription-writing devices which are becoming more prevalent. Border Control / Misc. Govt. Solutions fills enormous need to protect borders from illegal entry, identification of immigrants and other border security issues, plus innumerable other security uses. Login Identification Market much-needed solution to ensure identity of person accessing a device, an application or the internet. OEM Market we are already working with original equipment manufacturers to provide their clients with custom devices which incorporate touchless biometric security, the possibilities are limitless. Physical Facility Access Control countless organizations are seeking a trustworthy biometric solution to control access to their facilities; we have begun to speak with some and have a tentative deal with a national 24-hour gym; the potential revenue is enormous. Law Enforcement evidence management/chain of custody software is becoming more widespread and our technology would enable providers to set themselves apart from the competition at least for the short term until the technology is a necessity. Safe Industry safe manufacturers (for valuables, guns, etc.) are always seeking to increase security in an innovative way and we have a perfect solution.

Mobile Touchless Fingerprint Biometrics P a g e 7 5. Competitor Analysis At present there are very few mobile phones or devices with built-in biometric hardware. Onyx is the only "touchless" fingerprint solution on the market. The cost of developing and incorporating such hardware is a significant barrier (as experienced by Apple and Samsung -- see below). Add-on devices were the only option until 2012 saw the introduction of a handful of devices with built-in biometric hardware. Our software-based authentication approach using the device s native hardware (microphone or camera) offers a huge advantage. Performance (based on FAR/FRR, FER, processing speed) Validity CrucialTec AuthenTec FAR/FRR performance with as few as one false accept in one million swipes. A nearly 100% enrollment rate. (from company website) "We re told that the failure rate or how often it falsely accepts a non-user or fails to recognize your print is miniscule." (Digitaltrends) AuthenTec user forum indicates (anecdotal) issues with enrollment of fingerprints for authentication (i.e., "I cannot log on to Windows, keep getting the authentication error. But the fingerprint reader works once I log on manually.") Implementation Sensor with customizable ID, a control IC, software for integration into a mobile environment. Buttons provide another method of integrating fingerprint sensors into mobile platforms. Biometric scanner built into a home button on a custom case. Fingerprint scanning to lock and unlock phone. The ability to o assign a different function to each of your 10 fingers Apple patented the use of a biometric fingerprint sensor that is concealed under the iphone s screen display. The scanner will apparently be built into the Home button, or possibly the iphone s screen -- used primarily for unlocking the phone. Notes: Highest fingerprint image quality per NIST standards. The Failure to Enroll Rate or FER is the percentage of the population which fails to complete enrollment. Such failures can be due to lack of training on how to enroll, to environmental or ergonomic conditions, or to certain

Mobile Touchless Fingerprint Biometrics P a g e 8 demographics which make the biometric modality not suitable for a certain percentage of the population. Most manufacturers of biometric devices can give clear numbers on the time it takes to enroll as well on the time for an individual to be authenticated or identified using their application. Touch-based sensor types produce higher FRR due to environmental conditions or incorrect use. Foreign matter on the fingerprint such as oil and grease, skin dryness, and the age of the person being fingerprinted can result in higher FRR. The finger typically needs to be applied on the sensor in the same manner (same position, same direction) and with uniform pressure (e.g., avoid pressing while twisting). The more finger area the sensor "sees", the better. FRR tends to lower when a user gains more experience in how to use the biometric device or software. At close to 100% enrollment rate, Onyx meets or exceeds those by competitors who've published their enrollment rates. Processing time (from enrollment to authentication) is.7-.9 seconds (per the specs included below).

Mobile Touchless Fingerprint Biometrics P a g e 9 6. Spec Sheet Stored Template File Size: approx. 265 kb Image collected at: 500 PPI Operating Range: 4-6 Inches Processing Time:.7-.9 sec Enrollment: Yes Matching Modes: One to One & One to Many (Supports template database of 1mm templates) Minimum Camera Requirements: 1.5 MP Camera Controls: Auto-focus; Manual & Auto-Capture; Manual & Auto-LED control OS Compatibilities: ios, Android, Windows 2000/2003/XP/Vista/7 Security: RSA, AES 256-bit, SSL, TLS About Diamond Fortress Technologies DFT is poised to be an industry leader in the mobile biometrics market, which currently produces annual revenue of $21B. Furthermore, the solutions we offer cross over into numerous markets projected to soon total hundreds of billions of dollars per year. Our technology is second to none; our strategies are sound, and our leadership strong; DFT will provide the safest, fastest and most accurate biometric technology in the market. For more, visit www.diamondfortress.com.