From Hollywood to the Real World: How biometrics will intersect. with ordinary people s lives



Similar documents
May For other information please contact:

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

WHITE PAPER. Let s do BI (Biometric Identification)

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Assignment 1 Biometric authentication

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

The Leading Provider of Identity Solutions and Services in the U.S.

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

22 nd NISS Conference

NFC & Biometrics. Christophe Rosenberger

Application of Biometric Technology Solutions to Enhance Security

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

Smart Card in Biometric Authentication

Time Clocks for Employee Attendance Tracking. Attendance on Demand, Inc. Farmington Hills, MI

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

Audio: This overview module contains an introduction, five lessons, and a conclusion.

2 FACTOR + 2. Authentication WAY

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Time Clocks for Employee Attendance Tracking

solutions Biometrics integration

GLOBAL TELECOM INVOLVEMENT in the I D E N T I T Y E C O S YS T E M. July 2013

Moving to Multi-factor Authentication. Kevin Unthank

Framework for Biometric Enabled Unified Core Banking

Start Here. P5100 Fingerprint Reader. Quick Installation Guide. Verifi. IMPORTANT. This product must be used with Windows 7 or 8.

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers

Security Model in E-government with Biometric based on PKI

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

Biometric SSO Authentication Using Java Enterprise System

Biometrics Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Voice Authentication for ATM Security

Basic Software Setup Guide.

Start Here. P5100 Fingerprint Reader. Quick Installation Guide. Verifi. IMPORTANT. This installation manual is for Windows 8.1.

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

KANGAROO MOBILE DESKTOP USER GUIDE

Two Factor Authentication for VPN Access

Innovative approach to security solutions

The Benefits of an Industry Standard Platform for Enterprise Sign-On

Business Banking Customer Login Experience for Enhanced Login Security

W.A.R.N. Passive Biometric ID Card Solution

Discover Germany s Electronic Passport

Enhanced Login Security Frequently Asked Questions

Scalable Authentication

ADVANCE AUTHENTICATION TECHNIQUES

PalmSecureID for the EDUCATION MARKETPLACE

BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY 1 BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY INCREASES

Examples of Large Scale Biometrics Systems:

Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers

Talent Solutions. LinkedIn Certified Professional. Program Handbook. LinkedIn Certified Professional Recruiter

Advanced Biometric Technology

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

BIOMETRIC SOLUTIONS 2013 ISSUE

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Internet and Computing Core Certification Guide Module A Computing Fundamentals

2 factor + 2. Authentication. way

Two-Factor Authentication Making Sense of all the Options

Opinion and recommendations on challenges raised by biometric developments

I couldn t believe that a simple internet browser can help me so much, thanks to Health Highway.

Enabling Solutions for HIPAA Compliance. Presented by: Mike McDermand

Best Practices Provide Best Value When Implementing Key Control and Asset Management Systems

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

EMBEDDED MAJOR PROJECTS LIST

Biocryptology is an encryption-based. entry to a network or the Internet that. are vulnerable to third parties through

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Respected Sir, Subject: Reg. e-bharat: Integrated e-payment and e-governance system.

Assignment Discovery Online Curriculum. Lesson title: Forensic Detectives: Who Did It? Grade level: 6-8. Subject Area: Forensic Science, Chemistry

Trends in Finger Vein Authentication and Deployment in Europe

Improving Online Security with Strong, Personalized User Authentication

Trust Elevation Using Risk-Based Multifactor Authentication. Cathy Tilton

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0. April 28, 2013

Chapter 5 Input. Chapter 5 Objectives. What Is Input? What Is Input? The Keyboard. The Keyboard

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

2nd End-User Group Meeting on 3D Face Recognition

Multi-Factor Biometrics: An Overview

HIPAA and Network Security Curriculum

Biometrics in Identity as a Service

Electronic Prescribing of Controlled Substances: The Physician s Perspective

Business Issues in the implementation of Digital signatures

Required changes to Table 6 2 in FIPS 201

Digital Persona Fingerprint Reader Installation

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

SECUREXAM REMOTE PROCTOR SYSTEM MEDIA KIT

Dr. Asher Vaturi The Max Stern Yezreel Valley College

Accessing the bank account without card and password in ATM using biometric technology

InfiniTime Time & Attendance Software

User Authentication Methods for Mobile Systems Dr Steven Furnell

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

APC Enterprise KVM Switches

E-Booking at London International Airport

Password Management: History, Costs, Problems and Pain Points, and Solutions

De-duplication The Complexity in the Unique ID context

Transcription:

From Hollywood to the Real World: How biometrics will intersect with ordinary people s lives

On the Big Screen 2001: A Space Odyssey; 6 th Day; Alias; Air Force One; Antitrust; Bad Company; Blade Runner; Bourne Identity; Charlie s Angels; Dark Angel; Demolition Man; Die Another Day; Enemy of the State; First Wave; Gattica; Golden Eye; Hollow Man; La Femme Nikita; Men in Black; Minority Report; Mission Impossible; Mission Impossible II; Mission to Mars; Oceans Eleven; Outbreak; Planet of the Apes; Sneakers; Star Trek II: The Wrath of Khan; The Dead Zone; Tomorrow Never Dies; True Lies; Webmaster; X-Men

The Hollywood Marquee Minority Report Eye biometric used for automatic and immediate covert ID for direct advertising in all public places Removed eye carried around in ziplock bag and used for access to secure space Big brother spider robots crawl under door and accost woman in bathtub to read her iris/retina Back alley eye replacement surgery required to avoid tracking Voice verification for home security/room personalization Gattica Instant DNA matching used to discriminate against non-bioengineered humans Orwellian effect

The Marquee - continued Charlie s Angels Large head harness used to position head for biometric screening Far fetched spoof of iris and fingerprint to gain access Tomorrow Never Dies (007) Finger print is lifted from the surface of the device, graphically represented on the screen of a cell phone and then presented to the reader Handprint reader spoofed with severed hand Enemy of the State Ubiquitous video surveillance with facial recognition used to track down the innocent hero 6 th Day Retinal scanning of removed eye for building access Bourne Identity Palm reader used in bank Sneakers My voice is my passport spoof Demolition Man Disembodied eyeball used for authentication

The Message Just for spies Still science fiction To be feared Overkill

Biometrics: Myths Perpetrated Can be used to track my every movement Can positively identify me anywhere, anytime Will take away all my privacy Can be used as a database index allowing access to every piece of electronic data about me Are easy to covertly capture and spoof Are only used/needed in super-duper high security environments Are outrageously expensive Aren t used in real life

What can biometrics do? They can verify the claimed identity of an individual for access to secure areas or computer networks They can discover duplicates in a database They can be used for background checks They can be used in time & attendance systems They can help secure financial transactions

Real Life - Today Enterprise Network Security Healthcare Banking/Finance

Real Life - Today Check Cashing Building Access Time & Attendance National ID/Voter Registration Systems

Why are biometrics being used? To improve security in the area of positive identification and authentication To improve user convenience, process flow, and throughput To reduce costs And yes, to improve national security

Success Stories Office of Legislative Counsel at the House of Representatives is using iris recognition for access to the legislative proposals it analyzes St. Vincent s Hospital in Indianapolis is using fingerprint authentication at 5000 workstations accessed by physicians, nurses, and staff to protect access to patient medical records Two Fortune 100 financial institutions are using biometrics to protect the financial data for which they are stewards Pharmaceutical companies are piloting biometrics to help meet FDA requirements Schools in Stockholm are saving precious classroom time with student fingerprint login Access to dorms at universities, such as WVU

Product Examples Sony USB memory stick with built in fingerprint sensor for access to data Compaq ipaq PDA with built-in fingerprint swipe sensor Laptops/notebooks with built-in sensors Computer mice, keyboards, and other peripherals

Biometrics Tomorrow Home and automobile access Cell phones Guns Consumer items Television set-top boxes/remotes Safes/security boxes Operation of heavy machinery, factory equipment, aircraft Document signing ecommerce (B-B, B-C) Authentication services Credentialing of emergency service providers

Trends Smaller, cheaper, faster Use of multiple biometrics Younger technologies becoming more robust Transition from government to commercial applications Recognition of business benefits, customer service Role in overall security architecture Government -> Business -> Consumer Public awareness General knowledge More press coverage Privacy concerns Standardization Tighter integration with related technologies (PKI, smartcards) More embedded implementations

Observations Has been a long road to viability and acceptance Misinformation leads to a fear factor Exaggeration by media and militant privacy advocates Education is key Ordinary people will be introduced to biometrics in the workplace This will breed familiarity Familiarity and recognition of benefits will spill over to consumer world

Conclusion Biometrics are not just a future possibility They provide useful, but mundane, functions for everyday people Like you and me!

Contact Information: Catherine J. Tilton Director, Integrated Solutions SAFLINK Corporation 11417 Sunset Hills Road, Suite 210 Reston, VA 20190 +1 703-708-9280 Fax +1 703-708-0014 Cell +1 703-472-5546 ctilton@saflink.com www.saflink.com