S E P T E M B E R 2 0 1 4 IRIS-ENABLED SMARTWATCH AND ITS APPLICATIONS
INTRODUCTION Iris Recognition Enabled Smartwatch Convergence of wearables and biometrics Will bring the widespread use of iris recognition technology Will become the key device for security in the Internet-of-Things Property of IriTech, Inc. - Confidential 2
PROBLEMS FIDELYS WILL SOLVE #1. No more passwords #2. Privacy Issues #3. Internet of Things Too many password breaches We are now required longer passwords for each website Encrypt sensitive information on devices Application launch control Security needs to be guaranteed for IoT to become wide spread Needs strong authentication Property of IriTech, Inc. - Confidential 3
APPLICATIONS Connection: Bluetooth / NFC / Wifi Application program 1 Device log-on Notebook Tablet PC Smartphone 2 SSO(Single Sign On) 3 Mobile payments / E-commerce 4 IoT Security Authentication Smart Car CarPlay / Android Car Access Control Tablet PC Smartphone Notebook PC Outdoor capture IriTech s technology enables iris recognition outdoors. The user experience of iris recognition has improved significantly! Access Control Cars Secure and convenient authentication Iris authentication session remains valid until the watch is taken off Enhanced privacy your iris data will never leave your watch
WHAT EXACTLY TO BE MODIFIED ONTO AN EXISTING SMARTWATCH? Property of IriTech, Inc. - Confidential 5
Camera Control MAJOR HW AND SW COMPONENTS IR LED Smartwatch s Processor Secure storage IR filter Data Automated Iris Image Acquisition & Image Quality Measurement Offline Gallery Mobile Device s Camera Qualified Iris Image Enrolled Iris Recognition Generator Protected Memory Security Matcher Enrolled Enrolled Gallery Encrypted Signed Data Matching Result Iris Biometric Applications Property of IriTech, Inc. - Confidential 6
SECURITY THREAT ANALYSIS Local threats (virus, malware, hardware analysis, etc.) Iris firmware should not be bypassed, tampered or reverse engineered Installed in secure storage prevent offline reverse engineering. Securely booted resist to tamper, cloning Run-time protection: Critical algorithms run in mask ROM/ OTP NVM hinder hardware analysis and software attacks. Others run in PEE prevent software attacks. Personal Data Threat Iris app services protect sensitive data in smart device and PC, sensitive application launch control and protect online account of online shopping, social networks, and even travel sites and communication from unauthorized accesses. Communication threats Well-concealed nature of iris make it much harder to be spoof than other authentication factor. Strong PKI security structure naturally defenses against Main-In-Middle (MiM). Combination of PKI and One-time-password (biometric-based, time-based, challenge-based, etc.) strengthens defenses against relay attacks and MiM. 7
TECHNICAL CONSIDERATIONS Outdoor capturing under direct sunlight The biggest impediment of iris recognition is now solved by IriTech New development does not require additional hardware so the cost increase will beminimal. The sunlight technology will bring iris smartwatch to widespread commercial use as the user experience has just increased significantly. Conventional iris camera New camera Property of IriTech, Inc. - Confidential 8
FIDO ALLIANCE AND ONLINE AUTHENTICATION STANDARD FIDO Board Members developed Biometric data will never leave the local auth device Property of IriTech, Inc. - Confidential 9
IRIS-ENABLED SMARTWATCH AS A FIDO U2F DEVICE Property of IriTech, Inc. - Confidential 10
Thank You 11