Role of Multi-biometrics in Usable Multi- Factor Authentication



Similar documents
Usable Multi-Factor Authentication and Risk-Based Authorization

Usable Multi-Factor Authentication and Risk- Based Authorization

Powering Security and Easy Authentication in a Multi-Channel World

The Challenges of Web single sign-on

Business Banking Customer Login Experience for Enhanced Login Security

BehavioSec participation in the DARPA AA Phase 2

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

Biometric SSO Authentication Using Java Enterprise System

NFC & Biometrics. Christophe Rosenberger

Trust Elevation Using Risk-Based Multifactor Authentication. Cathy Tilton

2 factor + 2. Authentication. way

solutions Biometrics integration

Multi-Factor Authentication of Online Transactions

Device-Centric Authentication and WebCrypto

Security Levels for Web Authentication using Mobile Phones

Framework for Biometric Enabled Unified Core Banking

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach

TECHNOLOGIES MOBILE STRATEGY

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Moving to Multi-factor Authentication. Kevin Unthank

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

The Benefits of an Industry Standard Platform for Enterprise Sign-On

Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs

Ericsson Mobile digital identity

Biometrics and Cyber Security

Progressive Authentication on Mobile Devices. They are typically restricted to a single security signal in the form of a PIN, password, or unlock

Alternative authentication what does it really provide?

Voice Authentication On-Demand: Your Voice as Your Key

May For other information please contact:

interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Decision on adequate information system management. (Official Gazette 37/2010)

Microsoft Enterprise Mobility Suite

2 FACTOR + 2. Authentication WAY

Oracle Identity Governance - Complete Identity Lifecycle Management

Secure your Privacy. jrsys, Inc. All rights reserved.

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

Comprehensive Device Management Platform comprising of Management Suites specialized in addressing different problem domains, extensively

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Longmai Mobile PKI Solution

A MOBILE PAYMENT SYSTEM WITH AN EXTRA TOKEN OF SECURITY Nael Hirzallah 1 and Sana Nseir 2

Entrust IdentityGuard

STRONGER AUTHENTICATION for CA SiteMinder

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

m Commerce Working Group

WHITE PAPER Usher Mobile Identity Platform

Adaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering

Mobile Financial Services

PRIME IDENTITY MANAGEMENT CORE

ImageWare Systems, Inc.

SENSORS ON ANDROID PHONES. Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver

The Leading Provider of Identity Solutions and Services in the U.S.

Strong Authentication for PIV and PIV-I using PKI and Biometrics

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics

Accessing the bank account without card and password in ATM using biometric technology

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

Access Management Analysis of some available solutions

Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments. Sam Linford Senior Technical Consultant

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Multi Factor Authentication

Identity Governance Evolution

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

NetIQ Advanced Authentication Framework

A Various Biometric application for authentication and identification

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

IBM Security Systems Division

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0

NC CJIN Governing Board. 13 October, George A. White

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

SAML for EPCS (Electronic Prescription of Controlled Substances)

OpenID & Strong Authentication

Intralinks Best Practices in Security: Risk-Based Multi-Factor Authentication

Biometrics in Secure e-transaction

Securing end-user mobile devices in the enterprise

NACCU Migrating to Contactless:

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Advanced Authentication

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Modern Multi-factor and Remote Access Technologies

Transcription:

Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 ratha@us.ibm.com *: In collaboration with colleagues from security and usability team This work is supported by a grant from the United States Department of Homeland Security under contract FA8750-12-C-0265.

Agenda Research Mobile Authentication Usable Biometric Authentication Biometric authentication and multi-factor biometric fusion Risk-based authorization Future

Mobile Is Becoming A Primary Personal Computing Platform Business Financial Personal Physical 3

DID YOU BRING YOUR SECURITY TOKEN WITH YOU TODAY (and BYOD)?

MY PHONE Me

Interaction with mobile devices is brief typically a minute or less Often interrupt driven PIN and gesture are most common No password is also very common Passwords using reduced size keyboard Entry of corporate compliant passwords dominates the interaction time User frustration Removal of security profile Avoid corporate compliance Biometric authentication Popular choices: face, voice, fingerprint 6

Mobile Money Mobile Devices Are Authentication Tokens Starbucks 26M transactions and growing Square - $4B/year CC transactions Visa s paywave mobile payments system Barclaycard Many others. Schlage Door locks Craftsman Garage Door Opener Mobile Wallets are Proliferating ApplePay Google Wallet, including Citi EnStream (Canada) Sprint Alcatel-Lucent Square O2 UK New Zealand Use of NFC as part of mobile wallet technology 7

Usable Authentication Risk-Based Authorization Authentication Confidence / Biometric Authentication Authentication Context Trust Centric Environmental Situation Authentication Challenges and Policies Behavior History Multi-Factor Authentication Situational Impariments Usable Security / Risk Communication Contextual Design?!

Smart devices: extremely rich in channels Fingerprint NFC Heartbeat Sensor Temperature Sensor Accelerometer Barometer Multi-touch sensitive display High res display Cameras Pointing devices Voice Soft keyboard Web access Bluetooth GPS SMS/Text Gyro Cell towers Wi-fi/WiMax

Human Interaction Paradigm Shift Interaction being driven by mobile Multi-modal features required Camera Vision Eye tracking Speech recognition Touch / Haptics Text spoken Transactions No wires Location Motion

Biometrics challenges in mobile devices Sensor and algorithmic Fingerprint scanner Swipe sensors or small area sensors Camera: fixed focus, low res Poor quality images Often front facing camera is the weaker May not be suitable for iris Microphone Each brand carries different type of microphone Challenge for speaker recognition On poor/low quality data there will be significant accuracy challenges on any single biometrics Third party tests have shown that with supervised data collection using professional biometric scanners, we can get acceptable accuracy Not a single biometrics can meet the real end-user performance Need to look for more than one factor

Why Mobile is Different: Situational Impairments Anywhere access creates usability needs for everyone design for disabilities solves usability problems for everyone. Outside light Ambient noise Single hand Bumpy road Aging eyes Eyes busy Public places

Context Research Secure Multi-Modal Authentication Authentication Tests Enrollment Driving Gloves on Voice Fingerprint Auth. service selects challenges Verify against enrollment Hands busy Face reco Bad light QRCode Public place Knowledge

Why multi-factor biometrics? Improved accuracy with better usability Fusion always gets better accuracy when the underlying modalities (biometrics) are uncorrelated. 14 Table shows 2008 state of the art.

Authorization Research IBM Mobile Security Architecture Sketch Security Policies IBM Security Policy Manager Risk Policies Application Owners Operations Mobile Device Applications Middleware Operating System Hardware sensor sensor sensor Log Analysis Integrity Measurements Biometric / Fusion authentication ISAM WebSEAL Risk-Based Authorization Web Policy Decision WebSphere Portal / App. Server SSO (TAI) Policy Decision Security Services (PDP) Auth. (STS) PEPs (Java, Web Services) Authz. (RTSS) Device Profiling History Context Admin. Policy Information Identity and Access Management User Profiling Situation Risk Scoring TFIM TAMeb TIM

Multi-Factor Client / Server Architecture Overview Objective: Based on context, "authenticate just enough" to accommodate user preference and (situational) impairments 16

Architecture Research Mobile Device Mobile Apps Mobile Apps Proxy or Mobile Gateway Network Services Authentication Client Risk Assessment Content Sensitivity / Value Customizable User Interfaces MFA-RBA Services Context Evaluation Client framework Worklight / PhoneGap-based Bio Lib Context Lib Security Lib OOBAC Biometric Fusion Presence Detection Risk-Based Authorization Face Quality Detection Voice Quality Detection Gesture Quality Detection Environment Detection Biometric Engines Enrollment & Verification 3 rd Party Biometric Engines Multi-factor Authentication and Risk-Based Authorization Services

Risk-Based Authorization: Balancing Security and Usability Authenticating just enough, based on context, to accommodate situational impairments and user preferences Models the customer and device context and behaviors Time, location, environment, Mobile Transaction Contextual Risk Factors Home Estimates possible change in possession of the device Determine required authentication confidence required Biometric Fusion Policy generates biometric challenges Non-biometric data required to establish context Crowded Location Daily Commute Risk? Loss of physical control Public Location Office Usability Security 18

Biometric Verification Technologies for this Project Speaker Face Fingerprint 19

User Interface Design and Risk Communication Risk Indicator Network Security Authentication Methods Anti-Phishing Unauthorized Account Access An initial mock-up. Not the real design!