NFC & Biometrics. Christophe Rosenberger



Similar documents
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

May For other information please contact:

Assignment 1 Biometric authentication

Framework for Biometric Enabled Unified Core Banking

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Smart Card in Biometric Authentication

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

User Authentication Methods for Mobile Systems Dr Steven Furnell

Voice Authentication for ATM Security

BehavioSec participation in the DARPA AA Phase 2

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Multimodal Biometric Recognition Security System

Biometrics for Payment Applications. The SPA Vision on Financial Match-on-Card

Towards the Security Evaluation of Biometric Authentication Systems

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

White paper Fujitsu Identity Management and PalmSecure

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

French Justice Portal. Authentication methods and technologies. Page n 1

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

A Various Biometric application for authentication and identification

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company

ADVANCE AUTHENTICATION TECHNIQUES

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc Mira.LaCous@bio-key.

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Device-Centric Authentication and WebCrypto

Biometric Authentication using Online Signature

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY

Multi-factor authentication

Talent Solutions. LinkedIn Certified Professional. Program Handbook. LinkedIn Certified Professional Recruiter

solutions Biometrics integration

Role of Multi-biometrics in Usable Multi- Factor Authentication

BIOMETRIC SOLUTIONS 2013 ISSUE

BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW

Moving to Multi-factor Authentication. Kevin Unthank

Multi-Factor Authentication of Online Transactions

Application-Specific Biometric Templates

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation

Progressive Authentication on Mobile Devices. They are typically restricted to a single security signal in the form of a PIN, password, or unlock

Security Levels for Web Authentication using Mobile Phones

Development of Attendance Management System using Biometrics.

Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

PalmSecureID for the EDUCATION MARKETPLACE

Biometric Authentication. The Myths and The Facts

COMPARISON OF VARIOUS BIOMETRIC METHODS

Keywords: fingerprints, attendance, enrollment, authentication, identification

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Biometrics and Cyber Security

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

Security Model in E-government with Biometric based on PKI

Finger Vein digital biometric signature: use cases

Accessing the bank account without card and password in ATM using biometric technology

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

De-duplication The Complexity in the Unique ID context

Security and Usability

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security

WHITE PAPER. Let s do BI (Biometric Identification)

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group

Information and Network Security & Privacy Research

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Mobile Biometric Security Systems for Today and Future

Opinion and recommendations on challenges raised by biometric developments

Biometrics in Secure e-transaction

Entrust IdentityGuard

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

DigitalPersona Pro Enterprise

Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Fundamentals of Biometric System Design. Chapter 1 Introduction

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Extending EMV payment smart cards with biometric on-card verification

Two Factor Authentication for VPN Access

Secure communications via IdentaDefense

Biometric SSO Authentication Using Java Enterprise System

Multi-Factor Authentication Core User Policy and Procedures

Usable Multi-Factor Authentication and Risk- Based Authorization

Two-Factor Authentication Making Sense of all the Options

id center definitely with biometrics strong authentication

Online teaching: Do you know who is taking the final exam?

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Department of Computer Science, University of Otago

Advanced Authentication

Multi-factor Mobile Authentication

Authentication Solutions Through Keystroke Dynamics

MegaMatcher Case Study

International Journal of Innovative Research in Computer and Communication Engineering

22 nd NISS Conference

Biometrics & Authentication Technologies: security issues. Andy Adler Systems and Computer Engineering Carleton University, Ottawa

EMBEDDED MAJOR PROJECTS LIST

Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS

Transcription:

NFC & Biometrics Christophe Rosenberger

OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2

GREYC Research Lab Research Group in Computer science, Automatics, Image processing and Electronics of Caen Laboratory staff: 7 CNRS researchers 25 Full professors 18 Associate professors 48 Assistant professors 79 PhD students 17 permanent staff 30 Engineers and post-doc Research topics: Electronics Image processing Algorithmic Document analysis Multi-agents Robotics navigation Automatics Computer security Natural language processing Biometrics Cryptography 3

Research units CODAG: Constraints, Data mining, Graphs HULTEC: Human Language Technology AMACC: Computation models, Cryptography, Complexity MAD: Models, Agents and Decisions IMAGE : Image AUTO : Automatics ELEC : Electronics E-payment & Biometrics 4

E-payment & Biometrics Members (29): 3 full professors, 2 associate professors, 4 assistant professors, 4 permanent engineers, 8 PhD students, 2 Post-docs, 6 engineers. Research topics (2): Biometrics and Trust Application: E-payment Research projects: ASAP(ANR), LYRICS(ANR), PAY2YOU(FUI), CAPI(FUI), ADS+(FUI), INOSSEM(GE), LUCIDMAN(EUREKA) 5

E-payment & Biometrics Biometrics: Operational authentication that respects the privacy of users Le pôle TES Biometric le sans-contact authentication (palm veins, keystroke dynamics ) Evaluation of biometric systems (usability, security ) Protection of biometrics (cancelable biometrics, smartcards ) GREYC Keystroke Keystroke dynamics authentication 6

OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 7

Contactless transactions E-Secure transactions Different technologies are combined E-transactions ( E-secure Transactions Cluster) 8

Contactless transactions Why contacless is better? It is faster There are many possible terminals for the transaction Smartcard, mobile phone, tablet, POS... It allows low cost applications Advertising, couponing... In some cases, it is more easy to use Transport, physical access control... 9

Contactless transactions User authentication: Holding an object (smartcard, mobile phone...) and Knowledge of a PIN code or OTP Limitations: More related to machine authentication Not so difficult to attack No real relationship between the user and its authenticator 10

Contactless transactions Biometrics : The only one authentication method using an authenticator related to the user 11

OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 12

Biometrics Biometric modalities: Biological analysis: EEG signal, DNA Behavioural analysis: Keystroke dynamics, voice, gait, signature dynamics... Morphological analysis: Fingerprint, iris, palmprint, finger veins, face, ear 13

Biometrics Biometric system: general architecture 14 Source ISO/IEC19794-1 Information technology Biometric data interchange formats Part 1: Framework

Biometrics Advantages: The only one user authentication method It is more easy to use It is much more difficult to attack or falsify 15

Biometrics Drawbacks: False rejection and acceptance are possible In general, it is not possible to revoke a biometric data It is sensitive to the replay attack There are many privacy concerns 16

OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 17

Solutions Two types of device: Specific ones with a biometric sensor Classic ones Two locations for the biometric authentication: 18 User Service provider

Specific solutions: user Match and capture on device Fingerprint sensor http://www.authentec.com/ 19

Specific solutions: user Match and capture on contactless card solution Comparison between the template and the capture Storage of the template fingerprint Fingerprint sensor 20 http://www.e-smart.com/

Specific solutions: terminal Match and capture on device solution NFC reader Fingerprint sensor http://www.taztag.com/ 21

Specific solutions: terminal Capture on device solution http://ekemp.en.alibaba.com http://www.acs.com.hk/ 22 http://www.naturalsecurity.com/ http://www.supremainc.com/

Specific solutions Discussion: There are many solutions especially for terminals Nearly all of them use fingerprint as biometric modality well known and cheap technology fast capture and verification very good performance 23

Other solutions Solutions without any specific sensor: Smartcard: storage of the biometric template match on card Smart object (mobile phone, tablet, laptop...) webcam : Face recognition Hand shape Finger knuckle print Ear... Finger Knuckle Print 24 Face Ear Hand shape

Other solutions Smart object (mobile phone, tablet, laptop...) microphone : speaker recognition: text-dependent or free-text keyboard : keystroke dynamics: passphrase, password or challenge touch screen : interaction: passphrase, password, challenge, task signature dynamics 25 Touch screen interaction Voice Signature dynamics Keystroke dynamics

Other solutions Discussion: There are many possible solutions The most interesting candidates are: voice touch screen interaction signature dynamics face hand shape 26

OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 27

Perspectives Biometric authentication will be necessary To make a real user authentication In order to guarantee the security of a contactless transaction Many trends have to be considered How to protect the biometric template? It is better to use a challenge based biometric authentication How and who will realize the enrolment? How to guarantee users privacy? 28

29 http://www.epaymentbiometrics.ensicaen.fr/