22 nd NISS Conference



Similar documents
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

solutions Biometrics integration

Moving to Multi-factor Authentication. Kevin Unthank

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

May For other information please contact:

Secure Data Exchange Solution

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

SecureDoc Disk Encryption Cryptographic Engine

Introducing etoken. What is etoken?

Fingerprint Based Biometric Attendance System

DigitalPersona Pro Enterprise

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

PRIME IDENTITY MANAGEMENT CORE

W.A.R.N. Passive Biometric ID Card Solution

Managed Portable Security Devices

Multi-factor authentication

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

French Justice Portal. Authentication methods and technologies. Page n 1

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

SCB Access Single Sign-On PC Secure Logon

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Two-Factor Authentication Making Sense of all the Options

- BIOMETRIC. Tel : Website : marketing@litestar.com.sg

L-1 Fingerprint Reader Solutions. V-Flex 4G

How To Protect Your Data From Harm With Safenet

SHENZHEN PROYU BIOMETRIC T/A & A/C TERMINAL QUOTATION

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Biometric SSO Authentication Using Java Enterprise System

TrustKey Tool User Manual

Development of Attendance Management System using Biometrics.

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

T imetrak Systems Inc. offers the widest variety

SafeNet Authentication Client (Windows)

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

ACER ProShield. Table of Contents

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

PROXKey Tool User Manual

1. Product Overview 2. Product Feature 3. Product Value 4. Development Environment 5. Software Development Kit 6. Product Application 7.

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems

BIOMETRIC SOLUTIONS 2013 ISSUE

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Entrust IdentityGuard

Smart Card in Biometric Authentication

Framework for Biometric Enabled Unified Core Banking

Chapter 1: Introduction

SecureD Technical Overview

Finger Vein digital biometric signature: use cases

Ozbytes Design Biometric Fingerprint Time and Attendance and Access Control Unit Item Code: OZD-ABC-AV100

Aegis Padlock for business

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Biometric Fingerprint Time and Attendance and Access Control Unit OZD-ABC-T60 Technical Specification Data Sheet. Ozbytes Design

Windows 7. Qing Liu Michael Stevens

Secure USB Flash Drive. Biometric & Professional Drives

True Identity solution

The Convergence of IT Security and Physical Access Control

Biometrics in Physical Access Control Issues, Status and Trends White Paper

MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.

Advanced Authentication

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Application-Specific Biometric Templates

Audio: This overview module contains an introduction, five lessons, and a conclusion.

PoE-Touch Fingerprint and RFID Access Control

Firmware security features in HP Compaq business notebooks

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

Embedded and mobile fingerprint. technology. FingerCell EDK

Strong Authentication for Secure VPN Access

Each ievo reader needs its own network cable, as each reader has its own IP address. Ensure this has been taken into consideration

IBM Client Security Solutions. Client Security User's Guide

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Global network of innovation. Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway)

Navigating Endpoint Encryption Technologies

Security Model in E-government with Biometric based on PKI

ACCESS CONTROL SYSTEMS USER MANUAL

Digital Signatures on iqmis User Access Request Form

Basic Software Setup Guide.

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Cashless Prepaid Card Systems Vending Systems for Prisons Biometrics Time & Attendance Kiosks Custom Technology Solutions

Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Token User Guide. Version 1.0/ July 2013

Device-Centric Authentication and WebCrypto

Security Levels for Web Authentication using Mobile Phones

Executive Summary P 1. ActivIdentity

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

ADVANCE AUTHENTICATION TECHNIQUES

HC Emission Protected Security Workstation

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

ASERIES ATM Access Management System

Access Control Using Smartcard And Passcode

Enhancing Web Application Security

Transcription:

22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO YOUR EXISTING SYSTEMS Biometric(s), security, encryption, API, computer William H. Saito, President/CEO I/O Software, Inc. 1533 Spruce Street Riverside, CA 92507 Phone: (909) 222-7600 Email: william@iosoftware.com

ABSTRACT DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO YOUR EXISTING SYSTEMS As the technology behind biometrics become cheaper and more reliable, many companies have begun to integrate various biometrics into their existing security system. This workshop will explain how to implement and build biometric technology to augment current security systems while explaining specific issues that need to be addressed. Designed to benefit both technical and non-technical professionals, this real world information will enable developers to develop biometric solutions without compromising the intended security enhancement. Seamlessly developing biometrics to enhance your existing security - Template storage and management issues - Template encryption issues - Security and integrity of biometric data from source to output - Potential security threats and solutions to them - Export restrictions regarding certain biometric implementations Developing API's (Application Programming Interface) - Current status of the biometric API's - How to use and which is best for you? - API's and implementing a secure system - API's and non-pc platforms - Exploring template compatibility Developing a common methodology for software developers looking to integrate biometrics into their applications - End user education - Making applications easier to use via biometrics - Common UI (User Interface) issues regarding biometrics - User enrollment problems and solutions - Client/Server programming issues to consider - Frequent error conditions and how to handle them - Audit and event logs issues while addressing privacy

Biometrics Installing and Integrating Biometric Systems into your Existing Systems NISS Conference, October 18-21 William Saito President/CEO

Company Founded in 1991 Core Products & Technology Device driver development & hardware integration Commercial biometric application development Biometric solution provider Original developer of BAPI BioAPI member DWG (Device Working Group) Chair UAS Working Group member

Biometrics 101 Choosing your biometric technology

Why is biometrics important? What you know (i.e., password or PIN) Insecure, can be forgotten, needs to be changed, can easily be copied or given to others What you have (i.e., ID card or key) Can be lost or copied (without your knowledge), replacement costs are high What you are (i.e., fingerprints) Only non-reputable authentication method. Conclusively proves you are who you say you are

Types of biometrics Fingerprint/Finger length Hand geometry Iris/Retina Facial image/facial thermograms Voice Signature Keystroke

Types of biometrics Physiological vs. behavioral characteristics Physiological: Don t change over time (Fingerprint, hand, iris, etc..) Behavior: Change over time (Voice, signature) Interactive vs. Passive biometrics Passive: Facial

Trade offs Cost Security Size Convenience Speed Accuracy Connectivity & compatibility (ports/os/cpu) Intrusiveness

Selecting criteria Level of accuracy Ease of use Barrier to attack Public acceptability Long-term stability Cost Size (A) (B) (C) (D) (E) (F) (G)

Biometrics technologies (Comparison) Finger Signature Hand Iris /Retina Facial Voice A8 B8 C8 D7 E8 F5 G5 A4 B9 C4 D9 E4 F3 G3 A7 B7 C7 D7 E4 F7 G7 A9 B3 C8 D4 E7 F9 G9 A4 B5 C4 D8 E4 F4 G8 A7 B8 C4 D8 E5 F2 G2 (0=Very Low 5=Average 9=Very High) (Black = Higher value is better / Red = Lower value is better)

Biometric taxonomy Cooperative Overt Habituated Supervised Stable Environment Optional vs. Non-cooperative vs. Covert vs. Non-habituated vs. Unsupervised vs. Unstable vs. Mandatory Biometrics do best in conditions of left column

Types of applications Physical access Computer logon/logoff File encryption Client/Server Dumb terminals Internet / e-commerce Smart cards PKI - Public Key Infrastructure

How biometric devices work

How biometrics work User enrollment Image capture Image processing Feature extraction Comparison Verification Identification

Templates Templates are usually not compatible between vendors Template size/type varies 50-8000+ bytes Speed vs. accuracy vs. size Template types include: Vectors Minutiae

Image conversion Raw Data Processed Data Template Data

Comparison methods Verification 1:1 matching To verify that the person is who he says he is Identification 1:n search To find a person out of many in a database

Evolution of devices

First Generation Fingerprint devices : Three Generations Supervised Slow Bulky devices / heavy! Required calibration Not PC based Very expensive! (>$5K) Application: Criminal Enforcement

Second Generation Fingerprint devices : Three Generations Optical only devices High FRR and/or FAR Required some finger preparation Somewhat PC friendly development environment Expensive (>$1K) Applications: Building access control High security computing in vertical applications

Third Generation Fingerprint devices : Three Generations Non optical based sensor First mass produced devices Fast, self-calibrating, encryption support, dead/fake finger detection SDK s available for PC s Inexpensive (<$300) Applications: General Purpose Computing Windows NT/95, UNIX

Types of devices

Device interfaces Various port types (and issues) Composite video signal Parallel port (Pass through & ECP/EPP modes) Serial port (RS-232, RS-422, RS-485, etc..) USB port (NT support) PCMCIA port Weigand Transfer time / ease of integration Encryption

Image capture component Resolution 350-500+ dpi Sensor types & materials Optical Capacitance Resistance Thermal Polymer

Sensor comparisons Optical Most bulky Distortion issues Dry finger problems Capacitance ESD issues Surface strength issues Surface area limitations Thermal Lowest surface area required

Device sophistication Simple Scanner (only) Scanner with encryption Processing (self-contained) Scanner with CPU and/or LSI for fingerprint processing Scanner with CPU and memory for storage of fingerprint (optional encryption) Complex Scanner + CPU + protected storage for PKI type use

Simple biometric devices Simple design / low-cost device No security All processing done on host PC Ideal for simple low security applications Biometric Device Host (PC) CCD / Si Sensor A/D Converter Parallel Port Image filtering algroithm Matching algorithm Template stored on host

Self-contained devices Device contains a lot of intelligence Communications encrypted to host Some or all processing done in device Ideal for physical access, smart cards and terminals Biometric Device CCD / Si Sensor A/D Converter CPU / LSI RAM / Flash Memory Encypted Serial / USB Port Host (PC) Template: On device or host Application: Authentication provider

Complex devices Devices are small and portable Templates and private keys (PKI) never leave device (storage is protected) Tamperproof (FIPS 140-1) Ideal for PKI (PKCS#11 - cryptoki) applications Biometric Device Si Sensor CPU / LSI RSA/DES chip Protected RAM / Flash Encypted PCMCIA / USB Port Host (PC) Template: On device only Application: Authentication provider PKCS#11 token provider

Application suitability

Client/Server Raw image Fingerprint Reader 1. Finger scanned 2. Image converted A/D Client PC 3. Image processing algorithm 4. Template generation Client PC Template Server 5. Template matched with enrolled image 6. If template matches, access is granted Server

Smart card Card Card Info. Smart card with fingerprint template Card Terminal Data Center Server Terminal 1. Card is inserted 2. Template is read from card 3. Template(PIN) sent to fingerprint reader Template Matches 7. Card data updated 8. Updated information sent to data center 9. Transaction complete Fingerprint Reader 4. Finger scanned 5. Finger checked with uploaded template 6. Sends PIN back to terminal

PKI Requests Authentication Requests Cryptographic Services Workstation PKI based fingerprint device Workstation Certificate based web site requests certificate - or - E-mail application requests private key PKCS#11 Module 1. User authentication requested 4. Cryptographic services requested -or- certificate requested Fingerprint Reader 2. Finger scanned 3. Authentication token returned to workstation 5. Cryptographic provided to data -orcertificate returned

Other device features Keypads & LED s Live finger sensor Smart card integration Ergonomics Size Water resistance

Other issues FCC, CE, UL certification Microsoft WHCL compatibility NS1 export approval CC1 export approval Federal Information Processing Standard FIPS 140-1 AFIS compatibility

Biometric applications

Biometric applications SecureSuite Biometrically authenticated Windows 95/98/NT Logon Screen saver unlocking Password provider Hard disk encryption PKI, etc... Smart card (VeriFone) Biometrically locking smart card contents Web / Internet Commerce (SecureWeb)

SecureSuite SecureStart - Secure logon system for Windows 95/98/NT SecureFolder - Windows file / folder encryption application SecureSession - Windows password bank / provider SecureEntrust - PKI based authentication and encryption provider for Entrust SecureApp - Windows based application execution control SecureWeb - Customizable web server access control solution

1533 Spruce St. Riverside, CA 92507 (909) 222-7600 (909) 222-7601 FAX Web: www.iosoftware.com E-Mail: William@iosoftware.com