Biocryptology is an encryption-based authentication technology that represents a generational step forward in online security and a transformative approach to combating cybercrime. entry to a network or the Internet that are vulnerable to third parties through Secondary Identifi cation Means (S.I.M.) smart phones, passports, credit card The technology makes identifi cation private and secure using human biometry via a unique biocryptic process and offers a secure solution for a host of everyday applications such as network security, smart phones, e-commerce and banking. It is designed to be transformative in dealing with the rising threat of large-scale cybercrime. details, swipe cards, digital certifi cates and stored biometric data are a few examples. We mostly use these access points as the single point of entry into a system using a S.I.M. as a Every day we use a number of access points for personal credential. 2
We don t store any sensitive data But a S.I.M. can be stolen and used maliciously against businesses, governments and societies, so too have the security gaps around system access points. the user. Online security providers now have an array of Our lives today are constructed around a series of networks that make up the Internet. As the internet has grown as a commerce and communication tool for specialized solutions that are used to mitigate and manage security breaches, fraud and other cybercrimes: fi rewalls, anti-virus software, encryption technology, digital certifi cates, but none of them can offer 100% security. As security solutions advance, so too do the methods of cyber criminals. 3
Personal information During the enrollment process, no conventional biometric information is stored using Biocryptology Life detection A patented, multi-step life detection system enables the reading of dynamic parameters of blood fl ow, skin and fi nger temperature, ensuring liveness Digital signature An advanced hardware identifi cation system performs transactions with dynamic digital signatures instead of fi xed digital certifi cates 4
Encryption All communication is encrypted between reader and sensor, biometric data is completely hidden and protected by using hardware encryption mechanisms, making identity theft virtually impossible Time stamp Biocryptology s architecture uses a sophisticated algorithm that converts the collected bio data into an encrypted code within the terminal, at the point of capture Anti-tamper protection An anti-tampering system renders our terminals unusable in case of fraudulent handling, where activated, the information stored within the terminal is destroyed 5
Unabated rise of cybercrime The growth of cybercrime is seismic. More than TOP 10 INDUSTRIES ATTACKED IN 2012 1 a million people fall victim to it every day, according to the European Commission. Aite Group estimates that account takeover was responsible for US$455 million in global losses to financial institutions in 2012, a number which is expected to increase to US$794 million by 2016. Overall, cybercrime accounts for an estimated 24% 19% 17% 12% 10% 8% 2% 2% 2% 1% US$388 billion in global costs, according to security firm Norton. MANUFACTURING FINANCE, INSURANCE & REAL ESTATE SERVICES - NON - TRADITIONAL GOVERNMENT ENERGY /UTILITIES SERVICES - PROFESSIONAL AEROSPACE RETAIL WHOLESALE TRANSPORTATION, COMMUNICATIONS, ELECTRIC 6 1 Internet Security Threat Report 2013, vol 18, Symantec Corporation
In terms of data loss, these daily threats to the operations of businesses and governments cost, on average, $136 for every record lost, according to the 2013 Ponemon survey of nearly 300 companies across nine countries, the fi rst systematic study on the costs of cybercrime. There are a growing number of of new threats that are large-scale and more sophisticated, with the enhanced capability to affect critical infrastructures. New attack types are growing faster than the security solutions designed to stop them. Dealing with an evolving multi-dimensional threat has presented an enormous challenge to businesses At the same time private individuals are dealing with increased concerns about their own privacy online and governments and before Biocryptology there has been no single end-to-end solution. and protections against identity theft and fraud. To an individual, identity theft leads to loss of personal data, the taking over of accounts, impersonating a customer, siphoning off of money or selling biodata so that other parties can do so. Biometrics was supposed to offer a silver bullet solution for authentication by analysing fingerprints, faces and eyes, but enough doubts remain about this technology s reliability. Organizations are being bombarded with cyberattacks yet continue to spend the majority of their internal costs on recovery and detection, but a new paradigm is needed: prevention. 2 2 http://www.symantec.com/connect/blogs/cost-cybercrime-2012 7
Average Cost Per Capita of a Data Breach3 in US$ 194 U.S. 124 U.K. 159 France 191 Denmark 102 Italy 132 Japan 42 Indonesia 145 Australia Australia 8
Data Breaches3 in % TOP CAUSES OF DATA BREACHES DATA BREACHES BY SECTOR HACKERS ACCIDENTALLY MADE PUBLIC THEFT OR LOSS OF COMPUTER OR DRIVE INSIDER THEFT UNKNOWN FRAUD HEALTHCARE EDUCATION GOVERNMENT ACCOUNTING COMPUTER SOFTWARE FINANCIAL INFORMATION TECHNOLOGY TELECOM COMPUTER HARDWARE COMMUNITY AND NONPROFIT 40% 23% 23% 8% 6% 1% 36% 16% 13% 9% 6% 6% 5% 4% 3% 3% 3 Ponemon Institute Research Report 2013 Cost of Data Breach Study: Global Analysis 9
A safe solution Biocryptology is a combination of a proprietary encryption process based on military standards, together with other life-detection mechanisms that comprise a single, robust IT security solution. It replaces the S.I.M. with a Primary identifi cation means, which reads unique uninterruptible life signals and connects to a safe and secure online identifi cation gateway. It consists of: Real-time encryption that takes place in hard- An end-to-end design ware, at the point of user contact No plain data anywhere within the system Life-detection mechanisms that use radio frequency technology, ultraviolet radiation and temperature sensors No storage of biometric data An anti-tampering system During the enrollment process no conventional biometric information is stored using Biocryptology. Instead, a complex algorithm converts the collected information in real time into a series of encrypted numbers, not as an image or any other data form that can be recreated to obtain one s identity. Only this encrypted code is stored in a data centre 10
where it is linked to the individual s precaptured information obtained during the user registration process. By matching the encrypted code, the biocryptic data centre is the only entity capable of verifying and confi rming the identity of a previously registered individual. Thus, without the encryption Lastly, when a user wants to make a secure transaction through the Internet when using a Hanscan device connected to a computer, Biocryptology enlists the user s computer only as a communication platform and does not rely on any of its software. key that is housed separately from the database, the encrypted code is of no use to anybody or anything else in the world. As a universal, complementary technology Biocryptology is secure and safe and can be integrated with other systems to provide There is also no redundant data travelling through networks: every data packet is uniquely encrypted. Therefore, even if an attacker could obtain any data, it would have no value. comprehensive, end-to-end security. It is a unique, technology that goes beyond any security solution that exists today. It will have broad implications on the way we transact in our lives. 11
www.biocryptology.net Biocryptology is a registered trademark of Primary-Net B.V., P.O. Box 37, 1190 AA, Ouderkerk aan de Amstel, The Netherlands.