Biocryptology is an encryption-based. entry to a network or the Internet that. are vulnerable to third parties through



Similar documents
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Advanced Biometric Technology

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Unisys Security Insights: Global Summary A Consumer Viewpoint

WHITE PAPER Usher Mobile Identity Platform

Unisys Security Insights: Germany A Consumer Viewpoint

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

ACE European Risk Briefing 2012

2012 NORTON CYBERCRIME REPORT

Five Trends to Track in E-Commerce Fraud

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance

Jim Bray, Cyber Security Adviser InfoSight, Inc.

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

How To Protect Your Endpoints From Attack

User Behaviour Analytics

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Factors Affecting the Online Transactions in the Developing Countries: A Case of E-Commerce Businesses in Nairobi County, Kenya

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Getting real about cyber threats: where are you headed?

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Data Security Concerns for the Electric Grid

Cybercrime Security Risks and Challenges Facing Business

Cybersecurity and internal audit. August 15, 2014

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

SafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB)

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Multi-factor authentication

Application of Biometric Technology Solutions to Enhance Security

Trends in Finger Vein Authentication and Deployment in Europe

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

EMV and Small Merchants:

A strategic approach to fraud

The Relationship Between PCI, Encryption and Tokenization: What you need to know

ACI Response to FFIEC Guidance

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Cisco Advanced Services for Network Security

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

I ve been breached! Now what?

Executive Director Centre for Cyber Victim Counselling /

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Nokia Networks. security you can rely on

NEW ZEALAND S CYBER SECURITY STRATEGY

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

PCI Compliance for Healthcare

OpenEdge Research & Development Group April 2015

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

Central and Eastern European Data Theft Survey 2012

Chapter 1: Introduction

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

The Symantec Approach to Defeating Advanced Threats

10 best practice suggestions for common smartphone threats

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Symantec Managed Security Services The Power To Protect

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Security Best Practices

FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper Executive Director, Product Development

Cybersecurity. Are you prepared?

Master of Science in Information Systems & Security Management. Courses Descriptions

E-Business, E-Commerce

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

E Commerce and Internet Security

Transcription:

Biocryptology is an encryption-based authentication technology that represents a generational step forward in online security and a transformative approach to combating cybercrime. entry to a network or the Internet that are vulnerable to third parties through Secondary Identifi cation Means (S.I.M.) smart phones, passports, credit card The technology makes identifi cation private and secure using human biometry via a unique biocryptic process and offers a secure solution for a host of everyday applications such as network security, smart phones, e-commerce and banking. It is designed to be transformative in dealing with the rising threat of large-scale cybercrime. details, swipe cards, digital certifi cates and stored biometric data are a few examples. We mostly use these access points as the single point of entry into a system using a S.I.M. as a Every day we use a number of access points for personal credential. 2

We don t store any sensitive data But a S.I.M. can be stolen and used maliciously against businesses, governments and societies, so too have the security gaps around system access points. the user. Online security providers now have an array of Our lives today are constructed around a series of networks that make up the Internet. As the internet has grown as a commerce and communication tool for specialized solutions that are used to mitigate and manage security breaches, fraud and other cybercrimes: fi rewalls, anti-virus software, encryption technology, digital certifi cates, but none of them can offer 100% security. As security solutions advance, so too do the methods of cyber criminals. 3

Personal information During the enrollment process, no conventional biometric information is stored using Biocryptology Life detection A patented, multi-step life detection system enables the reading of dynamic parameters of blood fl ow, skin and fi nger temperature, ensuring liveness Digital signature An advanced hardware identifi cation system performs transactions with dynamic digital signatures instead of fi xed digital certifi cates 4

Encryption All communication is encrypted between reader and sensor, biometric data is completely hidden and protected by using hardware encryption mechanisms, making identity theft virtually impossible Time stamp Biocryptology s architecture uses a sophisticated algorithm that converts the collected bio data into an encrypted code within the terminal, at the point of capture Anti-tamper protection An anti-tampering system renders our terminals unusable in case of fraudulent handling, where activated, the information stored within the terminal is destroyed 5

Unabated rise of cybercrime The growth of cybercrime is seismic. More than TOP 10 INDUSTRIES ATTACKED IN 2012 1 a million people fall victim to it every day, according to the European Commission. Aite Group estimates that account takeover was responsible for US$455 million in global losses to financial institutions in 2012, a number which is expected to increase to US$794 million by 2016. Overall, cybercrime accounts for an estimated 24% 19% 17% 12% 10% 8% 2% 2% 2% 1% US$388 billion in global costs, according to security firm Norton. MANUFACTURING FINANCE, INSURANCE & REAL ESTATE SERVICES - NON - TRADITIONAL GOVERNMENT ENERGY /UTILITIES SERVICES - PROFESSIONAL AEROSPACE RETAIL WHOLESALE TRANSPORTATION, COMMUNICATIONS, ELECTRIC 6 1 Internet Security Threat Report 2013, vol 18, Symantec Corporation

In terms of data loss, these daily threats to the operations of businesses and governments cost, on average, $136 for every record lost, according to the 2013 Ponemon survey of nearly 300 companies across nine countries, the fi rst systematic study on the costs of cybercrime. There are a growing number of of new threats that are large-scale and more sophisticated, with the enhanced capability to affect critical infrastructures. New attack types are growing faster than the security solutions designed to stop them. Dealing with an evolving multi-dimensional threat has presented an enormous challenge to businesses At the same time private individuals are dealing with increased concerns about their own privacy online and governments and before Biocryptology there has been no single end-to-end solution. and protections against identity theft and fraud. To an individual, identity theft leads to loss of personal data, the taking over of accounts, impersonating a customer, siphoning off of money or selling biodata so that other parties can do so. Biometrics was supposed to offer a silver bullet solution for authentication by analysing fingerprints, faces and eyes, but enough doubts remain about this technology s reliability. Organizations are being bombarded with cyberattacks yet continue to spend the majority of their internal costs on recovery and detection, but a new paradigm is needed: prevention. 2 2 http://www.symantec.com/connect/blogs/cost-cybercrime-2012 7

Average Cost Per Capita of a Data Breach3 in US$ 194 U.S. 124 U.K. 159 France 191 Denmark 102 Italy 132 Japan 42 Indonesia 145 Australia Australia 8

Data Breaches3 in % TOP CAUSES OF DATA BREACHES DATA BREACHES BY SECTOR HACKERS ACCIDENTALLY MADE PUBLIC THEFT OR LOSS OF COMPUTER OR DRIVE INSIDER THEFT UNKNOWN FRAUD HEALTHCARE EDUCATION GOVERNMENT ACCOUNTING COMPUTER SOFTWARE FINANCIAL INFORMATION TECHNOLOGY TELECOM COMPUTER HARDWARE COMMUNITY AND NONPROFIT 40% 23% 23% 8% 6% 1% 36% 16% 13% 9% 6% 6% 5% 4% 3% 3% 3 Ponemon Institute Research Report 2013 Cost of Data Breach Study: Global Analysis 9

A safe solution Biocryptology is a combination of a proprietary encryption process based on military standards, together with other life-detection mechanisms that comprise a single, robust IT security solution. It replaces the S.I.M. with a Primary identifi cation means, which reads unique uninterruptible life signals and connects to a safe and secure online identifi cation gateway. It consists of: Real-time encryption that takes place in hard- An end-to-end design ware, at the point of user contact No plain data anywhere within the system Life-detection mechanisms that use radio frequency technology, ultraviolet radiation and temperature sensors No storage of biometric data An anti-tampering system During the enrollment process no conventional biometric information is stored using Biocryptology. Instead, a complex algorithm converts the collected information in real time into a series of encrypted numbers, not as an image or any other data form that can be recreated to obtain one s identity. Only this encrypted code is stored in a data centre 10

where it is linked to the individual s precaptured information obtained during the user registration process. By matching the encrypted code, the biocryptic data centre is the only entity capable of verifying and confi rming the identity of a previously registered individual. Thus, without the encryption Lastly, when a user wants to make a secure transaction through the Internet when using a Hanscan device connected to a computer, Biocryptology enlists the user s computer only as a communication platform and does not rely on any of its software. key that is housed separately from the database, the encrypted code is of no use to anybody or anything else in the world. As a universal, complementary technology Biocryptology is secure and safe and can be integrated with other systems to provide There is also no redundant data travelling through networks: every data packet is uniquely encrypted. Therefore, even if an attacker could obtain any data, it would have no value. comprehensive, end-to-end security. It is a unique, technology that goes beyond any security solution that exists today. It will have broad implications on the way we transact in our lives. 11

www.biocryptology.net Biocryptology is a registered trademark of Primary-Net B.V., P.O. Box 37, 1190 AA, Ouderkerk aan de Amstel, The Netherlands.