BIOMETRICS. Presented By Rickie Jackson. Outline Introduction Biometrics techniques Strengths, and weaknesses FAR/FRR Major Players Summary. What Is Biometrics. Biometrics is the reading of a unique human physical attribute as data, which is then applied to actuating a system.
Presented By Rickie Jackson
Biometrics is the reading of a unique human physical attribute as data, which is then applied to actuating a system.
User Looks Into a Viewer and Focuses on a Point; Infrared Light Scans Retina
User looks at a camera (distance from camera increasing rapidly to 2-3 feet)
User Places Finger on Scanning Device
User Places Hand on Device
User Looks at Camera
Voice Recognition & DSV
User speaks into a microphone or other device, such as a telephone handset
User signs name on a device
User types standard sample on keyboard
Keystroke RecognitionStrengths, and Weakness
Highly accurate; works with eyeglasses; more acceptable to users than retina scan
Mature technology; highly accurate; low cost; small size, becoming widely acceptable
accurate and flexible; widely acceptable to users
Widely acceptable to users; low cost; no direct contact; passive monitoring possible
Usable over existing telephone system; good for remote access and monitoring;
Widely acceptable to users
Widely acceptable to users; low cost; uses existing hardware
Inconvenient for persons with eyeglasses; dislike contact with device and light beam
New technology, cost, although this is rapidly changing
Users can create high FRR; some persons dislike contact with device
User interface is bulky; dislike contact with device
Face recognition is less accurate than other methods
Less accuracy; subject to background noise
Less accuracy; not widely used yet, but has potential with PDAs
FAR(False Acceptance rate) – refers to how often the system accepts someone it should reject
FRR(False Rejection Rate) is how often the system rejects someone it shouldn’t.
Accept wrong person
Reject the correct person
Fuller, Scott and Pagan, Kevin 1997. Intranet Firewalls “Planning and Implementing Your Network Security System.” Ventana Communications Group, Inc.
Conry-Murray, Andrew. Network Magazine. Oct. 1, 2002. p28 Securing End Users from Attack.
McCollum, T. Security concerns prompt new initiatives. The Internal Auditor. Oct. 2002.
Short, Bob. September 2002. Getting the 411 on Biometrics. Security Magazine. p48.
Tocci, Salvatore. 2000. High-Tech IDs: From Finger Scans To Voice Patterns. Grolier Publishing
Mitnick, Kevin & Simon, William L. The Art of Deception: Controlling the Human Element of Security. Library Journal.