Iridian Technologies, Inc
Download
1 / 25

- PowerPoint PPT Presentation


  • 209 Views
  • Uploaded on

Iridian Technologies, Inc Moorestown, NJ USA Iridian Technologies, SA Geneva, Switzerland. 856-222-9090 866-IRIDIAN (U.S. & Canada) www.iridiantech.com. Iridian Technologies, Inc Iris recognition biometric software. Iris. Privately held Incorporated 1990, began operations 1993

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about '' - nizana


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Slide1 l.jpg

Iridian Technologies, Inc

Moorestown, NJ USA

Iridian Technologies, SA

Geneva, Switzerland

856-222-9090866-IRIDIAN (U.S. & Canada)www.iridiantech.com


Iridian technologies inc iris recognition biometric software l.jpg
Iridian Technologies, IncIris recognition biometric software

Iris

  • Privately held

  • Incorporated 1990, began operations 1993

  • Merged with Sensar Inc, July 2000

  • WW headquarters located in Moorestown, NJ

  • Iridian Technologies SA headquartered in Geneva, Switzerland

  • Holds numerous US & international software patents


You ve probably heard about us l.jpg
You’ve Probably Heard About Us

  • Schiphol Airport, Amsterdam*

  • Heathrow Airport, London

  • Canadian Airports, Ottawa

  • Atlanta, Knoxville, Frankfurt

  • S-Travel, Zurich Switzerland

  • Singapore/Malaysia borders

  • The Hajj pilgrimage, Saudi Arabia

  • US-FAA Secure Executive Toolset

  • Defense, Army, Navy, data centers, correctional facilities, public utilities

The Afghan Girl

* Access & border crossing implemented by Schiphol Group, CMG, and Joh Enschede


The netherlands l.jpg
The Netherlands

  • “Privium” implemented by the Schiphol Group, JESS, and CMG

    • $89 charge, convenient parking at Schiphol, lounge access

  • Installed kiosks and turnstiles using 1:1 verification via a smart card

  • Used to enter and exit country

    • Includes one-stop immigration and security lane during exit

  • As of March 2002, 2,000+ enrolled, averaging 10,000 transactions per month


Canada l.jpg
Canada

  • Iridian’s iris recognition technology and certified hardware/software were specified in recent CCRA EPPS RFP

    • Implementation expected to begin Summer 2002 in 2 airports growing to 8

  • Similar user design as The Netherlands except central database enrollment

Iridian’s iris recognition being tested “to meet the Canadian government’s

requirement for technology aimed at EPPS, an Expedited Passenger

Processing System. EPPS will eventually allow pre-approved travelers

to clear customs more smoothly.” - The Ottawa Citizen March 5, 2002


Slide6 l.jpg

User authentication is the key to a business’ secure physical and logical perimeters.

Traditional security devices or procedures allow the user to be the weakest link in the security model.

Positive authentication is needed because it enables authorization and administration procedures.

Iris Recognition delivers positive authentication.


Slide7 l.jpg

Source: The New Yorker physical and logical perimeters.


Security privacy convenience l.jpg
Security-Privacy-Convenience physical and logical perimeters.

Before September 11, 2001

No America

E ME A

Asia

1. Convenience

1. Security

1. Security

2. Privacy

2. Privacy

2. Convenience

3. Security

3. Convenience

3. Privacy


Security privacy convenience9 l.jpg
Security-Privacy-Convenience physical and logical perimeters.

Post September 11, 2001

No America

E ME A

Asia

1. Security

1. Security

1. Security

2/3. Privacy

2. Privacy

2. Convenience

2/3. Convenience

3. Convenience

3. Privacy


To conduct secure business l.jpg
To Conduct Secure Business physical and logical perimeters.

  • Authenticate the point of entry

    • At the sender & receiver nodes

    • At the door or gate

  • Authorize the action

    • Privilege the “right” to gain access

  • Administer the policies

    • Secure the data transport

    • Database management with privacy

* Access & border crossing implemented by Schiphol Group, CMG, and Joh Enschede


Biometric types l.jpg
Biometric Types physical and logical perimeters.

  • Iris Recognition – uses a video camera to pinpoint the independent coordinates of the iris of the eye

  • Face – defines a dozen or so points on the face and measures the distance between them

  • Fingerprints – looks for pattern ends and their changes in direction

  • Hand – measures the size and angles of a person’s hand features

  • Voice – analyzes the sound waves and speech patterns of a recorded voice

  • Others – signature, retinal scan, keyboard


How to measure a biometric l.jpg
How to Measure a Biometric physical and logical perimeters.

  • False Acceptance Rate (FAR) – accepting users who it shouldn’t accept

  • False Rejection Rate (FRR) – rejecting users who it should accept

  • Outlier Population – the percentage of people who cannot use the biometric because they do not have the characteristic

  • Storage and Matching - the business application should determine to use either verification or identification or both


Authentication l.jpg
Authentication physical and logical perimeters.

ALL biometrics can verify

  • Verification asks: “Does this live record match a particular stored value?”

    • It requires a password or PIN or token to suggest a pointer, then the system verifies the match.

  • Verification answers: “It is or is not a match.”

    Iris Recognition identifies

  • Identification asks: “WHO is this person?”

    • It does not require a password or PIN or token because it finds the person by doing an exhaustive search of the database.

  • Identification answers:

    • “This is so-and-so” OR

    • “This record is valid and is approved for processing”


Security and privacy can be balanced if l.jpg
Security physical and logical perimeters. and Privacy can be Balanced if

  • The biometric and application align

    • Iris recognition requires user participation – “opt-in”

    • Some biometrics are passive

  • Data integrity is assured

    • In systems architecture

    • In the template

    • In transactions

    • In storage

  • Data managers follow policies


The iris is not the retina l.jpg

Sclera physical and logical perimeters.

Iris

Choroid

Aqueous

Humor

Optic

Nerve

Cornea

Retina

Ciliary Muscle

Lens

The Iris is NOT the Retina


How iris recognition works l.jpg
How Iris Recognition Works physical and logical perimeters.

  • Uses a video image of the iris

  • Analyzes the iris patterns, preparation for secure transport

  • Creates a 512 byte IrisCodeR template to describe the patterns

  • Matches the code to all IrisCodes

    in a database/file

  • Accepts or rejects individual


Common platform l.jpg

Network physical and logical perimeters.

Network

Network

Common Platform

Walkup

Physical Access

Kiosk

Gate/Perimeters

Desktop

Information Access

Single Sign On/Off

Domain Log-on

Personal

Information Access

Transactions

Single Sign On


Slide18 l.jpg

Client or Camera Resident Software physical and logical perimeters.

  • Image capture and evaluation, image compression

  • Image security preparation for transport including countermeasures and permutations

  • Offers 3DES encryption at API

  • Some cameras use PrivateID to support internet video conferencing, video capture/editing, and video e-mail applications

  • Drivers support multiple Windows versions

  • Using APIs, can be used with smart cards, passports, LAN/WAN logon, digital document signing, e-commerce transaction authorization etc


Secure authentication server l.jpg
Secure Authentication Server physical and logical perimeters.

KnoWho

Authentication

Server

  • Accepts secured iris image from PrivateidTM

  • Creates IrisCodeR and performs matching algorithms

    • Can perform identification (1:n) or verification (1:1)

  • Offers 3DES encryption at API and database

    • Supports Oracle or SQL db

  • Currently runs on NT 4.0, W2000

    • Linux and Solaris shortly

  • Sold as whole unit or as a kit

  • Priced per user (1 user = 2 IrisCodesR)

Application

Servers

TCP/IP network

Windows Desktop

ODBC

Database

Oracle, MS-SQL

Internet Connection

www


Lg irisaccess tm 2200 powered by xxxxxxxx l.jpg
LG IrisAccess physical and logical perimeters. TM 2200powered by xxxxxxxx

Walk-up Applications

Facility access

Immigration/airport security

Data centers

Utility & power plants

Prison book/release

Time & attendance

Benefits

Audio instructions

Auto focus

View 3 to 12 inches

Small size


Oki panasonic bm et500 tm powered by xxxxxxxx l.jpg
Oki-Panasonic BM-ET500 physical and logical perimeters. TMpowered by xxxxxxxx

Walk-up Applications

Immigration/airport security

Gate control

Utility & power plants

Prison book/release

Time & attendance

Benefits

Two-iris recognition

Stand up to a meter away

Auto focus

Surveillance

Face image capture


Panasonic authenticam tm powered by privateid tm l.jpg
Panasonic Authenticam physical and logical perimeters. TMpowered by PrivateIDTM

Desktop Applications

Local logon

Domain logon

Single Sign On

LAN administration

Desktop security

Benefits

Amber/green LED

View 19 to 21 inches

Small size

Video conferencing

Available at Enterprise Resellers


Application integration architecture l.jpg
Application physical and logical perimeters. Integration Architecture


Partnerships l.jpg
Partnerships physical and logical perimeters.


To conduct secure business25 l.jpg
To Conduct Secure Business physical and logical perimeters.

  • Authenticate the point of entry

    • At the sender & receiver nodes

    • At the door or gate

  • Authorize the action

    • Privilege the “right” to gain access

  • Administer the policies

    • Secure the data transport

    • Database management with privacy

Iris Recognition delivers positive authentication.


ad