Você está na página 1de 71

BIOMETRICS

Presentation to 2008 AFCEA PD Workshop

Cal Clupp BSc CISSP


Director, Risk Management Consulting
Bell Canada
(613) 597-2336 Source: http://www.banking.com/aba/january.htm
cal.clupp@bell.ca

1
OUTLINE

• DEFINITION
• BRIEF HISTORY
• APPLICATIONS
• BIOMETRICS TERMINOLOGY
• HOW BIOMETRIC DEVICES WORK
• TYPES OF DEVICES
• BIOMETRICS TESTING
• ISSUES (Social, Legal and Political)
• CANADIAN PUBLIC OPINION
• EXAMPLE IMPLEMENTATIONS

2 03 June 2008 Bell Restricted


DEFINITION
• Biometrics - (Classical Definition) Identification of
living things based on physiological and/or
behavioral characteristics
• Biometrics - (ISO Definition) A measurable, physical
characteristic or personal behavioral trait used to
recognize the identity, or verify the claimed identity,
of an enrollee.
• Biometric System – (ISO Definition) An automated
system capable of:
– capturing a biometric sample from an end user;
– extracting biometric data from that sample;
– comparing the biometric data with that contained in one or
more reference templates;
– deciding how well they match; and
– indicating whether or not an identification or verification of
identity has been achieved.

3 03 June 2008 Bell Restricted


HISTORY OF BIOMETRICS

• Used since man first walked upright


– We all use facial recognition on a daily basis
– We use voice recognition during conversations to identify
the other party (e.g. Telephone)
• Fingerprints have been used in forensics for over 100
years by police investigators
• Babies registered at birth using palm/foot prints
• Dental records and X-rays have long been used to
identify decomposed bodies
• The hand written signature is a form of behavioral
biometric identification
• DNA is one of the latest advances used in
identification

4 03 June 2008 Bell Restricted


HISTORY (continued)

• Modern technologies have made it possible to


mechanically and automatically convert physical and
behavioral characteristics into digital electronic form
• Early biometric systems were slow, expensive,
proprietary and unreliable
• They were considered as “science fiction” or “spy toys”
and not likely to be used by ordinary people in daily
transactions
• Today costs are coming down, speed and reliability
are increasing and biometric devices are starting to
become part of our daily lives

5 03 June 2008 Bell Restricted


BIOMETRIC APPLICATIONS
• Depending on the application, biometrics can be used for
security, privacy, convenience, fraud reduction, or to deliver
enhanced services. Applications include:
– Physical security and access control (e.g. borders, airports)
– Computer/Network logins (e.g. laptops with fingerprint sensors built in)
– Business transactions (e.g. ATM withdrawals)
– Credit and debit card protection
– Voting
– Receiving government benefits (e.g. welfare, pension)
– Healthcare services (e.g. patient ID)
– Law enforcement (e.g. drivers licenses, vehicle registration, smart
guns, criminal identification systems)
– Identification Documents (e.g. Visas, passports, SIN cards,
Military/Govt/Corporate ID cards)
– Registering race horses, research animals, pets and other wildlife
– Data protection (e.g. biometric tokens)

6 03 June 2008 Bell Restricted


BIOMETRICS TERMINOLOGY

• Template - stored digital representation of the


biometric characteristic
• Live Scan - digital representation used for
verification against stored template (typically does
not match the template 100%)
• Recognition - Live scan compared against all
templates in database looking for an identity match
• Verification - Live scan compared against a selected
template to validate identity
• Sensor - front end hardware device that is used to
capture the biometrics data
• Minutiae - places where the ridges start or end and
where ridge lines come together

7 03 June 2008 Bell Restricted


TERMINOLOGY (continued)

• Co-operative system - one in which user wants to be


positively identified and provides pertinent info (e.g.
name, PIN)
• Non co-operative system – where the user provides
no assistance in the process (e.g. Facial Recognition
system at airport, Superbowl)
• Non-intrusive - does not require physical contact
with a sensor or have a negative connotation
• Intrusive – requires the individual to touch a sensor,
place a sensor close to their body or participate in a
manner that is uncomfortable from an emotional or
psychological sense

8 03 June 2008 Bell Restricted


TERMINOLOGY (continued)

• Error Rates
– FTA – Failure to acquire
– FTE - Failure to enroll
– False Match Rate (FMR) previously referred to as False Acceptance
Rate (FAR) - called type 2 errors, percentage of unauthorized users
who are incorrectly matched with an existing template
– False Non-match Rate (FNMR) previously referred to as False
Rejection Rate (FRR) - called type 1 errors, percentage of
authorised users who are incorrectly rejected by the system (i.e. not
matched to an existing template)
– Crossover Error Rate (CER), sometimes referred to as Equal Error
Rate (EER) - where FMR and FNMR are equal
• The CER is used to compare pre-processing techniques, however,
it should not be used as a guideline for determining system
performance in operation

9 03 June 2008 Bell Restricted


TERMINOLOGY (continued)
• Error Rates (continued)

FMR
3.5%
FMR
3.0%
System FNMR
2.5% B
System FNMR
Error 2.0% A
1.5%
CER = 1.2

1.0%

CER = .7
0.5%

0%
84% 86% 88% 90% 92% 94% 96% 98% 100%
Threshold

10 03 June 2008 Bell Restricted


HOW BIOMETRIC DEVICES WORK

• With all biometric systems there are 3 steps (i.e. data


capture, signal processing, and decision) which define
the process flow:
– Data Capture
• All biometrics start with a piece of raw analogue data (e.g.
fingerprint, voice sample, face/hand/retina image)
– Signal Processing
• This raw data is digitized so that computers can process it
• The computer software extracts the critical features (e.g.
minutiae) and discards those elements that are irrelevant to
making a successful comparison (i.e. creates template)
– Decision
• The stored and live templates are compared and if they match
(i.e. within set threshold) user will be accepted

11 03 June 2008 Bell Restricted


HOW DEVICES WORK (continued)

• During enrollment the template is created and stored


(sizes from 9Bytes to 1KByte)

Source: SCA – Biometrics May 2002

12 03 June 2008 Bell Restricted


HOW DEVICES WORK (continued)

• During verification the first 2 steps are repeated with


the resulting representation being the live scan or
template.

Source: SCA – Biometrics May 2002

13 03 June 2008 Bell Restricted


HOW DEVICES WORK (continued)

• Compare Template
– The live scan is compared to the stored template.
• Decide Match
– If they match within a set statistical range, it is accepted as valid

Source: SCA – Biometrics May 2002

14 03 June 2008 Bell Restricted


HOW BIOMETRIC DEVICES WORK
Creation of BIR (Enrollment)

DATA SIGNAL DECISION


TEMPLATE / BIR
CAPTURE PROCESSING
STORAGE
Compare
Template

Signal Detection
Decide Match
Biometric System
Controller
Extract Features
Decide
Biometric
Acceptance
Sensor

Create Template*
Set Threshold

QUALITY CONTROL

Present Biometric Sample User Portal Administrator

INPUT / OUTPUT INTERFACES


Grant Privileges

*Template = Processed Biometric Sample


The Create Template process may also include the creation of the Biometric Identification Record (BIR)

15 03 June 2008 Bell Restricted


TYPES OF DEVICES

• Physiological (i.e. physical) Characteristic Devices


– Finger/thumb print readers
– Hand/Finger geometry readers
– Facial Verification Systems
– Eye Scanners
• Retina Scanners
• Iris Scanners
– DNA Identification Systems
– Voice Verification1

Note 1: Voice verification can also be considered a Behavioral Characteristic device

16 03 June 2008 Bell Restricted


DEVICES (continued)

• Behavioral Characteristic Devices


– Voice Verification1
– Signature Dynamics Analysis
– Keystroke Dynamics Analysis
– Gait Analysis

Note 1: Voice verification can also be considered a Physiological Characteristic device

17 03 June 2008 Bell Restricted


FINGER/THUMB PRINT READERS

• Most widely used


• Most systems rely on classifying the differences
between ridges and valleys in the patterns of the print
and at ridge bifurcations or ridge endings (i.e.
minutiae)
• Produces one of the largest templates (aprox 1KByte)
depending on the method used
• Devices are very reliable in use but in some cases
other techniques may be required
• Several types (e.g. optical, capacitive, ultrasound, RF)

18 03 June 2008 Bell Restricted


FINGERPRINT (continued)
• Fingerprint matching techniques can be placed into two
categories: minutiae-based and correlation based.
– Minutiae-based techniques first find minutiae points and then map their
relative placement on the finger. However, there are some difficulties
when using this approach.
• It is difficult to extract the minutiae points accurately when the
fingerprint is of low quality.
• Also this method does not take into account the global pattern of
ridges and furrows.
• More subject to wear and tear, and false minutiae.
– The correlation-based method is able to overcome some of the
difficulties of the minutiae-based approach. However, it has some of
its own shortcomings.
• Correlation-based techniques (i.e. pattern matching) require the
precise location of a registration point and are affected by image
translation and rotation.
• Larger templates (often 2 – 3 times larger than minutiae-based)

19 03 June 2008 Bell Restricted


FINGERPRINT (continued)

• Intrusive procedure
• In 1997 the stamp-sized fingerprint reader on a
microchip was introduced which has led to the
potential for many new applications (e.g. securing
smartcards)
• A much smaller “scrolling” sensor is now available
which has made even more applications possible and
has addressed some of the security concerns with
latent prints
• Some more advanced readers can differentiate
between live and dead tissue
– by checking for pulse
– by sensing oxygen level
– by checking capacitance of the biometric sample

20 03 June 2008 Bell Restricted


FINGERPRINT (continued)

Print showing various types of Minutiae

21 03 June 2008 Bell Restricted


FINGERPRINT (continued)

• To reduce the search time and computational complexity, it is


desirable to classify fingerprints in an accurate and consistent
manner so that the input fingerprint is required to be matched
only with a subset of the fingerprints in the database.
• Special algorithms have been developed to classify fingerprints
into five classes, namely, whorl, right loop, left loop, arch, and
tented arch.
• Most often used in forensics, rarely in authentication systems

Source: biometrics.cse.msu.edu/info.html

22 03 June 2008 Bell Restricted


FINGERPRINT (continued)

Source: Various websites

23 03 June 2008 Bell Restricted


FINGERPRINT (continued)

US
Dime

Source: Protective Technologies Website

24 03 June 2008 Bell Restricted


HAND/FINGER GEOMETRY READERS

• The first modern biometric device was a hand


geometry reader that measured finger length
• These devices use a 3D or stereo camera to map
images of the hands and/or fingers to measure size,
shape and translucency
• Actual sensor devices are quite large in size
• Templates are typically small (approx 10 Bytes)
• High acceptance rate among users

25 03 June 2008 Bell Restricted


HAND/FINGER GEOMETRY (continued)

Source: Biometrics Store Website

Source: biometrics.cse.msu.edu/info.html
Source: http://recognitionsystems.schlage.com/products/

26 03 June 2008 Bell Restricted


FACIAL RECOGNITION

• Considered by some as an intrusive system


• Uses high resolution cameras (several types) to take
pictures of the face for comparison
• The four primary methods traditionally employed by
facial scan vendors to identify and verify subjects
include eigenfaces, feature analysis, neural network,
and automatic face processing
• New systems are being developed that measure three
dimensional characteristics of the face
• One of the fastest growing areas in biometric
industry

27 03 June 2008 Bell Restricted


FACIAL (continued)

Typical Eigenfaces
Utilizes two dimensional,
global grayscale images
representing distinctive
characteristics of
a facial image
Variations of eigenface are
frequently used as the basis of
other face recognition methods.

Source: MIT Face Recognition Demo Page

28 03 June 2008 Bell Restricted


FACIAL (continued)
• Eigenface: "one's own face," a technology patented at MIT that
uses 2D global grayscale images representing distinctive
characteristics of a facial image. Most faces can be reconstructed
by combining features of 100-125 eigenfaces. During enrollment,
the user's eigenface is mapped to a series of numbers
(coefficients). Upon a 1:1 match, a "live" template is matched
against the enrolled template to obtain a coefficient variation. This
variation either accepts or rejects the user.
• Local Feature Analysis (LFA): also a 2D technology, though more
capable of accommodating changes in appearance or facial aspect
(e.g., smiling, frowning). LFA uses dozens of features from
different regions of the face; incorporates the location of these
features. Relative distances and angles of the "building blocks" of
the face are measured. LFA can accommodate 25-degree angles in
the horizontal plane and 15 degrees in the vertical plane. LFA is a
derivative of the eigenface method and was developed by
Visionics, Corp.

29 03 June 2008 Bell Restricted


FACIAL (continued)

• Automatic Face Processing (AFP): This 2D technology uses


distances and distance ratios between eyes, nose, and corners
of mouth. Not as robust as the other technologies, but may be
more affective in dimly lit, frontal image capture situations.
• Neural Networks: use algorithms that use as much of the face as
possible. These algorithms run as the human brain would in
cognition to learn about facial features. Neural networks are a
step up from LFA.

30 03 June 2008 Bell Restricted


FACIAL (continued)

• New Volumetric-based 3D Processing Systems: Create a template


of the face that is based on tens-of-thousands of points on the
face, thus forming a very high-resolution interpretation of the
subject.
– A 3D laser camera takes a picture of the face and represents it within a
virtual cube.
• The input starts as a digital image and does not need to be
converted
– The secret to a true 3D method lies in the ability to use direct
measurements to compare individuals.
• That is, rather than the traditional method of an indirect search
for facial features on an image, these systems look at specific
points within a millimeter apart..

31 03 June 2008 Bell Restricted


FACIAL (continued)

• Varying light (i.e. outdoors) can affect accuracy


• Some systems can compensate for minor changes
such as puffiness and water retention
• Smiling, frowning, etc can affect accuracy
• Some systems can be confused by glasses, beards,
etc
• Human faces vary dramatically over long term
(aging) and short term (facial hair growth, different
hair styles, plastic surgery)
• Expected high rate of acceptance as people are
already used to being photographed or monitored
• Best method for identification systems (e.g. airports)

32 03 June 2008 Bell Restricted


FACIAL (continued)

Source: MIT Face Recognition Demo Page

Source: biometrics.cse.msu.edu/info.html

33 03 June 2008 Bell Restricted


RETINA SCANNERS

• Rely on the uniqueness of the pattern of blood


vessels lining the retina
• Users place their eyes a few inches from an
incandescent light beam and the sensor maps the
capillary pattern by measuring reflected light
• People with high blood pressure, diabetes or
glaucoma may give inconsistent readings
• Template aprox 35 Bytes and extremely reliable
• Primary use is in high security access control

34 03 June 2008 Bell Restricted


RETINA SCANNERS (continued)

Camera Enrollment device

Source: Biometrics Store Website

35 03 June 2008 Bell Restricted


RETINA SCANNERS (continued)

Main retina features Actual photo of retina

Source: American Academy of Ophthalmology

36 03 June 2008 Bell Restricted


IRIS SCANNERS

• High resolution cameras capture image from up to 3 feet


away (usually 10 to 12 inches)
• Converts picture of the distinctive fibers, furrows, flecks,
crypts, rifts, pits and coronas of the iris into a bar-code
like identifier
• Template around 256 Bytes in size
• Human iris is distinct with 250 differentiating features
• The recognition of irises by their IrisCodes is based
upon the failure of a test of statistical independence.
– Any given IrisCode is statistically guaranteed to pass a test of
independence against any IrisCode computed from a different
eye; but it will uniquely fail this same test against the eye from
which it was computed. Thus the key to iris recognition is the
failure of a test of statistical independence.

37 03 June 2008 Bell Restricted


IRIS (continued)

• Idea for iris scanning has been around since 1936


• Processing time is very quick (less than 2 secs)
• Does not use any special beams or lighting instead
uses a camera with a high quality lens
• Works well with people wearing contact lenses or
glasses and at night with normal lighting
• Advances in refractive and cataract surgery and
cornea transplants don't change iris’ aspects

Note: New contact lenses with artificial iris patterns, etc. have potential to defeat these
systems, however, security mechanisms can be built in to protect against these attacks
(i.e. perform “liveness” tests)

38 03 June 2008 Bell Restricted


IRIS (continued)

Source: American Academy of Ophthalmology

39 03 June 2008 Bell Restricted


IRIS (continued)
– Upon location of the iris, as seen below, an algorithm uses 2-D Gabor
wavelets to filter and map segments of the iris into hundreds of vectors
(known here as phasors).
– Understanding in detail the 2-D Gabor phasor encoders requires a
degree in advanced mathematics, but they can be summarized as
follows.
• The wavelets of various sizes
assign values drawn from the
orientation and spatial frequency
of select areas, bluntly referred
to as the "what" of the sub-
image, along with the position of
these areas, bluntly referred to as
the "where."
• The "what" and "where" are used
to form the IrisCode.
• Not all of the iris is used
Source: American Academy of Ophthalmology

40 03 June 2008 Bell Restricted


IRIS (continued)

Enrollment Screens

Source: American Academy of Ophthalmology

41 03 June 2008 Bell Restricted


IRIS (continued)

Condominium residents
in Tokyo gain entry to
the building by their iris
patterns, and the elevator
is automatically called
and programmed to
bring them to their
residential floor.

Source: biometrics.cse.msu.edu/info.html

42 03 June 2008 Bell Restricted


IRIS (continued)

Frequent Flyers at
Schiphol Airport (NL)
may enroll in the
"Privium" programme,
enabling them to enter
The Netherlands without
passport presentation.
Instead they are
recognised by an iris
camera, avoiding lines
and delays at
Immigration Control.
Source: biometrics.cse.msu.edu/info.html

43 03 June 2008 Bell Restricted


IRIS (continued)
This picture shows the Takhtabaig Voluntary
Repatriation Centre, on the Pakistan-Afghan
The United Nations High
border. Commission for Refugees
administers cash grants to
refugees returning into
Afghanistan from
surrounding countries after
the fall of the Taleban,
using iris patterns in lieu of
any other forms of
identification. More than
350,000 persons have so
Source: biometrics.cse.msu.edu/info.html
far been processed by this
program using iris
recognition.
44 03 June 2008 Bell Restricted
DNA TESTING
• Perhaps the ultimate identifier (what about
twins/clones?)
– Recent cloning experiments raise questions about its
suitability as a unique identifier
– Identical twins have identical DNA
• Obviously very intrusive
• Not practical for everyday authentication or
verification, only for very high stakes situations
– Criminal forensics
– Paternity
• Process is currently not automated
• Time intensive
– Process takes from 2-4 hours

45 03 June 2008 Bell Restricted


VOICE VERIFICATION
• A completely non-intrusive technique
• Examines tonal wave patterns that cannot be imitated
by other individuals (voice patterns of impersonators
are different than the real voice pattern)
• Analog recordings cannot reproduce accurate tone
patterns, but digital recordings may be able to do so
– Random question and answer techniques, and pattern
matching (i.e. comparing successive voice samples) may
help to prevent reply attacks based on digital voice
recordings
• Most appropriate method for telephone use
• People with colds & laryngitis can affect FRR
– although slight variations can be compensated for
• Signal quality can introduce errors (e.g. bad phone
line, noise in background)

46 03 June 2008 Bell Restricted


VOICE VERIFICATION (continued)
A complete signal has an
overall pattern, as well as a
much finer structure, called
the frame. This frame is the
essence of voice verification
technology.

It is these well-formed, regular


patterns that are unique to
every individual. These patterns
are created from the size and
shape of the physical structure
of a person's vocal tract. Since
no two vocal tracts are exactly
the same, no two signal
patterns can be the same.

47 03 June 2008 Bell Restricted


VOICE VERIFICATION (continued)

Hard palate Tongue

These unique features Soft palate Nasal

consist of cadence, Cavity

pitch, tone, harmonics, Phayngeal Nostral


cavity Lip

and shape of vocal tract. Larynx


Teeth

Oral (or
Buccal)

The image at right Esophagus Cavity

shows how Jaw

characteristics of voice Trachea

actually involve much Lung

more of the body than Diaphram

just the mouth.

48 03 June 2008 Bell Restricted


SIGNATURE ANALYSIS

• These devices quantify speed, pressure, angle-of-


attack and stroke characteristics (40 plus)
• A typical system will take up to 100 elements of
speed, pressure, etc to characterize an individual
• User stress can affect the accuracy of this device
• Signatures tend to change over time
• These types of devices are now starting to make their
way into practical everyday use

49 03 June 2008 Bell Restricted


SIGNATURE ANALYSIS (continued)

Built-in sensors register the dynamics of the act of writing. These dynamics include
the 3D-forces that are applied, the speed of writing, and the angles in various
directions.

This signing pattern is unique for each individual, and thus allows for strong
authentication. It also protects against fraud since it is practically impossible to
duplicate "how" someone signs.
Source: Biometrics Store Website and Smart Pen

50 03 June 2008 Bell Restricted


KEYSTROKE DYNAMICS

• These devices sample typing patterns up to one


thousand times per second and continuously keep
track of the speed, sequence and rhythm of a users
typing
• Both NIST and the National Science Foundation
studies have shown that typing patterns are unique
• Verification occurs seamlessly as the person types
• Still in research and development phase

51 03 June 2008 Bell Restricted


OTHER TYPES OF DEVICES

• Systems that measure body odor


• Systems that measure knuckle creases
• Palm-vein and wrist-vein recognition systems
• Acoustic head measurement devices
• Researchers are continually looking for the ideal
biometric device…one that is universally applicable,
totally non-intrusive, inexpensive, provides
continuos authentication and is extremely accurate

52 03 June 2008 Bell Restricted


MULTIMODAL SYSTEMS
• A biometric system which
relies only on a single
biometric identifier in
making a personal
identification is often not
able to meet the desired
performance requirements.
• Identification based on
multiple biometrics
represents an emerging
trend.

Cepstral analysis - A collection of nonlinear techniques


used in a variety of signal processing applications. A
Cepstrum simplifies a complex signal and identifies the
source of components that are related by a common
difference in frequency.
The Hidden Markov Model (HMM) is a finite set of
states, each of which is associated with a (generally Source: Pattern Recognition and Image Processing Lab - Dept of Computer Science And Engineering, MSU
multidimensional) probability distribution.

53 03 June 2008 Bell Restricted


COMPARISON CHART

(c) Copyright 2001 International Biometric Group

54 03 June 2008 Bell Restricted


BIOMETRICS TESTING

• Statistical/theoretical vs. in-use testing


– International Biometric Group (IBG) testing
• Common Criteria Evaluation
• SCC-SC37 – Biometrics Work Group
• Problems/issues with current test procedures

55 03 June 2008 Bell Restricted


SOCIAL ISSUES (negative)

• Privacy office in Toronto once ruled facial


recognition too invasive because it inadvertently
captured gender, race, age and ethnicity
• Many people are afraid eye scans are unsafe
• Fears that fingerprint devices will enable others to
capture their actual print prevent many people from
accepting the technology
• TV & movies often give faulty image of biometrics
devices and biometrics technology in general
• Many believe biometrics will be our demise (e.g.
doomsday prophesies, religious groups)

56 03 June 2008 Bell Restricted


NEGATIVE ISSUES (continued)

• Some opthamologists warn that a simple retina scan


could indicate that a person has AIDS or uses drugs,
which may have severe privacy impact
• The prospect of interoperable networked databases of
biometric data raises concerns that our templates can
be bought and sold like SIN and credit card numbers,
but unlike those, we cannot change our biometric
characteristics if they become compromised
• Belief that biometric systems are way to difficult and
expensive to implement
• Fears that criminals, etc., will cut off victim’s fingers
and hands or take out eyeballs to defeat systems
based on these technologies

57 03 June 2008 Bell Restricted


NEGATIVE ISSUES (continued)

• In any large scenario some portion of the general


population is likely to be physiologically unable to use
one or more technique
• Certain cultures and religions prohibit or look with
great disfavor upon photographing of individuals.
• One of the most frightening concerns is that these
systems will be used to constantly track us as
individuals by govt., police, etc.
• People value their privacy and fear this technology will
inhibit their ability to preserve their anonymity while
undertaking certain transactions (e.g. buying XXX
videos)
• Biometrics may lead to personal profiling by marketing
and other groups

58 03 June 2008 Bell Restricted


SOCIAL ISSUES (positive)

• People are frustrated having to remember several


passwords and PINs for each system
• Truly non-intrusive continuos systems will allow us
to work without distraction
• Biometric mechanisms will enable the detection of
individuals who are abusing current systems
• Biometric identifiers can’t be forgotten, lost or stolen
as is the case with keys, passwords and tokens
• Implemented correctly will improve security and
privacy

59 03 June 2008 Bell Restricted


PRIVACY RATINGS
• The BioPrivacy Technology Risk Ratings assesses the
privacy risks of leading biometric technologies in four key
areas:
– Verification/identification. Technologies most capable of robust
identification are rated higher; technologies only capable of
verification are rated lower.
– Overt/covert. Technologies capable of operating without user
knowledge or consent are rated higher; technologies, which only
operate through user consent, are rated lower.
– Behavioral/physiological. Technologies based on unchanging
physiological characteristics are rated higher; technologies based
on variable behavioral characteristics are rated lower.
– Give/grab. Technologies in which the system acquires ("grabs")
user images without the user initiating a sequence are rated
higher; technologies in which the user "gives" biometric data are
rated lower.
60 03 June 2008 Bell Restricted
PRIVACY RATINGS (continued)

• Technologies are rated Low, Medium, and High in each of


these categories.
– Low: Little privacy risk. The basic functionality of the technology
ensures that there are few if any privacy issues
– Medium: Potential privacy risk. The technology could be used in
a privacy-invasive fashion, but the range of potential misuse is
limited
– High: Moderate privacy risk. For certain types of deployments,
proper protections must be in place to ensure that the technology
is not misused

61 03 June 2008 Bell Restricted


PRIVACY RATINGS (continued)

(c) Copyright 2001 International Biometric Group

62 03 June 2008 Bell Restricted


PRIVACY RATINGS (continued)

By adhering to Best Practices, even those technologies more capable of being misused - primarily facial-
scan and finger-scan - can be deployed in a very privacy-protective fashion. (c) Copyright 2001 International Biometric Group

63 03 June 2008 Bell Restricted


LEGAL AND POLITICAL ISSUES

• Biometric Privacy Protection Acts are being


developed in efforts to control the storage,
collection, use and distribution of biometric data
• Standards are just in the early stages of
development/adoption
• Because biometrics technology is not 100%
foolproof, what legal implications does it have (e.g.
for an individual found guilty of a crime and
sentenced to death on a charge based mainly on
biometric identification)
• The legalities of doing business using biometric
signatures has yet to be worked out

64 03 June 2008 Bell Restricted


CANADIAN PUBLIC OPINION

• Most Canadians do not understand what biometrics are,


but think the government should use them to prevent
prospective immigrants from using bogus identity
documents to enter the country, according to a poll
obtained by The Globe and Mail.
• Fraudulent identity documents are a "very serious
problem" and biometrics should be used to prevent
people from abusing government programs, including the
immigration and refugee systems, said more than half the
respondents in the Ipsos Reid survey conducted for
Citizenship and Immigration Canada.
• "Four out of five Canadians believe that by the end of this
decade, it is likely almost every adult Canadian will have
at least one biometric ID on file to verify their identity,"
the survey notes. ( Source: www.theglobeandmail.com )

65 03 June 2008 Bell Restricted


EXAMPLE IMPLEMENTATIONS

• Otay Mesa, California/Mexico border crossing


– facial recognition of drivers who frequently cross border
• Japanese Racing Association
– uses iris scanning to identify over 10,000 race horses
• Walt Disney World, Florida
– seasons ticket holders gain entrance by finger geometry
• Coca Cola is using hand geometry to prevent
workers from “buddy punching”at the time clock
• Lotus employees must pass hand geometry scan
before picking up their kids at the company daycare

66 03 June 2008 Bell Restricted


IMPLEMENTATIONS (continued)

• Several states use voice recognition for parolees on home


detention
• US Immigration and Naturalization Service
– Frequent travelers between Canada and Montana use voice
verification to access an automated border crossing system
• A leading ATM manufacturer in Tokyo, OKI Electric
Industry Co has implemented iris scanners in ATM
machines of Japanese banks
• ICAO using facial recognition as mandatory identifier and
fingerprints & iris as optional identifiers on MRTDs
• Aeroplan – Voice Recognition System for Account Access

67 03 June 2008 Bell Restricted


IMPLEMENTATIONS (continued)

• Terminal 3 at Pierson Airport uses hand geometry to


identify frequent travelers between US and Canada
• Canadian Airlines uses voice recognition to control
access at two of its hangars
• Citizenship and Immigration Canada - $3.5 million
biometric pilot project
• Transport Canada and the Canadian Air Transport
Security Authority (CATSA) new restricted area
identification card
• Facial Recognition Project at the Passport Office
• Bell Canada – Maintenance Technician Voice
Verification
• Bell Canada – Client Account Access Voice Verification
(“My voice is my password”)

68 03 June 2008 Bell Restricted


Summary

• Today's powerful computers and microelectronics make biometric


identification and verification systems a reality
• Biometric advocates still face uphill battle to convince the skeptical
public, legislators, lawyers & security professionals that systems are
safe, reliable and worth implementing
• In the aftermath of 9/11, Biometrics has seen a resurgence in
interest and is now being seriously considered by governments and
other organizations as part of their solution for ensuring the identity
of individuals and protecting their assets
• Biometrics by itself is not the solution, only one part of it
• Biometrics has the potential to be utilized in any application where
authentication and verification is required and it is only a question of
time before we start to see these systems used in our daily lives
• Use of Biometrics is not the main contributor to security and privacy
risks, only the inappropriate or inadequate implementation of it is

69 03 June 2008 Bell Restricted


QUESTIONS

70 03 June 2008 Bell Restricted


REFERENCE SITES

• http://www.biometrics.org
• http://www.biometricidforum.org/
• www.recogsys.com
• www.iriscan.com
• www.infosecuritymag.com
• http://iosoftware.com
• www.biodigest.com
• www.biometritech.com
• www.ibia.org
• http://www.nationalbiometric.org/
• http://www.biometrics.dod.mil/
• http://www.biometricgroup.com/
• http://www.speechtechmag.com/

71 03 June 2008 Bell Restricted

Você também pode gostar