Biometrics - Then, Now and the Future

20
Biometrics •Introduction •History of Biometrics •Types of Biometrics •Biometrics in the Public and Private Sector •Biometrics and Consumer •Biometrics and Practical Application •Privacy Concerns •Disadvantages •Limitations •Conclusion Jennifer Cummins, Michael Curran, Yannick Hebert

description

Algonquin College Powerpoint Presentation

Transcript of Biometrics - Then, Now and the Future

  • 1.Introduction Identifying individuals Using unique physical attributes Keeping valuables secure

2. Introduction The benefits in businesses Other methods arent as reliable Biometrics is the highest level of security 3. History of Biometrics Origins back to 200 BC Alphonse Bertillon, Bertillonage The introduction of fingerprints 4. History of Biometrics Sir Francis Galtons classification system The advancement of biometrics Biometric databases are international 5. Types of Biometrics Records basic information about user Sensor captures unique traits about ID Computer stores data for later use 6. Types of Biometrics Physiological: Face Fingerprint Hand Iris DNABehavioral: Keystroke Signature Voice 7. Biometrics in the Public and Private SectorHigh Level Security and Access Control Traditional means are difficult to control48%3% have shared passwordsleft password written down 8. Biometrics and Consumer ApplicationEliminate concerns with identity theft Nobody is immune41,496 complaints of Identity Theft 9. Biometrics and Consumer ApplicationEnsure personal security, including: Home Office Car Financial Transactions Personal effects (laptop, safe, etc.) 10. Biometrics and Consumer Application iPhone 5S New technology is currently being developed: Eye Verify Accu-Time Bionym 11. Biometrics and Practical ApplicationBiometric technology on election day Only eligible votes cast a ballot 12. Biometrics and Practical Application NEXUS Program for pre-approved travelers Iris recognition kiosks 13. Biometrics and Practical Application Faster movement through border security Cost reduction for Canada Border Services Instructions provided to avoid error 14. Privacy Concerns Biometric information not stored on systems Converted into code for later use 15. Disadvantages Software and hardware failures User difficulties High start-up cost 16. Limitations Physical anomalies cause temporary difficulties Research will provide adaptive solutions 17. Conclusion Advantages outweigh disadvantages Significant return on investment Continued research required 18. Sources Time Systems. (n.d.). Body As Credential. Retrieved October 28, 2013 from: http://www.accutime.com/Body%20As%20Credential Apple Support. (2013). About Touch ID security. Retrieved on October 23 rd 2013 from http://support.apple.com Applied Biometrics. (n.d.) Implementing Biometrics. Retrieved on October 20th 2013 from http://www.appliedbiometrics.co.uk Biometrics. (n.d.). Dictionary.com Unabridged. Retrieved October 26, 2013, from http://dictionary.reference.com/browse/biometrics Canada Border Services Agency (n.d.). General NEXUS Questions. Retrieved on October 20 th, 2013 from http://www.cbsaasfc.gc.ca/prog/nexus/faq-eng.html Canadian Anti-Fraud Centre Annual Statistics Report (2012). Canadian Anti-Fraud Centre. Retrieved from http://www.antifraudcentre-centreantifraude.ca Garrett, M. (2013, September 9). Payroll Fraud - A Big Threat and How to Avoid It. Forbes. Retrieved from www.forbes.com Griaule Biometrics (2008). Understanding Biometrics. Retrieved from http://www.griaulebiometrics.com/enus/book/understanding-biometrics Iritech Inc. (n.d.) Frequently Asked Questions. Retrieved on October 23rd, 2013 from www.iritech.com. Melton, M. (2013, September 19). Cant Afford The Biometrically Enhanced iPhone 5? Try EyeVerify!. Retrieved October 28, 2013, from: http://www.activistpost.com/2013/09/cant-afford-biometrically-enhanced.html Moore, G. (2009, March). History of biometrics. Retrieved from http://onin.com/fp/fphistory.html Rubens, P. (2012, August 17). Biometric Authentication: How It Works. eSecurity Planet. Retrieved from www.esecurityplanet.com Ruz, C. (2013, July 17). Preventing fraud in African elections. International Science Grid This Week. Retrieved from http://www.isgtw.org Stinson, L. (2013, September 11). This Little Wristband Will Replace Your Passwords With Your Heartbeat. Retrieved October 28, 2013 from http://www.wired.com/design/2013/09/this-little-wristband-wants-to-replace-your-passwords-and-keys-with-yourheartbeat/ Van Allen, F. (2013, August 8). Google Reveals the 10 Worst Password Ideas. Time Tech. Retrieved from http://techland.time.com Wilson, T. (2005, November 11). How Biometrics Works. How Stuff Works. Retrieved from science.howstuffworks.com/biometrics.htm Zalman, A. (n.d.). History of Biometrics. About.com. Retrieved from http://terrorism.about.com/od/issuestrends/tp/History-ofBiometrics.htm