Iridian Technologies, Inc Moorestown, NJ USA Iridian Technologies, SA Geneva, Switzerland
description
Transcript of Iridian Technologies, Inc Moorestown, NJ USA Iridian Technologies, SA Geneva, Switzerland
Iridian Technologies, IncMoorestown, NJ USA
Iridian Technologies, SAGeneva, Switzerland
856-222-9090866-IRIDIAN (U.S. & Canada)
www.iridiantech.com
The New Look of Security.
Iridian Technologies, IncIris recognition biometric software
• Privately held• Incorporated 1990, began operations 1993• Merged with Sensar Inc, July 2000• WW headquarters located in Moorestown, NJ• Iridian Technologies SA headquartered in
Geneva, Switzerland• Holds numerous US & international software
patents
Iris
The New Look of Security.
You’ve Probably Heard About Us• Schiphol Airport, Amsterdam*• Heathrow Airport, London• Canadian Airports, Ottawa• Atlanta, Knoxville, Frankfurt• S-Travel, Zurich Switzerland• Singapore/Malaysia borders• The Hajj pilgrimage, Saudi Arabia• US-FAA Secure Executive Toolset• Defense, Army, Navy, data centers, correctional
facilities, public utilities
* Access & border crossing implemented by Schiphol Group, CMG, and Joh Enschede
The Afghan Girl
The New Look of Security.
The Netherlands• “Privium” implemented by the Schiphol Group, JESS,
and CMG– $89 charge, convenient parking at Schiphol, lounge access
• Installed kiosks and turnstiles using 1:1 verification via a smart card
• Used to enter and exit country– Includes one-stop immigration and security lane during exit
• As of March 2002, 2,000+ enrolled, averaging 10,000 transactions per month
The New Look of Security.
Canada• Iridian’s iris recognition technology and
certified hardware/software were specified in recent CCRA EPPS RFP– Implementation expected to begin Summer 2002
in 2 airports growing to 8• Similar user design as The Netherlands
except central database enrollmentIridian’s iris recognition being tested “to meet the Canadian government’srequirement for technology aimed at EPPS, an Expedited Passenger Processing System. EPPS will eventually allow pre-approved travelersto clear customs more smoothly.” - The Ottawa Citizen March 5, 2002
The New Look of Security.
User authentication is the key to a business’ secure physical and logical perimeters.
Traditional security devices or procedures allow the user to be the weakest link in the security model.
Positive authentication is needed because it enables authorization and administration procedures.
Iris Recognition delivers positive authentication.
The New Look of Security.
Source: The New Yorker
The New Look of Security.
Security-Privacy-Convenience
No America E ME A Asia
3. Security
2. Privacy
1. Convenience 1. Security
2. Privacy
3. Convenience
1. Security
3. Privacy
2. Convenience
Before September 11, 2001
The New Look of Security.
Security-Privacy-Convenience
No America E ME A Asia
1. Security
2/3. Privacy
2/3. Convenience
1. Security
2. Privacy
3. Convenience
1. Security
3. Privacy
2. Convenience
Post September 11, 2001
The New Look of Security.
To Conduct Secure Business
1. Authenticate the point of entry– At the sender & receiver nodes– At the door or gate
2. Authorize the action– Privilege the “right” to gain access
3. Administer the policies– Secure the data transport– Database management with privacy
* Access & border crossing implemented by Schiphol Group, CMG, and Joh Enschede
The New Look of Security.
Biometric Types• Iris Recognition – uses a video camera to pinpoint the
independent coordinates of the iris of the eye
• Face – defines a dozen or so points on the face and measures the distance between them
• Fingerprints – looks for pattern ends and their changes in direction
• Hand – measures the size and angles of a person’s hand features
• Voice – analyzes the sound waves and speech patterns of a recorded voice
• Others – signature, retinal scan, keyboard
The New Look of Security.
How to Measure a Biometric
• False Acceptance Rate (FAR) – accepting users who it shouldn’t accept
• False Rejection Rate (FRR) – rejecting users who it should accept
• Outlier Population – the percentage of people who cannot use the biometric because they do not have the characteristic
• Storage and Matching - the business application should determine to use either verification or identification or both
The New Look of Security.
AuthenticationALL biometrics can verify• Verification asks: “Does this live record match a particular stored
value?”– It requires a password or PIN or token to suggest a pointer, then the
system verifies the match.• Verification answers: “It is or is not a match.”Iris Recognition identifies• Identification asks: “WHO is this person?”
– It does not require a password or PIN or token because it finds the person by doing an exhaustive search of the database.
• Identification answers: – “This is so-and-so” OR– “This record is valid and is approved for processing”
The New Look of Security.
Security and Privacy can be Balanced if
• The biometric and application align– Iris recognition requires user participation – “opt-in”– Some biometrics are passive
• Data integrity is assured- In systems architecture- In the template- In transactions- In storage
• Data managers follow policies
The New Look of Security.
The Iris is NOT the Retina
Sclera
IrisAqueousHumor
Cornea
Ciliary Muscle Retina
Choroid
OpticNerve
Lens
The New Look of Security.
How Iris Recognition Works
1. Uses a video image of the iris2. Analyzes the iris patterns, preparation for secure
transport
3. Creates a 512 byte IrisCodeR template to describe the patterns
4. Matches the code to all IrisCodes in a database/file5. Accepts or rejects individual
The New Look of Security.
Common Platform
WalkupPhysical AccessKioskGate/Perimeters
DesktopInformation AccessSingle Sign On/OffDomain Log-on
NetworkNetworkNetwork
PersonalInformation AccessTransactionsSingle Sign On
The New Look of Security.
• Image capture and evaluation, image compression• Image security preparation for transport including
countermeasures and permutations• Offers 3DES encryption at API• Some cameras use PrivateID to support internet video
conferencing, video capture/editing, and video e-mail applications
• Drivers support multiple Windows versions• Using APIs, can be used with smart cards, passports,
LAN/WAN logon, digital document signing, e-commerce transaction authorization etc
Client or Camera Resident Software
The New Look of Security.
Secure Authentication Server• Accepts secured iris image from
PrivateidTM
• Creates IrisCodeR and performs matching algorithms
– Can perform identification (1:n) or verification (1:1)
• Offers 3DES encryption at API and database
– Supports Oracle or SQL db• Currently runs on NT 4.0, W2000
– Linux and Solaris shortly• Sold as whole unit or as a kit• Priced per user (1 user = 2
IrisCodesR)
ApplicationServers
ODBCDatabase
Oracle, MS-SQL
TCP/IP network
KnoWhoAuthentication
Server
Internet Connection
www
Windows Desktop
The New Look of Security.
LG IrisAccessTM 2200powered by xxxxxxxx
Walk-up ApplicationsFacility accessImmigration/airport securityData centersUtility & power plantsPrison book/releaseTime & attendance
BenefitsAudio instructionsAuto focusView 3 to 12 inchesSmall size
The New Look of Security.
Oki-Panasonic BM-ET500TM
powered by xxxxxxxx Walk-up ApplicationsImmigration/airport securityGate controlUtility & power plantsPrison book/releaseTime & attendance
BenefitsTwo-iris recognition Stand up to a meter awayAuto focusSurveillanceFace image capture
The New Look of Security.
Panasonic AuthenticamTM
powered by PrivateIDTM
Available at Enterprise Resellers
Desktop ApplicationsLocal logonDomain logonSingle Sign OnLAN administrationDesktop security
Benefits
Amber/green LEDView 19 to 21 inchesSmall sizeVideo conferencing
The New Look of Security.
Application Integration Architecture
The New Look of Security.
Partnerships
The New Look of Security.
To Conduct Secure Business
1. Authenticate the point of entry– At the sender & receiver nodes– At the door or gate
2. Authorize the action– Privilege the “right” to gain access
3. Administer the policies– Secure the data transport– Database management with privacy
Iris Recognition delivers positive authentication.