Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

Similar documents
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

The National Biometrics Challenge 2011 Update

5 th Annual Identity Management Symposium

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

Biometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange. LTC Eric Pavlick PM, Biometric Enabling Capabilities

Using Biometric Authentication to Elevate Enterprise Security

USE CASES. See how Polygon s Biometrid can be used in different usage settings

Biometric Standards for DoD Operational Requirements

Biometric Center of Excellence (BCOE)

Charter Pacific Biometrics Acquisition

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Biometric Use Case Models for Personal Identity Verification

Current Biometric Adoption and Trends

Identity Management Symposium

Introduction to Device Trust Architecture

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

5 th Annual Identity Management Symposium

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

National Counterterrorism Center

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

2016 Global Identity Summit Pre-Conference Paper The Identity Landscape

Put Identity at the Heart of Security

Duo End User Education Templates

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

Role of Biometrics in Cybersecurity. Sam Youness

VOICE BIOMETRICS. estilo de subtítulo del patrón Solutions

Smart Mobile Identity. Revolutionizing biometric identity verification

Mobile: Purely a Powerful Platform; Or Panacea?

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

CYBER SOLUTIONS & THREAT INTELLIGENCE

THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS

Biometric Security Roles & Resources

Advanced Biometric Access Control Training Course # :

TWIC Update to Sector Delaware Bay AMSC 8 June 2018

The European Union approach to Biometrics

Enabling Compliance for Physical and Cyber Security in Mobile Devices. Chip Epps & Daniel Bailin HID Global

Authentication Methods

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

TWIC Transportation Worker Identification Credential. Overview

2016 Global Identity Summit Pre-Conference Paper. Fingerprints

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

New CEPIS Mission

Interview with Fernando Podio Chair of ISO/IEC JTC 1 SC 37 Subcommittee on Biometrics

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

Applying biometric authentication to physical access control systems

Mobile Biometric Authentication: Pros and Cons of Server and Device-Based

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c

Identity & security CLOUDCARD+ When security meets convenience

Awareness as a Cyber Security Vulnerability. Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology

Voice and Speech Recognition

Biometrics Our Past, Present, and Future Identity

Data Breach Trends: What Local Government Lawyers Need to Know

NATIONAL INFORMATION SHARING STRATEGY

Gaining Business Value from IoT

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

Biometrics In Identity Management Concepts To Applications Artech House Information Security And Privacy

Identity and Access Management. Michael Sheketoff Senior Solutions Architect, Unisys Corp.

Syllabus: The syllabus is broadly structured as follows:

Face recognition for enhanced security.

Smart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities

2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012

NIST Tests Supporting Biometric Identification Applications

A Review of Emerging Biometric Authentication Technologies

Windows 10 edition. Find out which. is right for you. Core features. Familar, and better than ever Home Pro Enterprise Education Mobile.

IDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

JTC 1 SC 37 Biometrics International Standards

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES

Windows 10 listening tour. What is REALLY on the minds of our customers?

Identity Based Attestation and Open Exchange Protocol Specification (IBOPS) Architecture and Security

Who What Why

Executive Order & Presidential Policy Directive 21. Ed Goff, Duke Energy Melanie Seader, EEI

Windows 10 Why start migrating now!

RESEARCH REPORT. Published 2Q BOB LOCKHART Principal Analyst. CLINT WHEELOCK Managing Director

2016 Global Identity Summit Pre-Conference Paper Hardening Authentication Technologies

Biometrics. Overview of Authentication

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

Biometric Entry-Exit. July 11, 2017

HK ASTRI FinTech Initiative

The security challenge in a mobile world

GLOBAL PKI TRENDS STUDY

Higher Education Privacy Update

Cybersecurity Risk Management:

Singapore s National Digital Identity (NDI):

New Paradigms of Digital Identity:

TWIC / CAC Wiegand 58 bit format

BIOMETRIC IDENTITY AS-A-SERVICE (BIDAAS) -

Biometric Technology

UltraMatch. Standalone Iris Recognition System

Smart Card and Biometrics Used for Secured Personal Identification System Development

Mr. Michael Fitz PROGRAM MANAGER

Transcription:

Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com

Who are we? What do we do? The International Biometrics & Identification Association (IBIA) advances the adoption and responsible use of technologies for managing human identity to enhance security, privacy, productivity, and convenience for individuals, organizations, and governments. To effectively carry out its mission, IBIA focuses on three core activities: Advocacy, Connections and Education. https://www.ibia.org 2

Purpose of this Talk To provide an overview of biometrics technology and use cases to the audience of the Global Identity Summit To summarize major business trends in the biometrics industry To highlight examples of mass consumer adoption and commercialization of biometrics To discuss privacy concerns and cyber threats related to biometric data 3

Biometrics 101 What are biometrics? How does this technology work? How is biometric technology used? Where is biometric technology heading? What are the major business trends within the industry of biometrics? What affect will broader technology trends have on biometrics? 4

Biometrics: A Definition 5

Biometric Modalities Fingerprints Face Iris Speech (Voice) DNA 6

Fingerprints (Friction Ridges) 7

Face 8

Iris 9

Voice 10

DNA 11

Three Basic Functions Enroll Verify 1:1 12 Identify 1:N

Template Generation 13

Example of Fingerprint Template Y Ridge Branches Ridge Endings X Image Template 14

Searching and Matching 15

Fusion 16

Examples of Biometric Technology Each run requires 2 sample cartridges and 2 reagent cartridges. 17

Applications of Biometrics NGI / TWIC / USVISIT / DoS / DoD Border / Immigration Finance Industry Intel / SIGINT Intel / Defense / HLS smell Access Control (rare) Private Uses Checkpoints Forensics LE / Defense / Intel / HLS / Forensics LE/ Defense / HLS 18

Large Scale Federal Government Biometrics Related Programs IDENT BioVISA Passports TIDE 19 NGI ABIS

20 Back to the Future

21 Where did biometric technology go in 2015?

Private and Commercial Sectors Take Interest Electronic Payments Mobility Cyber/Big Data Breaches Cloud 22

23 Benefits of Biometrics: Security and Convenience in Cyber Space

The Challenge: Physical and Digital Convergence Gone Digital! Going Digital? Secure? Trustworthy? Simple? 24

Biometrics in the News NBC Today Show Iowa Starts Offering Digital Driver s Licenses September 7, 2015 Defense News US Special Operations Tests DNA Scanners May 20, 2015 25 The Economist Biometrics: Clocking People s Clocks Facial Recognition Systems are Getting Better August 23, 2014 NBC Today Show MasterCard to Allow Customers to Take a Selfie to Verify Online Payments July 7, 2015

Biometrics Matures into Digital Identification Technology 26

Where is this heading? DNA and Voice as biometric modalities will grow in importance over the next 5 years. Digital identity related technology will continue to proliferate across both public and private sectors. Select secure government identity tokens and credentials will go digital (ddl in Iowa and Delaware). Private companies will accelerate adoption of multi-factor authentication technologies. Persistent vetting and continuous evaluation will go mainstream. End-to-end, fully integrated, secure, simple, and trustworthy identity technologies are most effective. Cyber transactions will increasingly include a trustworthy identity component. Multi-modal biometric solutions will migrate to the cloud. 27

Thank you! Questions? Presented by The International Biometrics and Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com