biometric security mobile
TRANSCRIPT
![Page 1: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/1.jpg)
Biometric Security
for MobileTHE “WHO YOU ARE” OF AUTHENTICATION
JERRY RUGGIERI / CITIZENS BANK
1
![Page 2: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/2.jpg)
All Authentication Options
What you know, e.g. password
What you have, e.g. soft- or hard-token
Who you are, e.g. any biometric
How you behave, e.g. adaptive
authentication
2
![Page 3: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/3.jpg)
PasswordsYour password is “dinosaur”
October 2013 – Adobe announces 38 M passwords are compromised
Password hints posted in cleartext
Passwords not salted
Days later they’re posted online and many are soon broken
June 2012 – LinkedIn announces 7M of 150M passwords stolen
Passwords not salted
Days later they’re posted online and …
Customers using same password for Facebook, garage door openers, and banking
Passwords heavily re-used or shared
Passwords have to be remembered (and typed)
Passwords can be “cracked” (recovered)
3
![Page 4: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/4.jpg)
Biometric Authentication Methods 4
![Page 5: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/5.jpg)
Biometric Categories 5
![Page 6: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/6.jpg)
Facial Recognition
Pro’s
Convenient
Liveness Test
Con’s
Lighting condition requirement
Can be faked with static and/or animated gif from
public photos
Repudiation
6
![Page 7: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/7.jpg)
Fingerprint Pro’s
EER of around 1%
Convenience
Liveness Test
Non-repudiation
Con’s
Specialized Hardware
Finger cleanliness
Cuts to finger
Angle or pressure of placement
Biometric privacy concerns
Fingerprints can be captured easily
Search for “MythBusters Fingerprints Busted” on YouTube
7
![Page 8: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/8.jpg)
Voice Pro’s
Convenience
Cost
EER of around 2-3%
Liveness Test
Non-repudiation
Can be authenticated remotely
Con’s
Cold or illness affecting voice
Environmental noise
Behavioral or temporal speaking differences
User education or awareness to use
8
![Page 9: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/9.jpg)
Biometric Evaluation Factors Accuracy Factors
False Acceptance Rate (FAR)
False Rejection Rate (FRR)
Equal Error Rate (EER)
Failure To Enroll (FTE)
Failure To Capture (FTC)
Security
Usability
Integration
Cost
Privacy and Regulatory Factors
9
![Page 10: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/10.jpg)
Equal Error Rate Curve 10
![Page 11: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/11.jpg)
11
![Page 12: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/12.jpg)
Apple’s Fingerprint Hardware 12
![Page 13: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/13.jpg)
True Speaker Recordings 13
![Page 14: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/14.jpg)
Imposter Speaker Recordings 14
![Page 15: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/15.jpg)
Enrollment, Authentication Process 15
![Page 16: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/16.jpg)
Biometric Distance for Imposters 16
![Page 17: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/17.jpg)
Voice Biometric Use Cases Use Cases
Fast Balance
Step up authentication option
Online Account Opening
Login authentication
Male v. Female voices
Male frequency 85-180 Hz
Female frequency 165-255 Hz
We hear frequency as the pitch
Double the frequency we perceive it as “twice as high”
17
![Page 18: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/18.jpg)
VoiceKeyID™ AlgorithmAuthenticates in ½ second
Runs on device, no servers needed
Configurable for low FAR (False Acceptance Rate)
Multi-lingual, any language or song or repeatable gibberish will work
Requires 10-12 syllables or 4-6 seconds of speech
Robustness against recorded attacks
Low Failure To Enroll Errors
Low Storage Requirement (50-100KB)
Secure Storage
Can identify forced failure attempts and deny them
Available for use anywhere in apps
Patent protected in US and China
18
![Page 19: Biometric Security Mobile](https://reader034.vdocuments.mx/reader034/viewer/2022051213/55c3605fbb61eb1f308b45bc/html5/thumbnails/19.jpg)
19VoiceKeyID™ Demo App