biometric systems

19
Welcome To Our presentation

Upload: sn-moddho

Post on 10-Aug-2015

59 views

Category:

Software


2 download

TRANSCRIPT

Page 1: Biometric Systems

Welcome To Our presentation

Page 2: Biometric Systems

Prepared by

Group Of MIRRORS

Page 3: Biometric Systems

“Biometric Systems”

Presentation Topic

Page 4: Biometric Systems

•Biometric Systems are automated methods of verifying or recognizing the identity of a living person on the basis of some physiological characteristics, like a fingerprint or face pattern, or some aspects of behavior, like handwriting or keystroke patterns. Some of the most used biometric characteristics are shown in the picture below. A biometric system based on physiological characteristics is more reliable than one which adopts behavioral features, even if the latter may be easier to integrate within certain specific applications.

Introduction

Page 5: Biometric Systems

1.2.1.1 Broad Objective • The broad objective of this report is to exploring the Biometric systems

application in management.

1.2.1.2 Specific Objectives

• To find out the internal and external Biometric systems application in management • To identify the Biometric systems.• To identify the depth of knowledge of the employee who serve.• How Biometric systems deals with future course of action of pre-

determined goals.• How Biometric systems helps to achievement of organizational goal. • To know Biometric systems facilities for various management.

Objectives:

Page 6: Biometric Systems

2.2.1 Population: The population of this research project is defined as fallow:  A. Element: Existing some clients of Biometric systems.B. Unit: Individual clients of Biometric systems.C. Extent: Al over the world.D. Time: 28 Nov 2014 to 06 Feb 2015. 2.2.2 Data sources The information and data for this report have been collected from both the primary and secondary sources. a. Primary Data Sources

b. Secondary Data Sources

2.2.3 Data collection Method

Relevant data for this report will be collected primarily by direct investigations of different records, papers, documents, operational process and different personnel.

Methodology of the Study:

Page 7: Biometric Systems

Biometrics is an authentication method that uses fingerprint or facial scans and iris or voice recognition to identify users. A biometric scanning device takes a user's biometric data, such as an iris pattern or fingerprint scan, and converts it into digital information a computer can interpret and verify. Since it is more difficult for a malicious hacker to gain access to a person's biometric data, and it is unlikely that a user will.

A biometric system is a technological system that uses information about a person (or other biological organism) to identify that person. Biometric systems rely on specific data about unique biological traits in order to work effectively. A biometric system will involve running data through algorithms for a particular result, usually related to a positive identification of a user or other individual.

BIOMETRIC SYSTEMS

Page 8: Biometric Systems

Biometrics systems work by recording and comparing biometric characteristics. In many cases, characteristics are recorded as images, but for speaker recognition a waveform is recorded, and for signature recognition, time series data.  For efficiency reasons, rather than using recorded characteristics directly, it is usual to extract identifying features from the samples and encode these features in a form that facilitates storage and comparison.

When an individual first uses a biometric system, their identifying features are enrolled as a reference for future comparison. This reference may be stored in a central database or on a card (or both) depending on the needs of the application.When biometric recognition is required, the individual's biometric characteristics are recorded again. This time however, the identifying features are compared by the system with the stored reference to determine if there is a close match.

Work of biometric systems:

Page 9: Biometric Systems

Types of Biometrics:

Page 10: Biometric Systems

Accurate Identification

Accountability Easy and Safe for

Use Time Saving User Friendly

Systems Security Convenience Versatility Scalability Return on

Investment

Biometric System in Management

Page 11: Biometric Systems

1 Unique: The various biometrics systems have been developed around unique characteristics of individuals. The probability of 2 people sharing the same biometric data is virtually nil.

2 Cannot be shared: Because a biometric property is an intrinsic property of an individual, it is extremely difficult to duplicate or share (you cannot give a copy of your face or your hand to someone!).

3 Cannot be copied: Biometric characteristics are nearly impossible to forge or spoof, especially with new technologies ensuring that the biometric being identified is from a live person.

4 Cannot be lost: A biometric property of an individual can be lost only in case of serious accident.

Biometrics secure for Management

Page 12: Biometric Systems

The Biometric System may easily be applicable to Library System Management in three ways:

It maintains library patron records very quickly, accurately, orderly.

It acts as a helpful management tool for the librarian and other managerial staff of the library.

It may continue for years together without any further adding cost after its installation.

Biometric System in Library

Page 13: Biometric Systems

The major library areas where the biometric system can be used successfully:

• Gate Checking

• Circulation Section

• Stack Entry Record

• Internet Searching

The day-to-day library operation and managements may easily be covered with the application and use of biometric system. Some of the major areas are: Surveillance Staff Attendance Staff movement record Staff-Computer Automatic Recognition:

Biometric System in Library

Page 14: Biometric Systems

Evidence PlantingCopyingTechnical Vulnerability--Unauthorized Use

Locks are More Economical

A Subtle Presumption Undermined

Notoriously Expensive Privacy

Major Finding

Page 15: Biometric Systems

SWOT Analysis of Biometric systems

Page 16: Biometric Systems

RECOMMENDATION

Information types :biometric systems convert analog information into digital information that computers can read. Though difficult to do, just like any other authentication credential, digital data captured from biometrics systems can be sniffed along the wire of insecure networks and then replayed for malicious access.

  Very difficult: Biometric imprints that are more esoteric and harder to duplicate

present the least risk of compromise. Iris patterns or electrophysiological signals are very difficult to duplicate, making devices using this type of biometrics harder to crack.

  Can duplicates: Fingerprints, on the other hand, can be lifted from an everyday

object and used to gain access to a fingerprint reader. Fingerprints can also be copied and molded into gooey material, like chewing gum or putty. The same goes for voice and facial recognition, which can be recorded or photographed to create duplicates for fooling biometric systems.

  Typing speed: Other biometrics devices, such as the Bio-Password, measures a

user's typing speed and style to create a unique profile.  Secure servers: Despite the different levels of risk for different biometrics

systems, the best recommendation is to remain device agnostic. Also make sure all biometric data is stored on dedicated and secure servers to block malicious access..

  Encrypted: Also, make sure biometric data, like other sensitive data, is encrypted

in transit from the biometrics device to the directory or database housing the authentication credentials.

 

Page 17: Biometric Systems

Concluding Remarks

Biometrics is not a panacea. Implementation should be the result of cost/benefit analysis stemming from a risk assessment. However, regulatory constraints sometimes make our decision easy. The only thing possible at that point is to select the solution that makes sense.Making sense, or the reasonable and appropriate implementation of biometrics, includes consideration of several factors.

Understand the limitations of the target operating environments.

Ensure the overall security context supports reference template safety.

Understand the probability of forgery and match it to the importance of that which you are trying to protect.

Do not implement a biometrics solution that exposes business processes to a potential business continuity event in the form of sensor or backend authentication server loss.

Ask each vendor to provide reasonable proof of error rates for the products proposed.

Always consider how users might receive the new systems.

Page 18: Biometric Systems

Have you any question?

Page 19: Biometric Systems

Thank you