biometrics - developing the architecture, api, encryption · pdf file ·...
TRANSCRIPT
![Page 1: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/1.jpg)
22nd NISS Conference
Submission: Tutorial
Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION ANDSECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO YOUREXISTING SYSTEMS
Keywords: Biometric(s), security, encryption, API, computer
Author: William H. Saito, President/CEO
Organization: I/O Software, Inc.1533 Spruce StreetRiverside, CA 92507
Phone: (909) 222-7600
Email: [email protected]
![Page 2: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/2.jpg)
ABSTRACT
DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITYINSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO YOUR EXISTING SYSTEMS
As the technology behind biometrics become cheaper and more reliable, many companies have begun to integratevarious biometrics into their existing security system. This workshop will explain how to implement and buildbiometric technology to augment current security systems while explaining specific issues that need to be addressed.
Designed to benefit both technical and non-technical professionals, this real world information will enabledevelopers to develop biometric solutions without compromising the intended security enhancement.
Seamlessly developing biometrics to enhance your existing security- Template storage and management issues- Template encryption issues- Security and integrity of biometric data from source to output- Potential security threats and solutions to them- Export restrictions regarding certain biometric implementations
Developing API's (Application Programming Interface)- Current status of the biometric API's- How to use and which is best for you?- API's and implementing a secure system- API's and non-PC platforms- Exploring template compatibility
Developing a common methodology for software developers looking to integrate biometrics into their applications- End user education- Making applications easier to use via biometrics- Common UI (User Interface) issues regarding biometrics- User enrollment problems and solutions- Client/Server programming issues to consider- Frequent error conditions and how to handle them- Audit and event logs issues while addressing privacy
![Page 3: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/3.jpg)
William SaitoWilliam Saito
President/CEOPresident/CEO
BiometricsBiometricsInstalling and Integrating Biometric Systems into your
Existing Systems
NISS Conference, October 18-21
![Page 4: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/4.jpg)
Company
• Founded in 1991
• Core Products & Technology– Device driver development & hardware integration
– Commercial biometric application development
– Biometric solution provider
• Original developer of BAPI
• BioAPI member– DWG (Device Working Group) Chair
• UAS Working Group member
![Page 5: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/5.jpg)
Biometrics 101
Choosing your biometric technology
![Page 6: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/6.jpg)
Why is biometrics important?
• What you know (i.e., password or PIN)– Insecure, can be forgotten, needs to be changed, can
easily be copied or given to others
• What you have (i.e., ID card or key)– Can be lost or copied (without your knowledge),
replacement costs are high
• What you are (i.e., fingerprints)– Only non-reputable authentication method.
Conclusively proves you are who you say you are
![Page 7: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/7.jpg)
Types of biometrics
• Fingerprint/Finger length
• Hand geometry
• Iris/Retina
• Facial image/Facial thermograms
• Voice
• Signature
• Keystroke
![Page 8: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/8.jpg)
Types of biometrics
• Physiological vs. behavioral characteristics– Physiological: Don’t change over time
(Fingerprint, hand, iris, etc..)
– Behavior: Change over time(Voice, signature)
• Interactive vs. Passive biometrics– Passive: Facial
![Page 9: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/9.jpg)
Trade offs
• Cost
• Security
• Size
• Convenience
• Speed
• Accuracy
• Connectivity & compatibility (ports/OS/CPU)
• Intrusiveness
![Page 10: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/10.jpg)
Selecting criteria
• Level of accuracy (A)
• Ease of use (B)
• Barrier to attack (C)
• Public acceptability (D)
• Long-term stability (E)
• Cost (F)
• Size (G)
![Page 11: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/11.jpg)
Biometrics technologies(Comparison)
• Finger A8 B8 C8 D7 E8 F5 G5
• Signature A4 B9 C4 D9 E4 F3 G3
• Hand A7 B7 C7 D7 E4 F7 G7
• Iris /Retina A9 B3 C8 D4 E7 F9 G9
• Facial A4 B5 C4 D8 E4 F4 G8
• Voice A7 B8 C4 D8 E5 F2 G2
(0=Very Low 5=Average 9=Very High)
(Black = Higher value is better / Red = Lower value is better)
![Page 12: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/12.jpg)
Biometric taxonomy
• Cooperative vs. Non-cooperative
• Overt vs. Covert
• Habituated vs. Non-habituated
• Supervised vs. Unsupervised
• Stable Environment vs. Unstable
• Optional vs. Mandatory
Biometrics do best in conditions of left column
![Page 13: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/13.jpg)
Types of applications
• Physical access
• Computer logon/logoff
• File encryption
• Client/Server
• Dumb terminals
• Internet / e-Commerce
• Smart cards
• PKI - Public Key Infrastructure
![Page 14: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/14.jpg)
How biometric devices work
![Page 15: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/15.jpg)
How biometrics work
• User enrollment
• Image capture
• Image processing
• Feature extraction
• Comparison– Verification
– Identification
![Page 16: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/16.jpg)
Templates
• Templates are usually not compatible betweenvendors
• Template size/type varies– 50 - 8000+ bytes
– Speed vs. accuracy vs. size
• Template types include:– Vectors
– Minutiae
![Page 17: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/17.jpg)
Image conversion
“Raw” Data Processed Data Template Data
èè
![Page 18: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/18.jpg)
Comparison methods
• Verification– 1:1 matching
– To verify that the person is who he says he is
• Identification– 1:n search
– To find a person out of many in a database
![Page 19: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/19.jpg)
Evolution of devices
![Page 20: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/20.jpg)
Fingerprint devices :Three Generations
• First Generation– Supervised
– Slow
– Bulky devices / heavy!
– Required calibration
– Not PC based
– Very expensive! (>$5K)
– Application: Criminal Enforcement
![Page 21: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/21.jpg)
Fingerprint devices :Three Generations
• Second Generation– Optical only devices
– High FRR and/or FAR
– Required some finger preparation
– Somewhat PC friendly development environment
– Expensive (>$1K)
– Applications:• Building access control
• High security computing in vertical applications
![Page 22: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/22.jpg)
Fingerprint devices :Three Generations
• Third Generation– Non optical based sensor
– First mass produced devices
– Fast, self-calibrating, encryption support, dead/fakefinger detection
– SDK’s available for PC’s
– Inexpensive (<$300)
– Applications:• General Purpose Computing
– Windows NT/95, UNIX
![Page 23: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/23.jpg)
Types of devices
![Page 24: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/24.jpg)
Device interfaces
• Various port types (and issues)– Composite video signal
– Parallel port (Pass through & ECP/EPP modes)
– Serial port (RS-232, RS-422, RS-485, etc..)
– USB port (NT support)
– PCMCIA port
– Weigand
• Transfer time / ease of integration
• Encryption
![Page 25: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/25.jpg)
Image capture component
• Resolution– 350 - 500+ dpi
• Sensor types & materials– Optical
– Capacitance
– Resistance
– Thermal
– Polymer
![Page 26: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/26.jpg)
Sensor comparisons
• Optical– Most bulky
– Distortion issues
– Dry finger problems
• Capacitance– ESD issues
– Surface strength issues
– Surface area limitations
• Thermal– Lowest surface area required
![Page 27: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/27.jpg)
Device sophistication
• Simple– Scanner (only)
– Scanner with encryption
• Processing (self-contained)– Scanner with CPU and/or LSI for fingerprint processing
– Scanner with CPU and memory for storage offingerprint (optional encryption)
• Complex– Scanner + CPU + protected storage for PKI type use
![Page 28: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/28.jpg)
Simple biometric devices
• Simple design / low-cost device
• No security
• All processing done on host PC
• Ideal for simple low security applications
Host (PC)
Image filtering algroithmMatching algorithm
Template stored on host
Biometric Device
Parallel PortCCD / SiSensor
A/DConverter
![Page 29: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/29.jpg)
Self-contained devices
• Device contains a lot of intelligence
• Communications encrypted to host
• Some or all processing done in device
• Ideal for physical access, smart cards andterminals
Host (PC)
Template:On device or host
Application:Authentication provider
Biometric Device
EncyptedSerial / USB Port
CCD / SiSensor
A/DConverter
CPU / LSI
RAM / Flash Memory
![Page 30: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/30.jpg)
Complex devices
• Devices are small and portable
• Templates and private keys (PKI) never leavedevice (storage is protected)
• Tamperproof (FIPS 140-1)
• Ideal for PKI (PKCS#11 - cryptoki) applications
Host (PC)Template:On device only
Application:Authentication providerPKCS#11 token provider
Biometric Device
EncyptedPCMCIA / USB Port
SiSensor
CPU / LSI
RSA/DESchip
Protected RAM / Flash
![Page 31: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/31.jpg)
Application suitability
![Page 32: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/32.jpg)
Tem
pla
te
Raw image
Client PC
Server
Client/Server
Fingerprint Reader
1. Finger scanned
2. Image converted A/D
Client PC
3. Image processingalgorithm
4. Template generation
Server
5. Template matchedwith enrolled image
6. If template matches,access is granted
![Page 33: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/33.jpg)
Smart card
Tem
pla
te
Data Center
Mat
ches
Card Card Info.
Card TerminalSmart card withfingerprint template
Terminal
1. Card is inserted2. Template is read fromcard3. Template(PIN) sent tofingerprint reader
Fingerprint Reader
4. Finger scanned5. Finger checked withuploaded template6. Sends PIN back toterminal
Server
7. Card data updated8. Updated informationsent to data center9. Transaction complete
![Page 34: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/34.jpg)
PKI
Requests Authentication
Workstation
Requests Cryptographic Services
PKI basedfingerprint device
Workstation
Certificate based website requests certificate
- or -E-mail application
requests private key
PKCS#11 Module
1. User authenticationrequested
4. Cryptographic servicesrequested -or- certificaterequested
Fingerprint Reader
2. Finger scanned3. Authentication tokenreturned to workstation
5. Cryptographicprovided to data -or-certificate returned
![Page 35: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/35.jpg)
Other device features
• Keypads & LED’s
• “Live finger” sensor
• Smart card integration
• Ergonomics
• Size
• Water resistance
![Page 36: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/36.jpg)
Other issues
• FCC, CE, UL certification
• Microsoft WHCL compatibility
• NS1 export approval
• CC1 export approval
• Federal Information Processing Standard– FIPS 140-1
• AFIS compatibility
![Page 37: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/37.jpg)
Biometric applications
![Page 38: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/38.jpg)
Biometric applications
• SecureSuite– Biometrically authenticated Windows 95/98/NT Logon
– Screen saver unlocking
– Password provider
– Hard disk encryption
– PKI, etc...
• Smart card (VeriFone)– Biometrically locking smart card contents
• Web / Internet Commerce (SecureWeb)
![Page 39: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/39.jpg)
SecureSuite
• SecureStart - Secure logon system for Windows 95/98/NT
• SecureFolder - Windows file / folder encryption application
• SecureSession - Windows password bank / provider
• SecureEntrust - PKI based authentication and encryptionprovider for Entrust
• SecureApp - Windows based application execution control
• SecureWeb - Customizable web server access control solution
![Page 40: Biometrics - Developing the Architecture, Api, Encryption · PDF file · 2017-07-1422 nd NISS Conference Submission: Tutorial Topic: BIOMETRICS - DEVELOPING THE ARCHITECTURE, API,](https://reader031.vdocuments.mx/reader031/viewer/2022021504/5aa1243e7f8b9a46238b5a5c/html5/thumbnails/40.jpg)
1533 Spruce St.
Riverside, CA 92507
(909) 222-7600
(909) 222-7601 FAX
Web: www.iosoftware.com
E-Mail: [email protected]