Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
biometrics
1.
2. Outline
Introduction
Biometrics techniques
Strengths, and weaknesses
FAR/FRR
Major Players
Summary
3. What Is Biometrics ?
Biometrics is the reading of a unique human
physical attribute as data, which is then
applied to authenticate a system.
Passwords -“something we know”
Tokens and Cards –”something we possess”
(e.g., ID cards, smart cards, digital certificates)
Biometrics –”something that is part of
us”
(e.g., retina scan, fingerprints, facial recognition )
6. Retinal
Scanning
User Looks Into a
Viewer and
Focuses on a Point;
Infrared Light
Scans Retina
Iris Scanning
User looks at a camera
(distance from camera
increasing rapidly to
2-3 feet)
9. User Looks at Camera , it is based on the
face geometry
10. SIGNATURE RECOGNITION
This is done by analyzing the shape,
speed, stroke, pen pressure and timing
information during the act of signing.
11. Other Techniques
Voice Recognition & DSV
User speaks into a microphone or other
device, such as a telephone handset
Keystroke Recognition
User types standard sample
on keyboard
12. Strengths, and Weakness
Retina
Iris
Fingerprint
Hand/Finger Geometry
Face Recognition
Voice Recognition
Signature Recognition
Keystroke Recognition
13. Technique Strengths
Retina Highly accurate
Iris Highly accurate; works with
eyeglasses; more acceptable to
users than retina scan
Fingerprint Mature technology; highly
accurate; low cost; small size,
becoming widely acceptable
Hand/Finger Geometry accurate and flexible; widely
acceptable to users
Face Recognition Widely acceptable to users; low
cost; no direct contact; passive
monitoring possible
Voice Recognition Usable over existing telephone
system; good for remote access
and monitoring;
Signature Recognition Widely acceptable to users
Keystroke Recognition Widely acceptable to users; low
cost; uses existing hardware
14. Technique Weaknesses
Retina Inconvenient for persons with
eyeglasses; dislike contact with
device and light beam
Iris New technology, cost, although
this is rapidly changing
Fingerprint Users can create high FRR; some
persons dislike contact with
device
Hand/Finger Geometry User interface is bulky; dislike
contact with device
Face Recognition Face recognition is less accurate
than other methods
Voice Recognition Less accuracy; subject to
background noise
Signature Recognition Less accuracy; not widely used
yet, but has potential with PDAs
Keystroke Recognition Less accuracy;
15. FAR & FRR
FAR(False Acceptance rate) – refers to how
often the system accepts someone it should
reject
AND
FRR(False Rejection Rate) is how often the
system rejects someone it shouldn’t.
17. Summary
As biometric technology advances, the cost of systems
will decrease.
At the same time, biometrics systems will become
increasingly sophisticated and accurate.
Scientist will physical and behavioral traits will
increase the usefulness of biometrics.
The general public will gradually come to accept
biometric system.
Notas do Editor
Computer Access Securing computer and network access is one of the most common uses of biometric devices. As financial data, medical records and other personal information becomes the target of attack, biometric systems can remove the risk of passwords being shared, stolen or guessed. Physical Access As security and privacy becomes more important for employers, government, parents and others, biometrics is increasingly being seen as an acceptable solution. Around the world hospitals, military facilities, government buildings and offices are employing biometric access solutions to minimize security threats. Time and Attendance Biometric systems are being used as a replacement for the traditional punch-card system of clocking-in and clocking-out. Replacing the manual process with biometrics prevents abuse of the system. Time management software provides attendance reports. This solution can be combined with a physical access system to restrict access certain areas without the risk of keys, proximity cards or door access codes being lost or shared. Handheld devices As handheld device usage increase amongst executives, sales people and health-care professionals, organizations are focusing on how to protect the confidential data on them from falling into the wrong hands. Dynamic signature verification is proving itself as an important tool for securing access to pen-based devices and PDAs. National Security Governments around the world are beginning to use biometrics to identify citizens and prevent fraud during elections. These systems often involve storing a biometric template, typically a fingerprint scan, on a card that acts as a national identity card. Telecommunications With the rapid growth of call centers, telephone banking and telephone ordering systems, users are struggling to remember the number of user IDs and PINs required to access these systems. To combat this, voice-recognition systems are being used to provide access control without the need to remember personal access codes.