Bioslimdisk Presentation V1.1

Post on 02-Nov-2014

705 views 1 download

Tags:

description

 

Transcript of Bioslimdisk Presentation V1.1

BioSlimDiskpresentation v1.1

RiTech International LtdProduct (Signature)Website www.bioslimdisk.com

Marcus ChanDate: 14th August 2009

Overview

• Company Profile

• Biometric Technology

• Bioslimdisk Signature

© RiTech International Ltd, Confidential & Proprietary2

COMPANY PROFILE

RiTech International Ltd

© RiTech International Ltd, Confidential & Proprietary4

• Ritech was established in 1994 as Designer, developer, manufacturer and distributor of innovative products, services & systems in the area of biometrics security and portable data storage.

• Specializes in biometrics security technology with in-house R&D.

• Overseas operation network: Malaysia, Hong Kong, China, India and Europe.

Vision

First Choice Solution provider in the Biometric security industry

© RiTech International Ltd, Confidential & Proprietary5

Biometric

Process

Algorithms

Implementation knowledge

Customised Solutions

Ergonomics and desgin

Sensors

ObjectivesAdvanced Research and Development• Biometrics products for portable information

storage and transportation• Biometrics products for Intellectual Property

Protection• Biometrics products for secure identification

over networks• Biometrics products for as a secure

replacement over existing keys, cards, password which tend to be a burden

© RiTech International Ltd, Confidential & Proprietary6

BIOMETRIC TECHNOLOGY

What is Biometric?

The Science of measuring

and statistically analyzing

biological data

© RiTech International Ltd, Confidential & Proprietary8

What is Biometric?

Biometric Technology

Authentication can be divided into three different factors:

• something you know • something you have • something you are

© RiTech International Ltd, Confidential & Proprietary9

Something you know

Common• Pin Numbers/Code• Learn it , You have to remember the

Code Number• Forced to memorize passwords

Disadvantage:-Software hacking tools via internet, easy to steal by anyone. (e.g. Keylogger)

© RiTech International Ltd, Confidential & Proprietary10

Something you have

Example Smart cards • Cash Card• ATM Card• Visa/Master Card• Door/Building Access Card

Disadvantage:-If picked up by anyone, it can still be used. (e.g. Paying at a Petrol Station)

© RiTech International Ltd, Confidential & Proprietary11

Something you are

Biometrics is what you are!

What you have:1. Your Finger > Fingerprint 2. You cannot loose it3. You cannot give it away

You cannot tell a friend to use your prints.

© RiTech International Ltd, Confidential & Proprietary12

Types of Biometric

1. BEHAVIOURAL– Voice Patterns– Signature Verification– Key Stroke Patterns (Signatures)

2. PHYSIOLOGICAL– Fingerprints– Hand Geometry– Retinal & Iris Scanning– Facial Recognition– DNA Fingerprinting

© RiTech International Ltd, Confidential & Proprietary13

Biometric Comparison

Comparison of various biometric technologiesIt is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters:

• Universality => each person should have the characteristic• Uniqueness => is how well the biometric separates individually

from another.• Permanence => measures how well a biometric resists aging.• Collectability => ease of acquisition for measurement.• Performance => accuracy, speed, and robustness of

technology used.• Acceptability => degree of approval of a technology.• Circumvention => ease of use of a substitute.

© RiTech International Ltd, Confidential & Proprietary14

Biometric Comparison

Comparison of various biometric technologies, modified from Jain et al., 2004 (H=High, M=Medium, L=Low)

Biometrics: Universality Uniqueness Permanence Collectability Performance Acceptability Circumvention

Face H L M H L H LFingerprint M H H M H M HHand geometry M M M H M M MKeystrokes L L L M L M MHand veins M M M M M M HIris H H H M H L HRetinal scan H H M L H L HSignature L L L H L H LVoice M L L M L H LFacial thermograph

H H L H M H H

Odor H H H L L M LDNA H H H L H L LGait M L L H L H MEar Canal M M H M M H M

© RiTech International Ltd, Confidential & Proprietary15

Comparison of existing biometric systems

Fingerprint Identification

Minutiae Definition• Form of Fingerprint

• Number of Lines

• Distance Between Marks

© RiTech International Ltd, Confidential & Proprietary16

Processing & Identification

FingerprintHow many minutiae are needed for comparison?

–Generally, a complete fingerprint is made up of up to 100 minutiae

–Fingerprint recognition normally requires 20~30 minutiae for processing

© RiTech International Ltd, Confidential & Proprietary17

The Biometrics’ Dilemma

© RiTech International Ltd, Confidential & Proprietary18

Biometric Advantages

© RiTech International Ltd, Confidential & Proprietary19

Copy Theft Forgotten LostKey

Badge

PIN Code

BiometricFeature

Advantages of Biometricsfor Access Control

X X X XX X X

X X-

- - - -

- -

BIOSLIMDISK SIGNATURE

21

WHY?

• Threat of data theft is real and costly• Affects employees negatively• Affects company negatively• Loss of productivity and credibility• Loss of profits and sustainability

© RiTech International Ltd, Confidential & Proprietary

HOW?

• Physical theft and hackingActual device is stolen and tapped for data

• Social engineeringPasswords or access keys can be coaxed

• Virtual hacking and theftPopular method of data theft

• Man-in-the-Middle attacksSpying and snooping on communications

© RiTech International Ltd, Confidential & Proprietary22

Securing Data

Signature can meet security challenges withTamper-proof with self-destruct functionFingerprint recognition (biometric)Built-in AES-128 bit data encryptionFeatures to protect user identificationNo passwords during usage

© RiTech International Ltd, Confidential & Proprietary23

Safekeeping

Self Destruct FeatureActivated when tampering is detectedAll data drive is destroyedKeeps confidential data out of reach

No backdoor accessNo password or function to reset securityOnly valid fingerprints are allowed access

© RiTech International Ltd, Confidential & Proprietary24

Hardware Benefits

AES-128bit hardware encryptionKeys never leave SignatureAvoids tapping/snooping of keysAll data on drive is encryptedOn the fly encrypt and decrypt

Totally hardware-basedResistant to software-based attacksSecurity methods are encapsulated in hardware

© RiTech International Ltd, Confidential & Proprietary25

Protecting Fingerprints

Dual-finger authentication Reduces latent fingerprint

copy Intruder requires 2 unique

fingerprints

Limiting fingerprint retries Intruder has less time to guess correct

fingerprint Limits tries and time for correct fingerprint

© RiTech International Ltd, Confidential & Proprietary26

Convenience

• Anti-static rubberized casingHard to copy fingerprints on deviceLess dust attraction to protect sensor

• Cross platform compatibilityNo further software or software neededWorks in Windows, MAC, Linux, Solaris, etc.

© RiTech International Ltd, Confidential & Proprietary27

Unique Service

• Our technology is mature and battletestedOur company is the leader in this field

• Quick response to security breachesProduct is constantly updated

• Customization to end usersSecurity tokens, 3rd party software

© RiTech International Ltd, Confidential & Proprietary28

Summary of Features

1) Dual-Finger Authentication

2) Unique Self Destruct

3) Hardware Crypto AES-128bit

4) Worldwide Patents AwardedUnited Kingdom, Netherlands, Germany, France, China, Hong Kong, Singapore, Malaysia and many more.

© RiTech International Ltd, Confidential & Proprietary29

END