Welcome To High Five Corp. Bring your Thumb and have some Fun
!!
Slide 4
Our Team ! Katie Vicki Bill Doc
Slide 5
Topics to discuss with you! How High Five can help your Theme
Park ? Keeping your family safe. Saving you money What our security
team can do for you What the family will get for doing their thumb
print.
Slide 6
Problem Shared admission passes creates financial losses for
the park resulting in increased costs to patrons.
Slide 7
Proposed Solution Eliminate cards and use hand scans for
admission. Patrons must scan their hands for entrance into the park
and then scan themselves out as they leave. They cannot rescan for
entry until they scan out. Will prevent the passing of cards to
friends and family members. Only the patron may enter with their
hand scan.
Slide 8
Family Plan The cost for the family for a year pass 10% off of
any clothes at the theme park 30% off of any Food item Free Drinks
[Soda only] Fast Passes for the rides
Slide 9
BIOMETRICS Derives its meaning from Greek bios and metron
meaning life measure
Slide 10
Background on Biometrics Biometrics First introduced in the
1970s and early 1980s This technology gathers unique physiological
or behavioral attributes of a person for storing it in a database
or comparing it with one already found in a database. Reason for
biometrics include the positive authentication and verification of
a person and ensuring confidentiality of information in storage or
in transit
Slide 11
Biometrics 2 Categories of Biometrics Physiological also known
as static biometrics: Biometrics based on data derived from the
measurement of a part of a persons anatomy. For example,
fingerprints and iris patterns, as well as facial features, hand
geometry and retinal blood vessels Behavioral biometrics based on
data derived from measurement of an action performed by a person
and, distinctively, incorporating time as a metric, that is, the
measured action. For example, voice (speaker verification)
Slide 12
Overview of Biometrics Biometric Acquisition
DeviceSampleFeature Extracted IrisInfrared-enabled video camera, PC
camera Black and white iris imageFurrows and striations of iris
FingerprintDesktop peripheral, PC card, mouse chip or reader
embedded in keyboard Fingerprint image (optical, silicon,
ultrasound or touchless) Location and direction of ridge endings
and bifurcations on fingerprint, minutiae VoiceMicrophone,
telephoneVoice RecordingFrequency, cadence and duration of vocal
pattern SignatureSignature Tablet, Motion- sensitive stylus Image
of Signature and record of related dynamics measurement Speed,
stroke order, pressure and appearance of signature FaceVideo
Camera, PC camera, single-image camera Facial image (optical or
thermal) Relative position and shape of nose, position of
cheekbones HandProprietary Wall-mounted unit 3-D image of top and
sides of hand Height and width of bones and joints in hands and
fingers RetinaProprietary desktop or wall mountable unit Retina
ImageBlood vessel patterns and retina
Slide 13
Biometrics How do they work? Although biometric technologies
differ, they all work in a similar fashion: The user submits a
sample that is an identifiable, unprocessed image or recording of
the physiological or behavioral biometric via an acquisition device
(for example, a scanner or camera) This biometric is then processed
to extract information about distinctive features to create a trial
template or verification template Templates are large number
sequences. The trial template is the users password.
Slide 14
Usability issues in Biometrics User acceptability Knowledge of
technology Familiarity with biometric characteristic Experience
with device
Slide 15
Biometric solutions Educate Train Explain Interfaces Use
Trainers Supervised Playtime.PRACTICE
Slide 16
Promise that Biometrics hold for Privacy Increased Security
Biometric cannot be lost, stolen or forgotten; it cannot be written
down and stolen by social re-engineering By implementing biometrics
organizations can positively verify users identities, improving
personal accountability
Slide 17
Perils that Biometrics hold for Privacy Privacy is one of the
leading inhibitor for biometrics technology. Main issues: Misuse of
Data Health/Lifestyle Specific biometric data has been linked with
the information beyond which it is set out to be used. Is a person
able to control the information gathered on himself/herself?
Function Creep Law Enforcement The template database may be
available for law enforcement Credit Reporting The template
database may be cross referenced against other databases including
those held in hospitals and the police departments, by a credit
reporting agency
Slide 18
Future Trends in Biometrics Body Odor Body odor can be
digitally recorded for identification. A British company, Mastiff
Electronic System Ltd. Is working on such a system DNA Matching The
is the ultimate biometric technology that can produce proof
positive identification of an individual Keystroke Dynamics
Keystroke dynamics, also referred to as typing rhythms, is an
innovative biometric technology
Slide 19
Comparison of Different Biometrics Technology
Slide 20
Biometric Comparison
Slide 21
Banking Security - ATM security,card transaction Physical
Access Control (e.g. Airport) Information System Security National
ID Systems Passport control (INSPASS) Prisoner, prison visitors,
inmate control Voting Identification of Criminals Identification of
missing children Various Applications for fingerprinting
technology
Slide 22
Fingerprinting technology Strengths: most mature biometric
technology accepted reliability many vendors sensors are
small-space saving Perceived weakness: association with criminal
justice
Slide 23
Fingerprint Sensors
Slide 24
Optical Silicon Based Capacitive Sensors Ultrasound
Thermal
Slide 25
COMMONLY IDENTIFIED DISADVANTAGES OF FINGERPRINTING Problems
Dirt, grime and wounds Placement of finger Solutions Employee
Training Hand washing stations Scan both hands Instructional videos
provided at entrances and scanners
Slide 26
Artificially created Biometrics Attack at the Database
Attacking Via Input Port Attacks on Biometric Systems
Slide 27
The goal of an attack Steal data Blackmail Bragging rights
Vandalism Demonstrate vulnerability/satisfy curiosity Damage
company reputation Get into the park for free!
Slide 28
Spoofing:- The process of defeating a biometric system through
the introduction of fake biometric samples. Examples of spoof
attacks on a fingerprint recognition system are lifted latent
fingerprints and artificial fingers. Examples of spoofed fingers.
Put subjects finger in impression material and create a mold. Molds
can also be created from latent fingerprints by photographic
etching techniques like those used in making of PCB (gummy
fingers). Use play-doh, gelatin, or other suitable material to cast
a fake finger. Worst-case scenario: dead fingers.
Attacks-contd..
Slide 29
Hardware Solution Temperature sensing, detection of pulsation
on fingertip, pulse oximetry, electrical conductivity, ECG, etc.
Software Solution (Research going on) Live fingers as opposed to
spoofed or cadaverous fingers show some kind of moisture pattern
due to perspiration. The main idea behind this method is to take
two prints after a time frame of say 5 seconds and the algorithm
makes a final decision based on the vitality of the fingerprint.
Attacks-solutions..
Slide 30
Conclusion A balance between Security and Privacy must be
achieved!
Slide 31
Your Unique Fingerprint Fingerprints begin forming in the 10 th
week of fetal development and are fully determined by week 17
Ridges and valleys are a result of The DNA code which determines
the way in which the skin of a fetus forms Environmental factors of
the uterus during formation Position of the fetus Density and
composition of the amniotic fluid Even identical twins will have
variations in fingerprints due to the influence of the environment
of the uterus and their random position at the time of
formation
Slide 32
Leaving a Print Each friction ridge contains pores that are
attached to sweat glands These glands produce a water and oil
solution that Coats the ridges Is transferred to surfaces when
touched Amount of oil can affect the scan Too much (from hand
lotion and the like) can be removed by washing Too little (from dry
skin) can be remedied by rubbing the fingertips across the palm,
forehead, or bridge of the nose
Slide 33
Analyzing Fingerprints Trained analysts can determine the
minute differences between two prints Fingerprint analysts and
engineers worked together to develop a system to quickly and easily
make comparisons Scanners to collect fingerprints Hardware to store
the data Software to make comparisons and calculations of
similarities between images
Slide 34
Types of Scanners: Optical Optical (similar to a digital
camera) A picture is taken with the finger on a glass plate An
array of light sensitive diodes illuminate the ridges and valleys
Overall clarity and definition are checked Exposure is changed if
necessary to correct light/dark contrast or to sharpen edges
Capacitance scanners use electric current instead of light to
determine the fingerprint pattern
Slide 35
Types of Scanners: Capacitance Use tiny electrical chips that
measure differences in electric capacitance based on distance
Ridges are closer, while valleys are farther away The difference in
distance creates a difference in voltage and capacitance that can
be measured The processor then uses the differences from each of
the chips in the array to develop a picture of the fingerprint More
secure because it requires the actual shape of the ridges and
valleys instead of just the pattern
Slide 36
Major Feature Classification Loops Begin on one side of the
finger, curve around or upward, and exit the other side 65% of
people have loop fingerprints Arches Slope upward and then down
More narrow than a loop 5% of people have arch fingerprints Whorls
Form a circular or spiral pattern 30% are whorls The arrangement,
shape, size and number of lines of the same pattern can help to
distinguish one from another
Slide 37
Identity Verification The software uses complex algorithms to
compare specific tiny features of the fingerprint (known as
minutiae) To get a match, the system finds a sufficient number of
features and minutiae patterns that the two prints have in common
It also verifies that their relative locations are a match The more
points required, the more secure
Slide 38
Distinguishing between Individuals Examples of identifying
features Loops and rods Ellipse Spiral Tented arch Island
Bifurcations (branches) Minutiae such as the intersection of
bifurcations, ending points of islands and the center points of
sweat glands
Additional Benefits Reduced financial losses due to shared and
stolen passes Finger scans for fast-pass Further reduction of wait
time Can be linked to an online cash account so patrons do not need
to carry cash or credit cards while in the park Discounts can be
applied to in-park purchases for those who use the finger scan
instead of cash or credit; resulting in shorter lines for food and
drink.
Slide 41
Accuracy Most researched and developed of all biometric options
Low error rate The fingerprint identification process has a 98%+
identification rate and the false positive identification rate is
less than 1%. Within a typical fingerprint image obtained by a live
scan device, there is an average of 30-40 minutiae. The Federal
Bureau of Investigation (FBI) has shown that no two individuals can
have more than 8 common minutiae. The U.S. Court system has
consistently allowed testimony based on 12 matching minutiae; in
some courts, a lower number of matching minutiae have been allowed.
Bioconsulting.com, 1996
Slide 42
User Acceptability Has a high user acceptability rating CA DMV
study showed that there was a 96.48% favorable public response to
Fingerprints vs. a 93.44% favorable response for Retinal Scan. CA
DMV study notes that, of all the people approached to participate
in the DMV project, 2,515 refused to participate in Retinal Scan
while only 619 refused to participate in Fingerprint.
Bioconsulting.com, 1996
Slide 43
Other Biometrics Retinal scans may not work because of ambient
light Voice recognition may not work because of ambient noise
Facial recognition will not work due to levels of scans DNA is too
hazardous and too slow
Slide 44
Success Story Who: 24-Hour Fitness What: Enter 10 digit check
in code, scan finger Why: Convenience-no cards or cash required
Security-eliminates lost and stolen cards, only members can access
gyms Green focus: eliminates a lot of paper and plastic waste from
card production How: Scan both index fingers in case one hand is
occupied or injured 24hourfitness.com, 2011
Slide 45
Success Story They do not store clients finger prints, instead
they partnered with MorphoTrak, a leader in the biometric industry,
to develop this convenient new way to check into their clubs. By
scanning the clients finger, they chart the distance between a few
distinct points that are unique to each individual and come up with
an identifying number based on those distances. They do not store a
fingerprint, nor can the data they store be re-created into a
fingerprint image. 24hourfitness.com, 2011
Slide 46
Success Story 24hourfitness.com, 2011
Slide 47
Sources 24 Hour Fitness. FAQs [homepage on the Internet]. (CA):
24 Hour Fitness; n.d. [date accessed 2011 July 9]. Available from:
http://www.24hourfitness.com/company/faq/.
http://www.24hourfitness.com/company/faq/ Britt R R. Lasting
Impressions: How Fingerprints are Created [homepage on the
Internet]. Live Science; 2004 Nov. 2. [date accessed 2011 July 10].
Available from:
http://www.livescience.com/30-lasting-impression-fingerprints-created.html.http://www.livescience.com/30-lasting-impression-fingerprints-created.html
Bromba M U. Biometrics FAQ [homepage on the Internet]. Dr. Manfred
Bromba; 2010 Dec. 24. [date accessed 2011 July 9]. Available from:
http://www.bromba.com/faq/biofaqe.htm#Besten.http://www.bromba.com/faq/biofaqe.htm#Besten
Fingerprint Facts [homepage on the Internet]. Sense Technologies;
2001. [date accessed 2011 July 10]. Available from:
http://www.senseme.com/scripts/biometrics/fingerprints.htm. Harbour
K. WV BIOMETRICS: Fertile ground for innovation [homepage on the
Internet]. Charleston (WV): West Virginia Department of Commerce;
2011. [date accessed 2011 July 9]. Available from:
http://www.wvcommerce.org/business/industries/biometrics/fertileground.aspx.
http://www.wvcommerce.org/business/industries/biometrics/fertileground.aspx
Harris T. How Fingerprint Scanners Work [homepage on the Internet].
How Stuff Works, Inc.; n.d. [date accessed 2011 July 9]. Available
from: http://computer.howstuffworks.com/fingerprint-scanner.htm.
IBGweb, Find Biometrics. Fingerprint Recognition [homepage on the
Internet]. BiometricsInfo.org; n.d. [date accessed 2011 July 9].
Available from:
http://www.biometricsinfo.org/fingerprintrecognition.htm.http://www.biometricsinfo.org/fingerprintrecognition.htm
Kirubanandan S. Biometrics and Authentication [homepage on the
Internet]. n.d. [date accessed 2011 July 9]. Available from:
cups.cs.cmu.edu/courses/ups-sp07/slides/070327-biometrics.ppt.
Podio F L, Dunn J S. Biometric Authentication Technology: From the
Movies to Your [homepage on the Internet]. National Institute of
Standards and Technology; n.d. [date accessed 2011 July 10].
Available from:
http://www.itl.nist.gov/div893/biometrics/Biometricsfromthemovies.pdf.
Ruggles T. Comparison of Biometric Techniques [homepage on the
Internet]. 2002 July 10. [date accessed 2011 July 9]. Available
from:
http://www.bioconsulting.com/bio.htm.http://www.bioconsulting.com/bio.htm
Tynan D. Biometrics: From Reel to Real [homepage on the Internet].
PC World Magazine; 2011. [date accessed 2011 July 9]. Available
from: http://pcworld.about.com/news/May182005id120889.htm.. Watson
S. How Fingerprinting Works [homepage on the Internet]. How Stuff
Works, Inc.; n.d. [date accessed 2011 July 9]. Available from:
http://science.howstuffworks.com/fingerprinting.htm. Wilson O.
Privacy & Identity - Security and Usability: The Viability of
Passwords & Biometrics [homepage on the Internet]. Chicago
(IL): n.d. [date accessed 2011 July 9]. Available from:
facweb.cs.depaul.edu/research/vc/ciplit2004/ppt/Orville_Wilson.ppt.
Wilson T V. How Biometrics Works [homepage on the Internet]. How
Stuff Works, Inc; n.d. [date accessed 2011 July 9]. Available from:
http://science.howstuffworks.com/biometrics2.htm.