Biometric Security Roles & Resources Part 2 BIAS Cathy - - PowerPoint PPT Presentation

biometric security roles amp resources
SMART_READER_LITE
LIVE PREVIEW

Biometric Security Roles & Resources Part 2 BIAS Cathy - - PowerPoint PPT Presentation

Biometric Security Roles & Resources Part 2 BIAS Cathy Tilton Chair, BIAS Integration TC VP, Standards & Emerging Tech, Daon www.oasis-open.org Biometric Identity Assurance Services (BIAS) Biometric Applications


slide-1
SLIDE 1

Biometric Security – Roles & Resources

Part 2 – BIAS

Cathy Tilton – Chair, BIAS Integration TC VP, Standards & Emerging Tech, Daon

slide-2
SLIDE 2

www.oasis-open.org

Biometric Identity Assurance Services (BIAS)

In reviewing the current biometric-related standards

portfolio and service oriented architecture (SOA) references, it became apparent that a gap existed in the availability of standards related to biometric services.

Biometric Applications Biometric Resources

?

ANSI/NIST-ITL 1-2000/7 ? BioAPI/BIP ? Other ?

slide-3
SLIDE 3

www.oasis-open.org

Why now ?

Biometric systems and customers are becoming more

sophisticated

Increased interest in and utility of biometrics

Government & commercial, but mostly driven by the former

at present

Large, complex systems Enterprise architectures built on the SOA model & standards Emphasis on data sharing & reuse of resources/services The need for vendor independence, multiple sources

Departure from custom solutions Embracing of open systems, standards

New requirements for interoperability and flexibility

slide-4
SLIDE 4

www.oasis-open.org

BIAS – Driving Requirements

  • Provide ability to remotely invoke biometric operations across an

SOA infrastructure, decoupling the service from the interface (and requester) that calls it.

  • Provide business level operations, without constraining the

application/business logic that implements those operations.

  • Provide basic capabilities that can be used to construct higher

level, aggregate/composite operations.

  • Be as generic as possible – technology, framework, and

application domain independent.

slide-5
SLIDE 5

www.oasis-open.org

Context

  • Example Applications

Border management Credentialing Customer/subscriber identification

  • Example Resources

A fingerprint verification matching

server

A 1:N iris search/match engine A facial biometric watch list A criminal or civil automated

fingerprint identification system (AFIS)

A name-based biographic identity

database

An archive of biometric identifiers A population of subjects

Application Matcher Service Provider ID database

  • Authen. Server
slide-6
SLIDE 6

www.oasis-open.org

Person-Centric and Encounter-Centric Systems

slide-7
SLIDE 7

www.oasis-open.org

INCITS & OASIS Collaboration

  • Development of the BIAS standard requires expertise in two distinct

technology domains to ensure that the final specification provides the right structure, functionality, and technical details:

  • Biometrics, with standards leadership provided by INCITS M1
  • Service Architectures (initially focused on Web services), with standards

leadership provided by OASIS

  • Close collaboration between both standards organizations is required:
  • Existing standards are available in both domains and many of

these standards will provide the foundation and underlying capabilities upon which the biometric services depend.

Define Web services bindings:

Schema Protocol

Define “taxonomy”:

Identity assurance operations

Data elements

OASIS INCITS M1

slide-8
SLIDE 8

www.oasis-open.org

Goals

  • BIAS will provide an open framework for deploying and invoking

biometric-based identity assurance capabilities that can be readily accessed using services-based frameworks.

  • BIAS will provide a generic set of biometric (and related)

functions and associated data definitions to allow remote access to biometric services.

  • BIAS will specify a set of patterns and bindings for the

implementation of BIAS operations using Web services within service-oriented architectures.

slide-9
SLIDE 9

www.oasis-open.org

Scope 2 Primary Needs Generic Biometric Services Integrated Authentication Services

BIAS Future

slide-10
SLIDE 10

www.oasis-open.org

BIAS System Context (INCITS M1)

  • BIAS services are modular and

independent operations which can be assembled in many different ways to support a variety of business processes.

  • BIAS services may be

implemented with differing technologies on multiple platforms.

  • BIAS services can be publicly

exposed directly and/or utilized indirectly in support of a service- provider’s own public services.

slide-11
SLIDE 11

www.oasis-open.org

BIAS System Context (OASIS)

  • Defines an XML messaging

protocol to implement the “abstract” services specified in INCITS M1.

  • SOAP over HTTP

WSDL defined

  • Synch & Asynch operations
slide-12
SLIDE 12

www.oasis-open.org

Representing biometric data

  • To meet BIAS goals, any type of biometric information needs to

be able to be represented and used in the services.

  • BIAS utilizes the existing CBEFF* standard (ISO/IEC 19785-

1:2006) to represent biometric data.

BIAS does not require any particular CBEFF patron format. BIAS implementations may support one or multiple CBEFF patron

formats.

  • BIAS specification includes an XML representation of CBEFF

header information.

  • Biometric Information Record (BIR) payload may contain

standardized or proprietary data formats

e.g., standard formats per INCITS 378, 379, 381, 385 … or ISO

19794-x.

* Common Biometric Exchange Formats Framework

slide-13
SLIDE 13

www.oasis-open.org

Representing biographic data

  • BIAS provides flexibility for the amount and types of biographic

data supported by implementing systems.

  • BIAS provides two methods for representing biographic

information:

A set of individual data items (name/type/value combinations) An existing format, such as:

XML http://www.hr-xml.org/ 2.5 HR-XML HR-XML XML http://www.oasis-open.org/ 2.0 3.0 xNAL CIQ xNAL XML http://www.niem.gov/ 1.0 2.0 NIEM NIEM ASCII http://www.biometrics.dod.mil/ 1.2 EBTS EBTS Type-2 ASCII http://www.fbi.gov/ 7.1 EFTS EFTS Type-2 type source version name Biographic Data Format

slide-14
SLIDE 14

www.oasis-open.org

BIAS Services

  • Subject
  • Create/delete subject
  • Add/remove subject from

gallery

  • Biographics
  • Set/list biographic data
  • Update/delete biographic data
  • Retrieve biographic data
  • Biometrics
  • Set/list biometric data
  • Update/delete biometric data
  • Retrieve biometric data
  • Searching/processing
  • Verify subject
  • Identify subject
  • Check quality
  • Classify biometric data
  • Perform fusion
  • Transform biometric data
  • Aggregate services
  • Enroll
  • Identify
  • Verify
  • Retrieve information
  • Discovery
  • Query Capabilities
slide-15
SLIDE 15

www.oasis-open.org

Services for managing enrollments

  • Create Subject

creates a new subject record and associates a subject ID to that

record

  • Delete Subject

deletes an existing subject record and, in an encounter-centric

model, any associated encounter information from the system

  • Add Subject to Gallery

registers a subject to a given gallery or population group

  • Delete Subject from Gallery

removes the registration of a subject from a gallery or population

group

slide-16
SLIDE 16

www.oasis-open.org

Services for managing information about an enrolled individual:

  • Set Biographic Data
  • associates biographic data with

a given subject record; may either replace existing data or create a new encounter

  • Update/Delete Biographic Data
  • updates/removes biographic

data from a given subject or encounter

  • List Biographic Data
  • lists the biographic data

elements stored for a subject or encounter

  • Retrieve Biographic Data
  • retrieves the biographic data

associated with a subject or encounter

  • Set Biometric Data
  • associates biometric data with a

given subject record; may either replace existing data or create a new encounter

  • Update/Delete Biometric Data
  • updates/removes biometric data

from a given subject or encounter

  • List Biometric Data
  • lists the biometric data elements

stored for a subject or encounter

  • Retrieve Biometric Data
  • retrieves the biometric data

associated with a subject or encounter

slide-17
SLIDE 17

www.oasis-open.org

Services for biometric searching and processing

  • Verify Subject
  • performs a 1:1 verification

match between a given biometric and either a claim to identity in a given gallery or another given biometric

  • Identify Subject
  • performs an identification

search against a given gallery for a given biometric, returning a rank-ordered candidate list of a given maximum size

  • Check Quality
  • returns a quality score for a

given (input) biometric

  • Classify Biometric Data
  • classifies a given (input)

biometric

  • Perform Fusion
  • accepts either match score or

match decision information and creates a fused match result

  • Transform Biometric Data
  • transforms or processes a given

biometric in one format into a new target format (e.g., feature extraction, center/crop, convert data format)

slide-18
SLIDE 18

www.oasis-open.org

Aggregate/composite services

  • Enroll
  • adds a new subject or a new

encounter to the system

  • may include and be contingent

upon a negative identification

  • may utilize other BIAS services
  • Identify
  • performs an identification

function according to system requirements and/or resources (e.g., search multiple galleries)

  • may utilize other BIAS services
  • Verify
  • performs a 1:1 verification

function according to system requirements and/or resources

  • may utilize other BIAS services
  • Retrieve Information
  • retrieves requested information

about a subject

  • may include biographic +

biometric data, and/or multiple encounters

  • may utilize other BIAS services
slide-19
SLIDE 19

www.oasis-open.org

Asynchronous operations

  • Enroll
  • Identify
  • Verify
  • Identify Subject
  • Get Enroll Results
  • Get Identify Results
  • Get Verify Results
  • Get Identify Subject Results

<interface name="GetIdentifySubjectResults"> <parameter name="Token" type="TokenType" direction="in" /> <parameter name="Return" type="xs:unsignedLong" direction="out" /> <parameter name="CandidateList" type="CandidateListType" direction="out" /> </interface> <interface name="IdentifySubject"> <parameter name="GalleryID" type="xs:string" direction="in" /> <parameter name="BIR" type="CBEFF_BIR_Type" direction="in" /> <parameter name="MaxListSize" type="xs:int" direction="in" /> <parameter name="Return" type="xs:unsignedLong" direction="out" /> <parameter name="CandidateList" type="CandidateListType" direction="out" use=”conditional” /> <parameter name="Token" type="TokenType" direction="out" use=”conditional” /> </interface>

slide-20
SLIDE 20

www.oasis-open.org

Security

3 areas

Integrity & Authenticity Confidentiality/Privacy Access Control

Intent: Support a variety of implementation

environments

Minimum requirements

Signed XML HTTPS

Intended to be used in conjunction with other WS*

security capabilities

WS-Security, SAML, etc.

slide-21
SLIDE 21

www.oasis-open.org

Process flow – border mgmt example

Start Identify Subject … Match Found? Set Biographic Data Set Biometric Data Set Biographic Data Set Biometric Data Create Subject Add Subject To Gallery Finish Finish

No Yes Save and Associate Encounter Create New Subject Known Subject?

slide-22
SLIDE 22

www.oasis-open.org

Example eG use case

  • Registered Traveler Program

RT is a trusted passenger program to expedite

and enhance security screening of passenger participants

Travelers must apply to enroll in the program

via a service provider, which collects biographic and biometric information as part of the application process

The TSA conducts a Security Threat

Assessment on all applicants

If approved, a traveler is issued an RT card

containing authentication information

In operational use, a cardholder is verified to

ensure legitimacy using fingerprint or iris biometrics

slide-23
SLIDE 23

www.oasis-open.org

RT – Functional Flow

  • The Enrollment Provider collects biographic and biometric information from an RT Applicant

and transmits it to the CIMS (Steps 1 and 2)

  • The CIMS formats and transmits the data to the TSA (Step 3).
  • The TSA conducts a Security Threat Assessment at application and re-vets on a perpetual

basis (Step 4) and transmits an approved or not approved finding back to the CIMS (Step 5).

  • The CIMS informs the Enrollment Provider of acceptance or non-acceptance (Step 6), and the

Enrollment Provider informs the RT Applicant and issues a card with the authentication payload created at the CIMS if he or she is approved (Step 7).

  • When an RT Participant travels through a participating airport, they use the RT card at an RT

verification station which confirms the individual’s current status in the RT program (Step 8).

slide-24
SLIDE 24

www.oasis-open.org

Applying BIAS to RT – Step 1

  • Pre-Enrollment
  • Each traveler applying for an RT card may, if supported by the Enrollment

Provider, pre-enroll

  • This involves accessing a web-site and entering biographic data. This data

is stored for the applicant.

  • BIAS Services
  • Create Subject
  • Add Biographic Data
slide-25
SLIDE 25

www.oasis-open.org

Applying BIAS to RT – Step 2

  • Enrollment
  • Complete the enrollment process by reviewing biographic information supplied at

pre-enrollment and collecting biometric information

  • BIAS Services
  • (EP Internal) Retrieve Biographic Data
  • (EP Internal ) Update Biographic Data (if any edits to biographic information)
  • (EP Internal) Set Biometric Data
  • (CIMS interface) Enroll
slide-26
SLIDE 26

www.oasis-open.org

Applying BIAS to RT – Steps 3-6

  • Registration, Vetting Coordination, and Card Payload Generation
  • Submit a request to TSA for a Security Threat Assessment
  • BIAS Services
  • (CIMS internal) Create Subject
  • (CIMS internal) Set Biometric Data
  • (TSA interface) Identify
  • (CIMS internal) Add Subject to Gallery
slide-27
SLIDE 27

www.oasis-open.org

Applying BIAS to RT – Step 7

  • Create Card

If all enrollment processing completes with no adverse information,

resulting in an “approval” decision, then the RT card may be issued

  • BIAS Services

(EP internal) Add Subject to Gallery

slide-28
SLIDE 28

www.oasis-open.org

Applying BIAS to RT – Step 8

  • Verification

The traveler’s biometric is captured and compared against the

biometric information stored on the card

  • BIAS Services

(VP internal) Verify Subject

slide-29
SLIDE 29

www.oasis-open.org

Example eB use case – Online Banking

Overview:

  • An individual has an existing bank account at XYZ Bank and would like to access

this account information and perform transactions.

  • In lieu of a password, the bank has configured their online banking web application

to use biometric verification.

  • The account holder uses a home PC with a biometric device (e.g., an iris camera)

installed.

Two situations described:

  • Enrollment: associated biometric information with the account
  • Account Access: access the account using a biometric as the method of

verification

Note: This example could also be structured using biometrics as a front-end to a traditional authentication protocol.

slide-30
SLIDE 30

www.oasis-open.org

Online Banking – Enrollment

Account Holder XYZ Bank

(1) One-time biometric enrollment password (2) Verify password and initiate biometric enrollment (4) Submit biometric information [Set Biometric Data] (3a) Capture biometric information (3b) Perform local 1:1 verification

(1) The bank has issued the individual a one-time password to allow the account holder to enroll biometric information into the system. (2) The individual accesses the online banking site and selects ‘biometric enrollment’. The individual enters the account number and one-time password to access this function. Once verified, the enrollment application is initiated. (3) The individual follows the steps to capture biometric data and to perform a local 1:1 match against that data to ensure it will be matchable. (4) Once suitable data is acquired, it is submitted to the bank as an enrollment [Set Biometric Data].

slide-31
SLIDE 31

www.oasis-open.org

Online Banking – Account Access

Account Holder XYZ Bank

(1) Access online banking system (3) Submit biometric information [Verify Subject] (2) Capture biometric information

(1) The account holder accesses the online banking site and enters the account

  • number. At this point, the individual is challenged to present a biometric (e.g.,

capture iris data). (2) The individual interacts with the device to capture the biometric data. (3) The biometric data is transmitted to the bank for verification [Verify Subject]. If the verification is successful, the bank will provide access to the transaction screens for the individual's account.

slide-32
SLIDE 32

www.oasis-open.org

Status

  • INCITS project 1823-D, BIAS

Essentially complete Public review scheduled for July (Rev 6) Latest posted draft (Rev 5):

http://www.incits.org/tc_home/m1htm/2007docs/m1070198.pdf

  • OASIS document: BIAS Messaging Protocol

Working draft – WSDL complete, gaps in other areas Update needed to align with INCITS document New editors recently identified Latest draft (Ed draft 0.8): http://www.oasis-

  • pen.org/committees/download.php/22543/bias-1%200-biasmp-ed-

08.pdf

WSDL: http://www.oasis-

  • pen.org/committees/download.php/22544/bias.wsdl

Goal: Ready for review by late 2007

slide-33
SLIDE 33

www.oasis-open.org

Participation

INCITS M1

http://www.incits.org/tc_home/m1.htm

OASIS BIAS TC

http://www.oasis-

  • pen.org/committees/tc_home.php?wg_abbrev=bias

Sponsor level members

slide-34
SLIDE 34

www.oasis-open.org

Contact Info: cathy.tilton@daon.com