Information Security Identification and authentication Advanced User Authentication II 2019-02-08
Amund Hunstad
Guest Lecturer, amund@foi.se
Information Security Identification and authentication Advanced - - PowerPoint PPT Presentation
Information Security Identification and authentication Advanced User Authentication II 2019-02-08 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background Authentication eID
Guest Lecturer, amund@foi.se
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Attempt to classify methods according to how they meet all seven criteria. Valid today? Do you agree in general? Look closely and make your own assessment! There is no “correct” answer…
31
32
33
34
35
36
37
39
40
A: User-biometric system interface B: Biometric system modules C: Interconnections betweeen biometric modules D: Templates database E: Attacks through insiders (admin or enrolled users)
42
43
45
46
47
48
49
50
54
55
AFIS installation at Michigan State Police facility. This system was first installed in 1989; the database has 3.2 million tenprint cards and performs 700,000 searches each year
56
57
59
60
61
62
63
64
65
66
67
68
69
70
Real fingerprints User 1 User 2 User 3 Reader 1 98% 100% 94% Reader 2 100% 100% 100% Reader 3 98% 34% 88% Gummy fingerprint copies User 1 User 2 User 3 Reader 1 98% 92% 100% Reader 2 98% 100% 96% Reader 3 92% 12% 82%
71
72
73
74
Ocular region of the human face
75
NIR image
76
I(x(r,θ ),y(r,θ )) → I(r,θ ) with x(r,θ) = (1−r)xp(θ)+rxl(θ ) and y(r,θ) = (1−r)yp(θ)+ryl(θ )
78
79
80
81
83
False Reject Rate at a fixed False Accept Rate in the verification mode
84
85
86
87
88
(Ross Anderson, Security Engineering chapter 16)
89
90
91
92
93
94
95
96
97
98
99
100
101
102