Advanced AuthenticationIntroduction Very broad subject and
highly researched. Focused on topics that could be quick to
implement and (somewhat) inexpensive. Solutions that could be used
at home/work/public.
Slide 4
Advanced AuthenticationWhat is Authentication: Most common ways
to authenticate today: Something you know Something you have
Something you know/have ?
Slide 5
Advanced AuthenticationWhat is Authentication: Authentication
Technique ExampleProperties Something you have Credit Card Car Key
Badge Lost / Stolen Duplicated Shared Something you know Login ID /
Password ATM PIN Forgotten Shared Guessed Something you are
Fingerprint Eyes / Face Voice Cannot be lost / stolen Cannot guess
/ forge Cannot be shared (easily)
Slide 6
Advanced AuthenticationAuthentication Methods I will cover:
Fingerprint / Knuckle Identification Fingerprint & smart card
combinations EyePassShape
Slide 7
Advanced AuthenticationFingerprint / Knuckle Identification No
two fingerprints have ever been found alike in many billions of
human and automated computer comparisons. Fingerprints are the very
basis for criminal history foundation at every police agency on
earth. Fingerprinting established the first forensic professional
organization, the International Association for Identification
(IAI), in 1915. [1] Researchers noticed that fingerprints could
uniquely identify people as early as the 1800s.
Slide 8
FeatureProperties CrossoverIntersection point CoreU-Turn
BifurcationFork Ridge EndingDead End DeltaSplit IslandDual dead
ends Advanced AuthenticationFingerprint / Knuckle
Identification
Advanced AuthenticationFingerprint & smart card
combinations Very secure because it combines all 3 authentication
techniques (are/have/know) The research paper pitched this idea as
a replacement for Passports / Drivers License / Credit Cards etc.
Stolen Wallet?
Advanced AuthenticationEyePassShape Public authentication is
time-critical. Authentication token should be easy to remember.
Authentication has to be secure. Authentication methods have to be
easily deployable.
Slide 13
Advanced AuthenticationEyePassShape EyePIN Not very
Time-Critical Very Secure Pass ShapeNot very Secure Very Fast Both
are easy to deploy and are easy to remember
Slide 14
Advanced AuthenticationEyePassShape Fast Easy to Remember
Secure Deployable
Slide 15
Advanced AuthenticationEyePassShape
Slide 16
Advanced AuthenticationEyePassShape
Slide 17
Advanced AuthenticationReferences [1] The History of
Fingerprints, January 2012,
http://onin.com/fp/fphistory.htmlhttp://onin.com/fp/fphistory.html
[2] Biometric Education Fingerprint,
http://www.barcode.ro/tutorials/biometrics/fingerprint.html
http://www.barcode.ro/tutorials/biometrics/fingerprint.html [3]
Pallav Gupta, Srivaths Ravi, Anand R, Kiral K. Jha, Efficient
fingerprint-based user authentication for embedded systemsm DAC
2005 Proceedings of the 42 nd annual Design Automation Conference,
244-247. [4] Lionel Beauge, Andrzej Drygallo, 2010, Fully featured
secure biometric smart card device for fingerprint-based
authentication and identification, MM&Sec 2010 Proceedings of
the 12 th ACM workshop on multimedia and security, 181-186. [5]
Alexander De Luca, Martin Denzel, Heinrich Hussmann, 2009, Look
Into My Eyes!: can you guess my password?, SOUPS 2009 5 th
Symposium on Usable Privacy and Security, Article 8.