30
BioSlimDisk presentation v1.1 RiTech International Ltd Product (Signature) Website www.bioslimdisk.com Marcus Chan Date: 14 th August 2009

Bioslimdisk Presentation V1.1

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Bioslimdisk Presentation V1.1

BioSlimDiskpresentation v1.1

RiTech International LtdProduct (Signature)Website www.bioslimdisk.com

Marcus ChanDate: 14th August 2009

Page 2: Bioslimdisk Presentation V1.1

Overview

• Company Profile

• Biometric Technology

• Bioslimdisk Signature

© RiTech International Ltd, Confidential & Proprietary2

Page 3: Bioslimdisk Presentation V1.1

COMPANY PROFILE

Page 4: Bioslimdisk Presentation V1.1

RiTech International Ltd

© RiTech International Ltd, Confidential & Proprietary4

• Ritech was established in 1994 as Designer, developer, manufacturer and distributor of innovative products, services & systems in the area of biometrics security and portable data storage.

• Specializes in biometrics security technology with in-house R&D.

• Overseas operation network: Malaysia, Hong Kong, China, India and Europe.

Page 5: Bioslimdisk Presentation V1.1

Vision

First Choice Solution provider in the Biometric security industry

© RiTech International Ltd, Confidential & Proprietary5

Biometric

Process

Algorithms

Implementation knowledge

Customised Solutions

Ergonomics and desgin

Sensors

Page 6: Bioslimdisk Presentation V1.1

ObjectivesAdvanced Research and Development• Biometrics products for portable information

storage and transportation• Biometrics products for Intellectual Property

Protection• Biometrics products for secure identification

over networks• Biometrics products for as a secure

replacement over existing keys, cards, password which tend to be a burden

© RiTech International Ltd, Confidential & Proprietary6

Page 7: Bioslimdisk Presentation V1.1

BIOMETRIC TECHNOLOGY

Page 8: Bioslimdisk Presentation V1.1

What is Biometric?

The Science of measuring

and statistically analyzing

biological data

© RiTech International Ltd, Confidential & Proprietary8

Page 9: Bioslimdisk Presentation V1.1

What is Biometric?

Biometric Technology

Authentication can be divided into three different factors:

• something you know • something you have • something you are

© RiTech International Ltd, Confidential & Proprietary9

Page 10: Bioslimdisk Presentation V1.1

Something you know

Common• Pin Numbers/Code• Learn it , You have to remember the

Code Number• Forced to memorize passwords

Disadvantage:-Software hacking tools via internet, easy to steal by anyone. (e.g. Keylogger)

© RiTech International Ltd, Confidential & Proprietary10

Page 11: Bioslimdisk Presentation V1.1

Something you have

Example Smart cards • Cash Card• ATM Card• Visa/Master Card• Door/Building Access Card

Disadvantage:-If picked up by anyone, it can still be used. (e.g. Paying at a Petrol Station)

© RiTech International Ltd, Confidential & Proprietary11

Page 12: Bioslimdisk Presentation V1.1

Something you are

Biometrics is what you are!

What you have:1. Your Finger > Fingerprint 2. You cannot loose it3. You cannot give it away

You cannot tell a friend to use your prints.

© RiTech International Ltd, Confidential & Proprietary12

Page 13: Bioslimdisk Presentation V1.1

Types of Biometric

1. BEHAVIOURAL– Voice Patterns– Signature Verification– Key Stroke Patterns (Signatures)

2. PHYSIOLOGICAL– Fingerprints– Hand Geometry– Retinal & Iris Scanning– Facial Recognition– DNA Fingerprinting

© RiTech International Ltd, Confidential & Proprietary13

Page 14: Bioslimdisk Presentation V1.1

Biometric Comparison

Comparison of various biometric technologiesIt is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters:

• Universality => each person should have the characteristic• Uniqueness => is how well the biometric separates individually

from another.• Permanence => measures how well a biometric resists aging.• Collectability => ease of acquisition for measurement.• Performance => accuracy, speed, and robustness of

technology used.• Acceptability => degree of approval of a technology.• Circumvention => ease of use of a substitute.

© RiTech International Ltd, Confidential & Proprietary14

Page 15: Bioslimdisk Presentation V1.1

Biometric Comparison

Comparison of various biometric technologies, modified from Jain et al., 2004 (H=High, M=Medium, L=Low)

Biometrics: Universality Uniqueness Permanence Collectability Performance Acceptability Circumvention

Face H L M H L H LFingerprint M H H M H M HHand geometry M M M H M M MKeystrokes L L L M L M MHand veins M M M M M M HIris H H H M H L HRetinal scan H H M L H L HSignature L L L H L H LVoice M L L M L H LFacial thermograph

H H L H M H H

Odor H H H L L M LDNA H H H L H L LGait M L L H L H MEar Canal M M H M M H M

© RiTech International Ltd, Confidential & Proprietary15

Comparison of existing biometric systems

Page 16: Bioslimdisk Presentation V1.1

Fingerprint Identification

Minutiae Definition• Form of Fingerprint

• Number of Lines

• Distance Between Marks

© RiTech International Ltd, Confidential & Proprietary16

Page 17: Bioslimdisk Presentation V1.1

Processing & Identification

FingerprintHow many minutiae are needed for comparison?

–Generally, a complete fingerprint is made up of up to 100 minutiae

–Fingerprint recognition normally requires 20~30 minutiae for processing

© RiTech International Ltd, Confidential & Proprietary17

Page 18: Bioslimdisk Presentation V1.1

The Biometrics’ Dilemma

© RiTech International Ltd, Confidential & Proprietary18

Page 19: Bioslimdisk Presentation V1.1

Biometric Advantages

© RiTech International Ltd, Confidential & Proprietary19

Copy Theft Forgotten LostKey

Badge

PIN Code

BiometricFeature

Advantages of Biometricsfor Access Control

X X X XX X X

X X-

- - - -

- -

Page 20: Bioslimdisk Presentation V1.1

BIOSLIMDISK SIGNATURE

Page 21: Bioslimdisk Presentation V1.1

21

WHY?

• Threat of data theft is real and costly• Affects employees negatively• Affects company negatively• Loss of productivity and credibility• Loss of profits and sustainability

© RiTech International Ltd, Confidential & Proprietary

Page 22: Bioslimdisk Presentation V1.1

HOW?

• Physical theft and hackingActual device is stolen and tapped for data

• Social engineeringPasswords or access keys can be coaxed

• Virtual hacking and theftPopular method of data theft

• Man-in-the-Middle attacksSpying and snooping on communications

© RiTech International Ltd, Confidential & Proprietary22

Page 23: Bioslimdisk Presentation V1.1

Securing Data

Signature can meet security challenges withTamper-proof with self-destruct functionFingerprint recognition (biometric)Built-in AES-128 bit data encryptionFeatures to protect user identificationNo passwords during usage

© RiTech International Ltd, Confidential & Proprietary23

Page 24: Bioslimdisk Presentation V1.1

Safekeeping

Self Destruct FeatureActivated when tampering is detectedAll data drive is destroyedKeeps confidential data out of reach

No backdoor accessNo password or function to reset securityOnly valid fingerprints are allowed access

© RiTech International Ltd, Confidential & Proprietary24

Page 25: Bioslimdisk Presentation V1.1

Hardware Benefits

AES-128bit hardware encryptionKeys never leave SignatureAvoids tapping/snooping of keysAll data on drive is encryptedOn the fly encrypt and decrypt

Totally hardware-basedResistant to software-based attacksSecurity methods are encapsulated in hardware

© RiTech International Ltd, Confidential & Proprietary25

Page 26: Bioslimdisk Presentation V1.1

Protecting Fingerprints

Dual-finger authentication Reduces latent fingerprint

copy Intruder requires 2 unique

fingerprints

Limiting fingerprint retries Intruder has less time to guess correct

fingerprint Limits tries and time for correct fingerprint

© RiTech International Ltd, Confidential & Proprietary26

Page 27: Bioslimdisk Presentation V1.1

Convenience

• Anti-static rubberized casingHard to copy fingerprints on deviceLess dust attraction to protect sensor

• Cross platform compatibilityNo further software or software neededWorks in Windows, MAC, Linux, Solaris, etc.

© RiTech International Ltd, Confidential & Proprietary27

Page 28: Bioslimdisk Presentation V1.1

Unique Service

• Our technology is mature and battletestedOur company is the leader in this field

• Quick response to security breachesProduct is constantly updated

• Customization to end usersSecurity tokens, 3rd party software

© RiTech International Ltd, Confidential & Proprietary28

Page 29: Bioslimdisk Presentation V1.1

Summary of Features

1) Dual-Finger Authentication

2) Unique Self Destruct

3) Hardware Crypto AES-128bit

4) Worldwide Patents AwardedUnited Kingdom, Netherlands, Germany, France, China, Hong Kong, Singapore, Malaysia and many more.

© RiTech International Ltd, Confidential & Proprietary29

Page 30: Bioslimdisk Presentation V1.1

END