biometric authentication

19
• Biometric Authentication https://store.theartofservice.com/the-biometric- authentication-toolkit.html

Upload: lorena-blankenship

Post on 21-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Biometric Authentication

• Biometric Authentication

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 2: Biometric Authentication

Biometrics

1 Biometrics (or biometric authentication)[note 1] refers to the

identification of humans by their characteristics or traits. Biometrics is used in computer science as a form

of identification and access control. It is also used to identify individuals in groups that are under surveillance.

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 3: Biometric Authentication

Biometrics - Biometric functionality

1 (1999) identified seven such factors to be used when assessing the suitability of any trait for use in

biometric authentication

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 4: Biometric Authentication

Biometrics - Proposal calls for biometric authentication to access certain public networks

1 John Michael (Mike) McConnell, a former vice admiral in the United States Navy, a

former Director of US National Intelligence, and Senior Vice President of

Booz Allen Hamilton promoted the development of a future capability to require biometric authentication to

access certain public networks in his Keynote Speech at the 2009 Biometric

Consortium Conference.

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 5: Biometric Authentication

Biometrics - Notes

1 Jump up ^ As Jain & Ross (2008, footnote 4 on page 1) point out, "the

term biometric authentication is perhaps more appropriate than

biometrics since the latter has been historically used in the field of

statistics to refer to the analysis of biological (particularly medical) data " (wikilink added to original quote).

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 6: Biometric Authentication

Security management - Access control

1 Locks, simple or sophisticated, such as biometric authentication and keycard locks

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 7: Biometric Authentication

Disk encryption - The boot key problem

1 * Using a biometric authentication

method such as a fingerprint

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 8: Biometric Authentication

IPhone 5S - Critical reception

1 Walt Mossberg of All Things Digital gave the phone a favorable review, saying that Touch ID sounds like a

gimmick, but it’s a real advance, the biggest step ever in biometric

authentication for everyday devices, and labeled it the best smartphone

on the market

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 9: Biometric Authentication

RSA (security firm) - History

1 *In May 2001, it acquired 3-G International, Inc., a privately held

company that developed and delivered smart card and biometric

authentication products.

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 10: Biometric Authentication

Intelligence analysis management - Security and IT

1 A laptop can be secured, but the security both has to be built-in, and

maintained. Files need strong encryption. Multiple layers of security

risk detection tools are needed. Biometric authentication will identify

only legitimate users.

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 11: Biometric Authentication

Biometric

1 'Biometrics' (or 'biometric authentication')As Biometrics#cite note-Jain1-1|Jain Ross (2008, footnote 4 on page 1) point out, the term biometric

authentication is perhaps more appropriate than biometrics since the latter has been

historically used in the field of biostatistics|statistics to refer to the analysis of

biological (particularly medical) data [36] (wikilink added to original quote).

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 12: Biometric Authentication

Biometric

1 Biometric Authentication

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 13: Biometric Authentication

Biometric - Biometric functionality

1 (1999) identified seven such factors to be used when assessing the suitability of any trait for use in

biometric authentication

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 14: Biometric Authentication

Biometric - Proposal calls for biometric authentication to access certain public networks

1 John Michael McConnell|John Michael (Mike) McConnell, a former vice admiral in the United

States Navy, a former Director of United States Director of National Intelligence|US

National Intelligence, and Senior Vice President of Booz Allen Hamilton promoted the development of a future capability to require biometric authentication to access

certain public networks in his Keynote Speech at the [ http://www.biometrics.org/bc2009 2009 Biometric Consortium Conference].

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 15: Biometric Authentication

The Bat! - History

1 *Version 3.0 (September 2004) introduced customizable User

Interface, virtual folders, Mail Chat, Biometric authentication and support

of MAPI protocol to connect to Microsoft Exchange Server|Microsoft

Exchange Servers.

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 16: Biometric Authentication

Biometric signature

1 metrics related to human characteristics and traits. Biometrics authentication (or

'realistic authentication')As Biometrics#cite note-Jain1-1|Jain Ross (2008, footnote 4 on

page 1) point out, the term biometric authentication is perhaps more appropriate than biometrics since the latter has been

historically used in the field of biostatistics|statistics to refer to the analysis of

biological (particularly medical) data [36] (wikilink added to original quote).

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 17: Biometric Authentication

Gun safety - Rules and mindset

1 A new technology called Identilock attaches to the trigger of a handgun, which can then only be unlocked by biometric authentication, preventing any unauthorized user from firing the

weapon

https://store.theartofservice.com/the-biometric-authentication-toolkit.html

Page 18: Biometric Authentication

Multi-factor authentication - Biometrics

1 In short, selection and successful deployment of a biometric

authentication system needs careful consideration of many factors.

[http://www.cesg.gov.uk/publications/Documents/biometricsadvice.pdf Biometrics for Identification and

Authentication - Advice on Product Selection]

https://store.theartofservice.com/the-biometric-authentication-toolkit.html