khaled al amri using fingerprints as private and public keys
DESCRIPTION
TRANSCRIPT
Agenda
• About Genkey• The Problem• Traditional Solutions• Genkey’s Solution• Development Principles• Q&A
• Part of the Meltwater family (like MEST)/a• Created by Norwegian entrepreneur Jørn
Lyseggen in 2001.• 7 years of research in Biometrics and
Crypto-technology before approaching market• a different approach to Biometrics
About GenKey – History
Bergen, Norway
Amersfoort, HollandMountain View, CA
Chicago, Il
Delhi, India
Cambridge, UK
Accra, Ghana
About GenKey – Presence
REALITY
The Need
Exam Fraud
Exam Verification
Fraud?
• How do you know?
?
?
?
ATM Fraud
Secure Banking
Thief?
• How do you know?
?
?
Election Fraud
Election Day
Dual Voter?
• How do you know?
??
Infra
structu
re
Con
nectiv
ity an
d
bandw
idth
Mobility
Remote Areas
CostLimited Budgetper Individual
Reliable and Secure
Authentication of Individuals
Privacy Protecting
the individual
The Common Problem
1. Possession of an object
SecureSystem
2. Knowledge of information
Cards can be lost
Pin can be compromised
3. Physical Presence
4. Genkey Biocryptics
Fear of compromising biometrics?
FOUR layers of Security
Patented technology collapses biometrics and converts it into crypto keys
Genkey Biocryptics
Public Crypto Key Biometric Sources
A New Approach
Genkey BiocrypticsEnrollment
ZBSKEAAAUyLbmovmfVmPfNbrledWmQgCAQ==.
Image
Acquisition
Image Analysis
GenKey Biocryptic® Technology
Crytpo-Key
Generation
Public Biocryptic Key Generation
Key
Algorithm Base Key
Crypto-Key
Generation
GENKEY
PUBLIC KEY
Feature analysis
f1f2f3f4
f5f6f7f8
f1f2f3f4
f5f6f7f8
GenkeyPublicKey
Reference template
Verification template
GenKey Biocryptics
Traditional Biometric Technology – Minutia Based
Image AnalysisCrytpo-
Key
Generation
Public Biocryptic Key Generation
Key
AlgorithmBase Key
Crypto-Key
Generation
Non-Reversible PUBLIC KEY (<100bytes) Key fits on small barcode, magnetic stripe,… No biometric data (image, template,…) is stored Minimal Storage Requirement Asymmetric Authentication Search 10,000,000 references/second!
f1f2f3f4
f5f6f7f8X
Biocryptics vs. Biometrics
Traditional Biometric Authentication with templates
Feature analysis
f1f2f3f4
f5f6f7f8
Feature analysis
f1f2f3f4
f5f6f7f8
Template matching engine
Enrolment
Verification
Reference template
Verification template
Match score
Genkey BiocrypticsAuthentication
2 Off Line Mode
Cost Efficiency
4 Revocation of Biometric ID
5Supports multimodalbiometric systems
3 Privacy
Cost Efficiency
• No chip card required
• Inexpensive Sensors
• Utilizes existing Computers
• No costly infrastructure or central database
1
Genkey Biocryptics Benefits
2 Off Line Mode
Cost Efficiency
4 Revocation of Biometric ID
5Supports multimodalbiometric systems
3 Privacy
Off Line Mode
• GenKey provides authentication
• without any connection
• issuance and verification
1
Genkey Biocryptics Benefits
2 Off Line Mode
Cost Efficiency
4 Revocation of Biometric ID
5Supports multimodalbiometric systems
3 Privacy
Privacy
• With GenKey, biometric data is never stored
• Security cannot be compromised
• Privacy is not compromised
1
Genkey Biocryptics Benefits
2 Off Line Mode
Cost Efficiency
4 Revocation of Biometric ID
5Supports multimodalbiometric systems
3 Privacy
Revocation of Biometric ID
In case of security breach, GenKey crypto keys can be revokedand new keys generated
1
Genkey Biocryptics Benefits
2 Off Line Mode
Cost Efficiency
4 Revocation of Biometric ID
5 Supports multimodalbiometric systems
3 Privacy
Support of multimodalbiometric systems
• A GenKey key can represents multiple biometrics
• A system of multiple
biometrics can be searched at the same speed as a single finger system
1
Genkey Biocryptics Benefits
The Problem TraditionalBiometricSolutions
GenkeyBiocryptics
Reliability
Cost
InfrastructureMobility
Privacy
Multiple modalities
Genkey Biocryptics Benefits
Biocryptics vs. Biometrics
Traditional Biometric solution Genkey Biocryptic
BiometricAnalysis
Based on minutia points. Based on several features such as patterns and shape.
Cost Very expensive propriety hardware
Demands high end networks.
Standard hardware at a fraction of the cost.
Network traffic is very limited.
Offlinecapability
No offline capability Offline fully supported- Light database- Smart synchronization
Privacy Biometric saved as an image/template
Can be recreated
Only the irreversible Public Key is stored.
Misuse is impossible.
Side-by-Side
Traditional Biometric solution Genkey Biocryptic
Speed Image/template comparison1:n ~ 7000 per sec. on a standard CPU
Number comparison1:n ~ 1 300 000 on standard CPU
Mobility Image/template database size prohibitive on smaller devices
Number database can carry millions of keys on a laptop or small device
Multiple modalities
One image/template per modality (iris, face etc.).Resulting database size prohibitive on standard devices
All modalities are collapsed into one key. Database size and search speed is the same.
ID Document
Smart Card with sufficient storage capacity
No limitationsPaper based (barcode), magnetic stripe, RFID, low-level smart card, ….
Comparison with templatesKey Points (2)
• Genkey Biocryptic Solutions
– Application-Context Sensitive– Complete ID Management – Flexible enrollment/verification flow– State-of-the-art technology– The best and most cost-effective solution– Offline capability with transparent, bi-
directional synchronization– Robust and proven in harsh conditions– Tamper proof
GenkeyEnterprise
Driver License
NationalID Cards
NationalHealthcare
VoterRegistration
Genkey Biocryptics The Big Picture
• Genkey ABIS Cross-Solutions– Cross Application Biometrics– Fully integrated with Biocryptic
Applications– State-of-the-art technology– Fully compliant with ANSI/NIST
standard – Extensible to Criminal AFIS– Multi-modal, multi-algorithm
duplicate checking
www.genkeycorp.com
Thank You
Khaled Al-Amri
+966 544 613 441