khaled al amri using fingerprints as private and public keys

25

Upload: nooralmousa

Post on 06-Dec-2014

844 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Khaled al amri   using fingerprints as private and public keys
Page 2: Khaled al amri   using fingerprints as private and public keys

Agenda

• About Genkey• The Problem• Traditional Solutions• Genkey’s Solution• Development Principles• Q&A

Page 3: Khaled al amri   using fingerprints as private and public keys

• Part of the Meltwater family (like MEST)/a• Created by Norwegian entrepreneur Jørn

Lyseggen in 2001.• 7 years of research in Biometrics and

Crypto-technology before approaching market• a different approach to Biometrics

About GenKey – History

Page 4: Khaled al amri   using fingerprints as private and public keys

Bergen, Norway

Amersfoort, HollandMountain View, CA

Chicago, Il

Delhi, India

Cambridge, UK

Accra, Ghana

About GenKey – Presence

Page 5: Khaled al amri   using fingerprints as private and public keys

REALITY

The Need

Page 6: Khaled al amri   using fingerprints as private and public keys

Exam Fraud

Exam Verification

Fraud?

• How do you know?

?

?

?

Page 7: Khaled al amri   using fingerprints as private and public keys

ATM Fraud

Secure Banking

Thief?

• How do you know?

?

?

Page 8: Khaled al amri   using fingerprints as private and public keys

Election Fraud

Election Day

Dual Voter?

• How do you know?

??

Page 9: Khaled al amri   using fingerprints as private and public keys

Infra

structu

re

Con

nectiv

ity an

d

bandw

idth

Mobility

Remote Areas

CostLimited Budgetper Individual

Reliable and Secure

Authentication of Individuals

Privacy Protecting

the individual

The Common Problem

Page 10: Khaled al amri   using fingerprints as private and public keys

1. Possession of an object

SecureSystem

2. Knowledge of information

Cards can be lost

Pin can be compromised

3. Physical Presence

4. Genkey Biocryptics

Fear of compromising biometrics?

FOUR layers of Security

Page 11: Khaled al amri   using fingerprints as private and public keys

Patented technology collapses biometrics and converts it into crypto keys

Genkey Biocryptics

Public Crypto Key Biometric Sources

A New Approach

Page 12: Khaled al amri   using fingerprints as private and public keys

Genkey BiocrypticsEnrollment

ZBSKEAAAUyLbmovmfVmPfNbrledWmQgCAQ==.

Image

Acquisition

Image Analysis

GenKey Biocryptic® Technology

Crytpo-Key

Generation

Public Biocryptic Key Generation

Key

Algorithm Base Key

Crypto-Key

Generation

GENKEY

PUBLIC KEY

Page 13: Khaled al amri   using fingerprints as private and public keys

Feature analysis

f1f2f3f4

f5f6f7f8

f1f2f3f4

f5f6f7f8

GenkeyPublicKey

Reference template

Verification template

GenKey Biocryptics

Traditional Biometric Technology – Minutia Based

Image AnalysisCrytpo-

Key

Generation

Public Biocryptic Key Generation

Key

AlgorithmBase Key

Crypto-Key

Generation

Non-Reversible PUBLIC KEY (<100bytes) Key fits on small barcode, magnetic stripe,… No biometric data (image, template,…) is stored Minimal Storage Requirement Asymmetric Authentication Search 10,000,000 references/second!

f1f2f3f4

f5f6f7f8X

Biocryptics vs. Biometrics

Page 14: Khaled al amri   using fingerprints as private and public keys

Traditional Biometric Authentication with templates

Feature analysis

f1f2f3f4

f5f6f7f8

Feature analysis

f1f2f3f4

f5f6f7f8

Template matching engine

Enrolment

Verification

Reference template

Verification template

Match score

Page 15: Khaled al amri   using fingerprints as private and public keys

Genkey BiocrypticsAuthentication

Page 16: Khaled al amri   using fingerprints as private and public keys

2 Off Line Mode

Cost Efficiency

4 Revocation of Biometric ID

5Supports multimodalbiometric systems

3 Privacy

Cost Efficiency

• No chip card required

• Inexpensive Sensors

• Utilizes existing Computers

• No costly infrastructure or central database

1

Genkey Biocryptics Benefits

Page 17: Khaled al amri   using fingerprints as private and public keys

2 Off Line Mode

Cost Efficiency

4 Revocation of Biometric ID

5Supports multimodalbiometric systems

3 Privacy

Off Line Mode

• GenKey provides authentication

• without any connection

• issuance and verification

1

Genkey Biocryptics Benefits

Page 18: Khaled al amri   using fingerprints as private and public keys

2 Off Line Mode

Cost Efficiency

4 Revocation of Biometric ID

5Supports multimodalbiometric systems

3 Privacy

Privacy

• With GenKey, biometric data is never stored

• Security cannot be compromised

• Privacy is not compromised

1

Genkey Biocryptics Benefits

Page 19: Khaled al amri   using fingerprints as private and public keys

2 Off Line Mode

Cost Efficiency

4 Revocation of Biometric ID

5Supports multimodalbiometric systems

3 Privacy

Revocation of Biometric ID

In case of security breach, GenKey crypto keys can be revokedand new keys generated

1

Genkey Biocryptics Benefits

Page 20: Khaled al amri   using fingerprints as private and public keys

2 Off Line Mode

Cost Efficiency

4 Revocation of Biometric ID

5 Supports multimodalbiometric systems

3 Privacy

Support of multimodalbiometric systems

• A GenKey key can represents multiple biometrics

• A system of multiple

biometrics can be searched at the same speed as a single finger system

1

Genkey Biocryptics Benefits

Page 21: Khaled al amri   using fingerprints as private and public keys

The Problem TraditionalBiometricSolutions

GenkeyBiocryptics

Reliability

Cost

InfrastructureMobility

Privacy

Multiple modalities

Genkey Biocryptics Benefits

Page 22: Khaled al amri   using fingerprints as private and public keys

Biocryptics vs. Biometrics

Traditional Biometric solution Genkey Biocryptic

BiometricAnalysis

Based on minutia points. Based on several features such as patterns and shape.

Cost Very expensive propriety hardware

Demands high end networks.

Standard hardware at a fraction of the cost.

Network traffic is very limited.

Offlinecapability

No offline capability Offline fully supported- Light database- Smart synchronization

Privacy Biometric saved as an image/template

Can be recreated

Only the irreversible Public Key is stored.

Misuse is impossible.

Side-by-Side

Page 23: Khaled al amri   using fingerprints as private and public keys

Traditional Biometric solution Genkey Biocryptic

Speed Image/template comparison1:n ~ 7000 per sec. on a standard CPU

Number comparison1:n ~ 1 300 000 on standard CPU

Mobility Image/template database size prohibitive on smaller devices

Number database can carry millions of keys on a laptop or small device

Multiple modalities

One image/template per modality (iris, face etc.).Resulting database size prohibitive on standard devices

All modalities are collapsed into one key. Database size and search speed is the same.

ID Document

Smart Card with sufficient storage capacity

No limitationsPaper based (barcode), magnetic stripe, RFID, low-level smart card, ….

Comparison with templatesKey Points (2)

Page 24: Khaled al amri   using fingerprints as private and public keys

• Genkey Biocryptic Solutions

– Application-Context Sensitive– Complete ID Management – Flexible enrollment/verification flow– State-of-the-art technology– The best and most cost-effective solution– Offline capability with transparent, bi-

directional synchronization– Robust and proven in harsh conditions– Tamper proof

GenkeyEnterprise

Driver License

NationalID Cards

NationalHealthcare

VoterRegistration

Genkey Biocryptics The Big Picture

• Genkey ABIS Cross-Solutions– Cross Application Biometrics– Fully integrated with Biocryptic

Applications– State-of-the-art technology– Fully compliant with ANSI/NIST

standard – Extensible to Criminal AFIS– Multi-modal, multi-algorithm

duplicate checking

Page 25: Khaled al amri   using fingerprints as private and public keys

www.genkeycorp.com

Thank You

Khaled Al-Amri

+966 544 613 441