Running Head: INNOVATION BRIEF INNOVATION BRIEF Non

advertisement
Running Head: INNOVATION BRIEF
1
Non-Static Biometric Identification
[Device that Using Random Intensity Light Patterns Produces a Unique Image of the
Fingertip]
Project Dates: October 11, 2012 – February 3, 2013
Author of this Document: Christopher Johnson
Olena Burnes
Team and Roles:
Christopher Johnson - Project Manager, Programmer, Network Security Specialist
Introduction
Abstract
In the era of growing digital society cybercrimes threaten individual as well as organizational
information, assets, and identity. Instant and secure personal identification is crucially important
in controlling access to computer systems. Existing biometric identification systems increase the
security of computer systems. However, numerous inadequacies compromise the main purpose
of such devices. Existing Biometric Identifiers are static.
The main goal of this project is to create a device to capture a non-static biometric identifier for
the purpose of authentication. The innovative component of this project is the use of light
patterns at varied intensity applied to fingertip in order to produce an image. The end result is a
non-static biometric identifier. Each pass through the scanner is random and the image created to
for comparison is dynamic. Traditional physiological biometrics use static image samples that
are compared to a static template in order to validate identity. This makes them more susceptible
for spoofing. Spoof resistance is one of the key benefits to our non-static biometric identifier. A
secondary method of authentication utilizing sensory response is integrated in to the process in
order to create a two-factor authentication mechanism. This secondary innovative component
also provides proof of life.
Keywords
Biometrics, identifier, automated biometric identification system (ABIS), biometric data,
biometric algorithm, common biometric exchange file format (CBEFF), one-to-one, one-tomany, verification, software, hardware, image recognition, network security, digital image,
computer, digital camera, facial features recognition, fingerprints, iris, retina, static, non-static.
Background Information and Prior Art
Definition
INNOVATION BRIEF
2
The term “Biometrics” is derived from the two Greek words “Bio” that means “life” and
“metrics” that means (measure). Technopedia defines Biometrics as “a technological and
scientific authentication method based on biology and used in information assurance (IA).
Biometric identification authenticates secure entry, data or access via human biological
information such as DNA or fingerprints.”
Rajan (2011) describes Biometrics or Life Measurement as “the use of unique physical features
such as fingerprints, facial features, retina or iris to identify an individual. A concise definition of
biometrics is “the automatic recognition of a person using distinguishing traits.” A more
expansive definition of biometrics is “any automatically measurable, robust and distinctive
physical characteristic or personal trait that can be used to identify an individual or verify the
claimed identity of an individual” (Woodward at all, 2003). The most important Biometrics’
application is security.
History
The history of Biometrics is traced to prehistoric times when cavemen signed their drawings with
their handprints. In Babylon, 2,000 years ago, fingerprints were used for business transactions. In
China fingerprints were used since XIV century.
The first finger print identification system was developed in XVIII century by Azizul Haque for
Edward Henry who at that time was Inspector General in India. In his system Edward Henry
assigned numerical value to each individual finger, beginning with the right thumb and ending
with the left pinky. Fingerprint records are grouped based upon pattern types such as “arch,”
“whorl,” and “loop.” Henry’s system had been successfully used by law enforcement agencies
around the world.
In 1969 FBI contracted the National Institute of Standards and Technology to develop a system
to automate the process of fingerprint identification (Woodward, 2003).
The first device for hand identification purpose was invented and patented by David Sidlauskas
in 1988. Since that time, new technologies were developed and commercialized for
authentication purposes providing secure access to computer network.
Biometrics Application
Biometrics by definition utilizes some unique biological characteristics such as fingerprints, iris,
facial features, voice, DNA, behavioral patterns, and or a combination of these features. This
method is more secure than traditional password and PIN based methods that can be stolen or
copied. However, some biometrics techniques can be spoofed using various methods. The most
secure biometrics techniques utilize a combination of static biometric samples and a proof of life
test requiring the physical presence of an authorized user at the time of execution.
2
INNOVATION BRIEF
3
Biometric identification devices are widely applied in corporate, governmental, and military
settings. Such devices usually consist of a scanner or video camera as a biometric input, software
that translates biometric information into digital form and indexes it or compares it to the
existing information and a database of the stored biometric information.
Attributes and Features
A biometric system is essentially a pattern recognition system which makes a personal
identification by determining the authenticity of a specific physical or behavioral characteristic
possessed by the user. Biometric technologies are thus defined as the "automated methods of
identifying or authenticating the identity of a living person based on a physical or behavioral
characteristic" (Rutter, 2012).
The biometric system connects an event to a single person, whereas other ID forms, such as a
personal identification number (PIN), may be used by anyone.
The Biometric Identifier has two modules – Database Preparation Module (DPM) and
Verification Module (VM). The DPM consists of two sub-modules – Enroll Module (EM) and
Training Module (TM). VM comprises two sub-modules – Matching Module (MM) and
Decision Module (DM). Each module will be modified and simplified (Gompers, 2003).
BiometricIdentifier
Identifier
Biometric
Database Preparation
Module (DPM)
Enroll
Module
(EM)
Verification Module (VM)
Matching
Module
(MM)
Training
Module
(TM)
Decision
Module
(DM)
A biometric system includes the following components and features:


A silicon sensor that reads data
A capacitance determines the pattern of ridges and valleys at any point during a cycle of
charging and discharging the capacitor array
3
INNOVATION BRIEF





4
The data are scanned and via software converted into digital format.
A map of unique finger characteristics is created on the basis of minutia detection.
A biometric template develops signal processing algorithms.
Biometric templates are compared to the data storage that is encrypted for added security.
A decision process uses matching event results and allows or denies access to the
computer system.
Biometric security device can be set up to either authenticate or identify a person using different
logic while matching input with the stored data.
Strengths and Weaknesses of the Existing Biometric Identifiers
Strengths:
1.
2.
3.
4.
The Biometric Identifiers meet most of the ASTM conceptual characteristics.
The device has a potential to provide identification of a person with high accuracy rate.
The Biometric tools are difficult to duplicate or steal.
Application of Biometric Identifier increases overall security.
4
INNOVATION BRIEF
5
5. A user is identified with the help of his/her own unique parameters.
6. Non-repudiation of transactions confirmed by means of biometric identification.
7. Users cannot share access rights.
8. It prevents of usage of stolen or lost identifiers.
9. A devise optimizes administration.
10. It reduces time required to access the protected resources and excludes mistakes while
typing passwords, damage or loss of identifiers.
11. It increases the overall system administrator’s productivity.
12. Non-Static Biometric Identifier reduces expenses related to administration of the access
infrastructure.
13. The device is easy to use - no need to memorize type or change multiple passwords.
14. It requires one-time enrollment.
15. It provides quick authorization, user convenience and workflow efficiency.
Weaknesses:
1.
2.
3.
4.
5.
Identification of a person requires special equipment, computer software and expertise.
Identification process is a time consuming and can affect the user’s performance.
It requires special technology infrastructure and administration.
Existing devices have a high cost of purchase, adjustment and maintenance.
Existing systems require data templates of many thousands of bytes, expensive storage
media and slowing process time.
Potential Challenges:
1.
2.
3.
4.
5.
Insertion of the missing components and characteristics.
Proximity and dynamics measurement.
Potential threat of violation of an individual’s privacy.
Cost.
Timelines.
5
INNOVATION BRIEF
6
Project Description and Innovation Claim
As Richards (2010) pointed out, “Some of the most important factors necessary for any effective
biometric system are: accuracy, speed and throughput rate, acceptability to users, uniqueness of
the biometric organ and action, resistance to counterfeiting, reliability, data storage requirements,
enrollment time, intrusiveness of data collection, and subject and system contact requirements.”
The attempt was made to create a device to capture a non-static biometric identifier for the
purpose of authentication. The innovative component of this project is the use of light patterns at
varied intensity applied to fingertip in order to produce a non-static sample. The end result is a
non-static biometric identifier. Each pass through the scanner is random and the image created to
for comparison is dynamic. Traditional physiological biometrics compares a static image to a
static template in order to compare for match. This makes them more susceptible for spoofing.
Spoof resistance is one of the key benefits to our non-static biometric identifier. The integration
of the secondary innovation component of secure rolling codes communicated via the sense of
touch adds a proof of life test and a second authentication mechanism.
In order to create the prototype of Non-Static Biometric Identifier, an Adruino microprocessor
controller, high intensity LED lights, a TTL Jpeg camera board, an IR proximity sensor, a small
project box and a PC to receive and process image data are used. Each device must be coded in
order to function properly. For the purpose of this sprint, we have attempted to achieve base
functionality in using the device to capture images to the PC. The LED light bed will be used to
produce the random intensity light patterns. To provide automation, the IR Proximity sensor will
have a range value in order to detect a finger being present in the scanner. This will act as the
trigger for the device. Once triggered, Processing code on the PC side will send information
needed for producing light patterns and the internal camera will capture the image to the onboard
SD storage device. A total of five samples are captured each having a unique light pattern. At the
conclusion of the capture sequence, the Processing code executing on the PC will begin sending
the secure via the small vibration device embedded in the device. This will only occur if the
user’s finger has remained in the device. The rolling codes are one time use only and the IR
sensor must sense the finger for the duration of their validity and until the user enters the proper
code.
6
INNOVATION BRIEF
7
Here are the circuits for the actual prototype device.
Usage Scenario
1.
2.
3.
4.
5.
6.
Finger is inserted into device.
An LED matrix produces a random pattern of light on the finger at various intensities.
The internal camera captures five images and stores them.
Images are compared offline.
If image is a match, the rolling code is transmitted to the user.
The user enters the proper code and access is granted.
Evaluation Criteria
Non-Static Biometric Identifier will be evaluated using the following criteria.
7
INNOVATION BRIEF






8
Uniqueness - measured by the likely hood that an identical sample could exist in nature.
For example, 1 in 10,000 people born are identical twins, therefor; any identical shared
features would decrease the uniqueness of the identifier as a biometric sample (Sussman,
2010).
Permanence – a biometric trait must be sufficiently invariant over time (Bartlow,
Waymire & Zektser, 2009). For example, a biometric process that measured something
such as finger nail patterns would not be practical. Baseline images would need to be
established on a weekly basis. This would not be easy to maintain or administrate.
Practical/Ease of Use - how easy a process is to perform, has a large impact on its
implementation. If a procedure is lengthy or difficult, it may be counterproductive to its
objectives.
Non-invasive - any biometric identification process must be non-invasive, safe and
utilizes biological features that do not make the individual uncomfortable. For example, it
would be questionable to use a biological characteristic such as the circumference of an
individual’s waist as a method of identification. The biometric identifier should be
something that will be acceptable to any individual regardless of their appearance or
background.
Spoof Resistant - any biometric device or process must with stand the scrutiny of
circumvention as a criterion for evaluation. Spoofing or emulating a biometric trait in
order to fool a device is just one way that a process might be circumvented.
Circumventing in essence refers to the ease with which a trait of an individual can be
imitated. This may include but is not limited to fake fingers or voice pattern replicating
software (Bartlow, Waymire & Zektser, 2009).
Device Criteria - To be viable, a biometric device must needs to be cost effective. If a
system is too expensive it is less likely to be adopted by the industry or consumers.
Consumers also demand aesthetically pleasing form factors for these types of devices.
For example, if a biometric device was a large as a computer desk, it is unlikely to
become a popular method for home computer users. Users demand systems and devices
that are well documented, fool proof, safe, ergonomic, and provide status information
about the devices current state (Nielsen, 1995). For example, if you entered your
username and password into a system and it simply did not respond with any feedback, a
user would most likely become frustrated.
Project Logic Model
Goal
The main goal of this project is to create a device to capture a non-static biometric identifier
based on random light intensity images of the fingertip for verification and authentication
purpose.
Objectives
8
INNOVATION BRIEF
9
The following objectives reflect areas of the device design in the behavioral ground, in its
performance, in the process of image recognition, product’s appearance and its possible
application beyond network security settings. All objectives presented are measurable.





Behavioral. To simplify user-device interaction by creating new software and a hardware
to eliminate several steps that existing devices require and design reliable and low
maintenance solutions to access the system.
Performance. To increase security, accuracy and reliability of Biometric Identifier by
using random intensity light patters to produce a unique image of the fingertip.
Process. To design non-static biometric identifier that provides the access to the network
only during physical presence of a user.
Product. To change the appearance of the existing device by making it more aesthetic
and high tech.
Transference. To expand the application of the product in the variety of settings.
Activities
In order to complete this project the following activities need to take place:
1. Building a team of network security and programming students.
2. Complete the research on the existing similar products.
 Analyze the existing product and distinguish its shortcoming and
inadequacies.
 Create a data base of devices that perform functions required for non-static
identification.
3. Simplify authorized user’s access to the computer system:
o
Design a device to analyze and determine the user’s identity automatically.
 Order the parts necessary to build a prototype such as hardware, the
camera sensors and LED lights, LCD Touch screen
 Create a rough drawings of each circuit
 Download the necessary libraries to make each circuit work
 Assemble the I/O boards
 Design a circuit using IR proximity to automatically sense the user and
activate the system.
4. Satisfy a network security professionals by increasing the level of security and reliability
of the system’s access:
o
Design a device that uses an accurate method of identifying the end user.
 Design an LED light bed
 Design a camera circuit
9
INNOVATION BRIEF




10
Create a circuit to integrate camera and LED light bed
Build these circuits and combine them into a working prototype
Code the functionality of the each circuit
Tie the functions together as a working sketch.
5. For CIO’ satisfaction, provide reliable and low maintenance solutions to access the
system:
o
Design a device using proven technologies in a simple configuration.
 Design all the circuits in the most efficient and logical manner.
6. For CFO satisfaction, provide an affordable solution to access the system:
o
Design a device that could be cheaply produced on a large scale.
 Use parts that are common place and inexpensive in the design.
7. For CEO satisfaction, design a device with a strong network security posture:
o
Design a device that can be proven and accepted by industry.
 Debug device function and code
 Beta test device
 Present Prototype.
8. Monitor the process of the device improvement and correct the mistakes.
9. Create a prototype of the Non-Static Biometric Identifier.
10. Make new aesthetically appealing design of the product.
11. Run multiple tests and correct mistakes modifying the software as well as hardware.
12. Present the Non-Static Biometric Identifier to a group of network security experts.
Description of Design Prototype
Prototype will utilize and Arduino Uno R3 microcontroller, a TTL camera sensor, SD card
reader, IR proximity sensor, LED matrix, a shift register for the LED array and the LCD, small
motor, various diodes, resistors, and capacitors and a small project box to house the circuits with
an opening for finger insertion. Current prototype focuses on random patterns of light at various
intensities to produce a non-static biometric identifier and code communication via the sense of
touch.
Evaluation
The primary innovative component is functional to the degree that it performs the tasks
described. The secondary innovative component functions perfectly as designed. There have
been numerous test runs of both the device and the software in tandem and separately. During
final testing all the basic functions worked during every procedure.
10
INNOVATION BRIEF
11
Project Completion Assessment
This project has been a success with room for refinement. Some of the components needed to
make the images more clear and accurate for comparison are simply too expensive for a student
project. For example a sensor capable of macros and a custom refraction mechanism are a few of
the items lacking to bring the prototype full circle. Another stumbling block was the lack of
tooling available in my shop. The project is sufficient to prove that the primary innovation
concept is viable. I am quite pleased with the performance of the secondary innovation
component. Several test subjects tested the prototype and 100% of those participants were able to
receive the code correctly and enter it in order to gain access to the system. The entire
mechanical and electrical function of the device and the software is a 100% complete.
11
INNOVATION BRIEF
12
Appendices
12
INNOVATION BRIEF
13
References
1. ASTM International. Retrieved on October 18, 2012 from
http://www.astm.org/FAQ/whatisastm_answers.html
2. Bartlow, N., Waymire, D., & Zektser, G. (2009, October 1). Holistic evaluation of
multi-biometric systems. Retrieved February 7, 2012, from NIST:
http://biometrics.nist.gov/cs_links/ibpc2010/pdfs/Bartlow2_Holistic_Evaluation_of_
Multibiometric_Systems_IBPC_2010_Paper.pdf
3. Biometric History. Retrieved on October 31, 2012 from:
http://www.biometrics.gov/Documents/BioHistory.pdf
4. Biometrics. (2002, June 5). Retrieved February 7, 2012, from ieee.org:
http://ewh.ieee.org/r10/bombay/news5/Biometrics.htm
5. Gompers, J. (2003). Biometrics: The Basics. Retrieved on October 17, 2012 from:
http://securitysolutions.com/mag/security_biometrics_basics/
6. Lerner, E. (2011). Biometric Identification. Retrieved on November 2, 2012 from:
http://www.aip.org/tip/INPHFA/vol-6/iss-1/p20.pdf
7. Nielsen, J. (1995, January 1). 10 usability heuristics. Retrieved February 7, 2012,
from http://www.nngroup.com/articles/ten-usability-heuristics/
8. Phillips, J. P., Martin, A., Wilson, C., & Przybocki, M. (2000, February 1). An
introduction to evaluating biometric systems. Retrieved February 7, 2012, from epic:
http://epic.org/privacy/surveillance/spotlight/1105/feret7.pdf
9. Rajan, V. (2011). What Is Biometrics? Retrieved on October 18, 2012 from:
http://www.cse.iitk.ac.in/users/biometrics/pages/what_is_biom_more.htm
13
INNOVATION BRIEF
14
10. Richards, D. (2010). Biometric Identification. Retrieved on October17, 2012 from:
http://www.cccure.org/Documents/HISM/033-037.html#Heading3
11. Rutter, J. (2012). Biometric Tools Used for Network Security. Retrieved on October
12, 2012 from: http://www.ehow.com/list_6304215_biometric-tools-used-networksecurity.html#ixzz29I1cafsd
12. Sidlauskas, D. United States Patent and Trademark Office. “Patent 4,736,203: 3D
hand profile identification apparatus.” 5 April 1988.
13. Sussman, A. (2010, October 7). Methodology for evaluating multi-biometric systems.
Retrieved February 7, 2012, from
http://www.slideshare.net/abelsussman/methodology-for-evaluating-multi-biometricsystems
14. Technopedia. Retrieved on October 31, 2012 from:
http://www.techopedia.com/definition/10239/biometrics
15. Woodward, J., Horn, C., and Gatune, J. (2003). Biometrics. Retrieved on October 12,
2012 from: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA414520
16. Woodward, J., Orlans, M., and Higgins, P. (2003). Biometrics. New York: McGraw
Hill.
14
Download