Iridian Technologies, Inc Iridian Technologies, SA 856-222-9090 Moorestown, NJ USA

advertisement
Iridian Technologies, Inc
Moorestown, NJ USA
Iridian Technologies, SA
Geneva, Switzerland
856-222-9090
866-IRIDIAN (U.S. & Canada)
www.iridiantech.com
Iridian Technologies, Inc
Iris recognition biometric software
Iris
•
•
•
•
•
Privately held
Incorporated 1990, began operations 1993
Merged with Sensar Inc, July 2000
WW headquarters located in Moorestown, NJ
Iridian Technologies SA headquartered in
Geneva, Switzerland
• Holds numerous US & international software
patents
The New Look of Security.
You’ve Probably Heard About Us
•
•
•
•
•
•
•
•
•
Schiphol Airport, Amsterdam*
Heathrow Airport, London
Canadian Airports, Ottawa
Atlanta, Knoxville, Frankfurt
S-Travel, Zurich Switzerland
Singapore/Malaysia borders
The Hajj pilgrimage, Saudi Arabia
The Afghan Girl
US-FAA Secure Executive Toolset
Defense, Army, Navy, data centers, correctional
facilities, public utilities
* Access & border crossing implemented by Schiphol Group, CMG, and Joh Enschede
The New Look of Security.
The Netherlands
• “Privium” implemented by the Schiphol Group,
JESS, and CMG
– $89 charge, convenient parking at Schiphol, lounge
access
• Installed kiosks and turnstiles using 1:1
verification via a smart card
• Used to enter and exit country
– Includes one-stop immigration and security lane
during exit
• As of March 2002, 2,000+ enrolled, averaging
10,000 transactions per month
The New Look of Security.
Canada
• Iridian’s iris recognition technology and
certified hardware/software were specified in
recent CCRA EPPS RFP
– Implementation expected to begin Summer 2002
in 2 airports growing to 8
• Similar user design as The Netherlands
except central database enrollment
Iridian’s iris recognition being tested “to meet the Canadian government’s
requirement for technology aimed at EPPS, an Expedited Passenger
Processing System. EPPS will eventually allow pre-approved travelers
to clear customs more smoothly.” - The Ottawa Citizen March 5, 2002
The New Look of Security.
User authentication is the key to a business’ secure
physical and logical perimeters.
Traditional security devices or procedures allow the
user to be the weakest link in the security model.
Positive authentication is needed because it enables
authorization and administration procedures.
Iris Recognition delivers positive authentication.
The New Look of Security.
Source: The New Yorker
The New Look of Security.
Security-Privacy-Convenience
Before September 11, 2001
No America
E ME A
Asia
1. Convenience
1. Security
1. Security
2. Privacy
2. Privacy
2. Convenience
3. Security
3. Convenience
3. Privacy
The New Look of Security.
Security-Privacy-Convenience
Post September 11, 2001
No America
E ME A
Asia
1. Security
1. Security
1. Security
2/3. Privacy
2. Privacy
2. Convenience
2/3. Convenience
3. Convenience
3. Privacy
The New Look of Security.
To Conduct Secure Business
1. Authenticate the point of entry
– At the sender & receiver nodes
– At the door or gate
2. Authorize the action
– Privilege the “right” to gain access
3. Administer the policies
– Secure the data transport
– Database management with privacy
* Access & border crossing implemented by Schiphol Group, CMG, and Joh Enschede
The New Look of Security.
Biometric Types
• Iris Recognition – uses a video camera to pinpoint the
independent coordinates of the iris of the eye
• Face – defines a dozen or so points on the face and measures
the distance between them
• Fingerprints – looks for pattern ends and their changes in
direction
• Hand – measures the size and angles of a person’s hand
features
• Voice – analyzes the sound waves and speech patterns of a
recorded voice
• Others – signature, retinal scan, keyboard
The New Look of Security.
How to Measure a Biometric
• False Acceptance Rate (FAR) – accepting users
who it shouldn’t accept
• False Rejection Rate (FRR) – rejecting users who it
should accept
• Outlier Population – the percentage of people who
cannot use the biometric because they do not have
the characteristic
• Storage and Matching - the business application
should determine to use either verification or
identification or both
The New Look of Security.
Authentication
ALL biometrics can verify
• Verification asks: “Does this live record match a particular stored
value?”
– It requires a password or PIN or token to suggest a pointer, then
the system verifies the match.
• Verification answers: “It is or is not a match.”
Iris Recognition identifies
• Identification asks: “WHO is this person?”
– It does not require a password or PIN or token because it finds the
person by doing an exhaustive search of the database.
• Identification answers:
– “This is so-and-so” OR
– “This record is valid and is approved for processing”
The New Look of Security.
Security and Privacy can be
Balanced if
• The biometric and application align
– Iris recognition requires user participation – “opt-in”
– Some biometrics are passive
• Data integrity is assured
-
In systems architecture
In the template
In transactions
In storage
• Data managers follow policies
The New Look of Security.
The Iris is NOT the Retina
Sclera
Choroid
Iris
Aqueous
Humor
Optic
Nerve
Cornea
Retina
Ciliary Muscle
Lens
The New Look of Security.
How Iris Recognition Works
1. Uses a video image of the iris
2. Analyzes the iris patterns, preparation for
secure transport
3. Creates a 512 byte IrisCodeR template to
describe the patterns
4. Matches the code to all IrisCodes
in a database/file
5. Accepts or rejects individual
The New Look of Security.
Common Platform
Network
Walkup
Desktop
Personal
Physical Access
Kiosk
Gate/Perimeters
Information Access
Single Sign On/Off
Domain Log-on
Information Access
Transactions
Single Sign On
Network
Network
The New Look of Security.
Client or Camera Resident Software
• Image capture and evaluation, image compression
• Image security preparation for transport including
countermeasures and permutations
• Offers 3DES encryption at API
• Some cameras use PrivateID to support internet
video conferencing, video capture/editing, and video
e-mail applications
• Drivers support multiple Windows versions
• Using APIs, can be used with smart cards, passports,
LAN/WAN logon, digital document signing, ecommerce transaction authorization etc
The New Look of Security.
Secure Authentication Server
KnoWho
Authentication
Server
•
Application
Servers
•
Accepts secured iris image from
PrivateidTM
Creates IrisCodeR and performs
matching algorithms
–
Windows
Desktop
•
Can perform identification (1:n) or
verification (1:1)
Offers 3DES encryption at API and
database
– Supports Oracle or SQL db
ODBC
Database
Oracle, MS-SQL
•
Internet Connection
Currently runs on NT 4.0, W2000
– Linux and Solaris shortly
www
•
•
Sold as whole unit or as a kit
Priced per user (1 user = 2
IrisCodesR)
The New Look of Security.
LG IrisAccessTM 2200
powered by xxxxxxxx
Walk-up Applications
Facility access
Immigration/airport security
Data centers
Utility & power plants
Prison book/release
Time & attendance
Benefits
Audio instructions
Auto focus
View 3 to 12 inches
Small size
The New Look of Security.
Oki-Panasonic BM-ET500TM
powered by xxxxxxxx
Walk-up Applications
Immigration/airport security
Gate control
Utility & power plants
Prison book/release
Time & attendance
Benefits
Two-iris recognition
Stand up to a meter away
Auto focus
Surveillance
Face image capture
The New Look of Security.
Panasonic AuthenticamTM
powered by PrivateIDTM
Desktop Applications
Local logon
Domain logon
Single Sign On
LAN administration
Desktop security
Benefits
Amber/green LED
View 19 to 21 inches
Small size
Video conferencing
Available at Enterprise Resellers
The New Look of Security.
Application Integration
Architecture
The New Look of Security.
Partnerships
The New Look of Security.
To Conduct Secure Business
1. Authenticate the point of entry
– At the sender & receiver nodes
– At the door or gate
2. Authorize the action
– Privilege the “right” to gain access
3. Administer the policies
– Secure the data transport
– Database management with privacy
Iris Recognition delivers positive authentication.
The New Look of Security.
Download