Iridian Technologies, Inc Moorestown, NJ USA Iridian Technologies, SA Geneva, Switzerland 856-222-9090 866-IRIDIAN (U.S. & Canada) www.iridiantech.com Iridian Technologies, Inc Iris recognition biometric software Iris • • • • • Privately held Incorporated 1990, began operations 1993 Merged with Sensar Inc, July 2000 WW headquarters located in Moorestown, NJ Iridian Technologies SA headquartered in Geneva, Switzerland • Holds numerous US & international software patents The New Look of Security. You’ve Probably Heard About Us • • • • • • • • • Schiphol Airport, Amsterdam* Heathrow Airport, London Canadian Airports, Ottawa Atlanta, Knoxville, Frankfurt S-Travel, Zurich Switzerland Singapore/Malaysia borders The Hajj pilgrimage, Saudi Arabia The Afghan Girl US-FAA Secure Executive Toolset Defense, Army, Navy, data centers, correctional facilities, public utilities * Access & border crossing implemented by Schiphol Group, CMG, and Joh Enschede The New Look of Security. The Netherlands • “Privium” implemented by the Schiphol Group, JESS, and CMG – $89 charge, convenient parking at Schiphol, lounge access • Installed kiosks and turnstiles using 1:1 verification via a smart card • Used to enter and exit country – Includes one-stop immigration and security lane during exit • As of March 2002, 2,000+ enrolled, averaging 10,000 transactions per month The New Look of Security. Canada • Iridian’s iris recognition technology and certified hardware/software were specified in recent CCRA EPPS RFP – Implementation expected to begin Summer 2002 in 2 airports growing to 8 • Similar user design as The Netherlands except central database enrollment Iridian’s iris recognition being tested “to meet the Canadian government’s requirement for technology aimed at EPPS, an Expedited Passenger Processing System. EPPS will eventually allow pre-approved travelers to clear customs more smoothly.” - The Ottawa Citizen March 5, 2002 The New Look of Security. User authentication is the key to a business’ secure physical and logical perimeters. Traditional security devices or procedures allow the user to be the weakest link in the security model. Positive authentication is needed because it enables authorization and administration procedures. Iris Recognition delivers positive authentication. The New Look of Security. Source: The New Yorker The New Look of Security. Security-Privacy-Convenience Before September 11, 2001 No America E ME A Asia 1. Convenience 1. Security 1. Security 2. Privacy 2. Privacy 2. Convenience 3. Security 3. Convenience 3. Privacy The New Look of Security. Security-Privacy-Convenience Post September 11, 2001 No America E ME A Asia 1. Security 1. Security 1. Security 2/3. Privacy 2. Privacy 2. Convenience 2/3. Convenience 3. Convenience 3. Privacy The New Look of Security. To Conduct Secure Business 1. Authenticate the point of entry – At the sender & receiver nodes – At the door or gate 2. Authorize the action – Privilege the “right” to gain access 3. Administer the policies – Secure the data transport – Database management with privacy * Access & border crossing implemented by Schiphol Group, CMG, and Joh Enschede The New Look of Security. Biometric Types • Iris Recognition – uses a video camera to pinpoint the independent coordinates of the iris of the eye • Face – defines a dozen or so points on the face and measures the distance between them • Fingerprints – looks for pattern ends and their changes in direction • Hand – measures the size and angles of a person’s hand features • Voice – analyzes the sound waves and speech patterns of a recorded voice • Others – signature, retinal scan, keyboard The New Look of Security. How to Measure a Biometric • False Acceptance Rate (FAR) – accepting users who it shouldn’t accept • False Rejection Rate (FRR) – rejecting users who it should accept • Outlier Population – the percentage of people who cannot use the biometric because they do not have the characteristic • Storage and Matching - the business application should determine to use either verification or identification or both The New Look of Security. Authentication ALL biometrics can verify • Verification asks: “Does this live record match a particular stored value?” – It requires a password or PIN or token to suggest a pointer, then the system verifies the match. • Verification answers: “It is or is not a match.” Iris Recognition identifies • Identification asks: “WHO is this person?” – It does not require a password or PIN or token because it finds the person by doing an exhaustive search of the database. • Identification answers: – “This is so-and-so” OR – “This record is valid and is approved for processing” The New Look of Security. Security and Privacy can be Balanced if • The biometric and application align – Iris recognition requires user participation – “opt-in” – Some biometrics are passive • Data integrity is assured - In systems architecture In the template In transactions In storage • Data managers follow policies The New Look of Security. The Iris is NOT the Retina Sclera Choroid Iris Aqueous Humor Optic Nerve Cornea Retina Ciliary Muscle Lens The New Look of Security. How Iris Recognition Works 1. Uses a video image of the iris 2. Analyzes the iris patterns, preparation for secure transport 3. Creates a 512 byte IrisCodeR template to describe the patterns 4. Matches the code to all IrisCodes in a database/file 5. Accepts or rejects individual The New Look of Security. Common Platform Network Walkup Desktop Personal Physical Access Kiosk Gate/Perimeters Information Access Single Sign On/Off Domain Log-on Information Access Transactions Single Sign On Network Network The New Look of Security. Client or Camera Resident Software • Image capture and evaluation, image compression • Image security preparation for transport including countermeasures and permutations • Offers 3DES encryption at API • Some cameras use PrivateID to support internet video conferencing, video capture/editing, and video e-mail applications • Drivers support multiple Windows versions • Using APIs, can be used with smart cards, passports, LAN/WAN logon, digital document signing, ecommerce transaction authorization etc The New Look of Security. Secure Authentication Server KnoWho Authentication Server • Application Servers • Accepts secured iris image from PrivateidTM Creates IrisCodeR and performs matching algorithms – Windows Desktop • Can perform identification (1:n) or verification (1:1) Offers 3DES encryption at API and database – Supports Oracle or SQL db ODBC Database Oracle, MS-SQL • Internet Connection Currently runs on NT 4.0, W2000 – Linux and Solaris shortly www • • Sold as whole unit or as a kit Priced per user (1 user = 2 IrisCodesR) The New Look of Security. LG IrisAccessTM 2200 powered by xxxxxxxx Walk-up Applications Facility access Immigration/airport security Data centers Utility & power plants Prison book/release Time & attendance Benefits Audio instructions Auto focus View 3 to 12 inches Small size The New Look of Security. Oki-Panasonic BM-ET500TM powered by xxxxxxxx Walk-up Applications Immigration/airport security Gate control Utility & power plants Prison book/release Time & attendance Benefits Two-iris recognition Stand up to a meter away Auto focus Surveillance Face image capture The New Look of Security. Panasonic AuthenticamTM powered by PrivateIDTM Desktop Applications Local logon Domain logon Single Sign On LAN administration Desktop security Benefits Amber/green LED View 19 to 21 inches Small size Video conferencing Available at Enterprise Resellers The New Look of Security. Application Integration Architecture The New Look of Security. Partnerships The New Look of Security. To Conduct Secure Business 1. Authenticate the point of entry – At the sender & receiver nodes – At the door or gate 2. Authorize the action – Privilege the “right” to gain access 3. Administer the policies – Secure the data transport – Database management with privacy Iris Recognition delivers positive authentication. The New Look of Security.