Biometrics Dale Gibler,B.S.,CMA,CCP Modified January 2001 Some typical biometrics Primarily Physical Features – Hand based • Fingerprint or fingerscan • Hand geometry – Face/eye • Facial recognition • Retinal scans • Iris scans Strong Behavioral Component – Voice recognition – Signature recognition , which includes *how* the signature is produced (pressure, speed, stroke order ) and not just how the signature looks Who is taking the lead? USA is not the most advanced user of this technology – Japan has been using retinal and/or iris scans for bank ID since before ‘97 – Malaysian airport uses face recognition for baggage claim “Blacklisting” Troublesome Patrons? Fifteen Netherland nightclubs are testing this system: – First time patrons register at a Kiosk input personal data, have their face and fingerprints scanned, and are issued a Smartcard with that info by mail – Repeat customers go to a second kiosk and swipe the card/present their face and fingerprints, and are matched against both a central blacklist and a “per-club” blacklist also info about prohibited hard drug dealer – Intrastat handles the databases (both blacklists and regular patrons) for the clubs Cost is high ($60K-$120K per club) – Possible side benefits include collection of demographics for patrons – Club owners promise not to release the data How does this work? Some aspects are quite similar to standard authentication procedures – Calibrate and store user information – Storage styles vary: • Common way in ‘99 was to emcrypt user biometric information and store it • Alternate method would be to store a validator for the biometric information (hash, MD, Unix-style validator) – Authenticate “as usual” • User “inputs” biometric info – (this might not be overt, and might not be a single event) • Proceed as with password techniques. Matches are statistical probabilities of Identifying information is not typed in, but instead is obtained by device – Characteristics usually “mapped” from analog to digital and not all of the original information is retained – Devices for most common biometrics are not likely to produce identical results or even identically repeatable results • Ex: fingerprint readers are somewhat dependent environmental factors such as the positioning of the finger, the “moisture” of the hand, oils, and occupational issues which may cause a print to be roughened over time [this is leaving out the question of discovered passwords Storage Requirements are Higher “Size” of the template as stored can be quite large in comparison with a password and is not necessarily directly tied to the accuracy Some typical template sizes: – – – – Fingerscan: 250 - 100 bytes Hand geometry: 9-20 bytes Iris: 512 bytes Retina: 96 bytes Customer Acceptance and Convenience Privacy issues are an even greater concern than for passwords because of the personal nature of a biometric Does reduce reliance on customer memory Often considered more convenient than a smartcard (nothing to carry or lose) Some of the collection means are invasive or hard to use Some enrollment styles are awkward or timeconsuming Some biometrics can change considerably over a lifetime (others are fairly stable except for accident or disease) Not all people can be identified by all biometrics – Ex: injuries, aging (or youth), disease Devices Usually Required The device collecting the data probably is proprietary and/or uses proprietary algorithms Patents protect much of the technology There may be considerable computation involved in computing a “validator” or template for storage (far beyond the Unix validator) Sometimes the biometric requires local installation of a specialized reader device but not all (such as for fingerprints, but not for voice, which is why Chase is using that) Population Acceptance “Chase's research found 95% of consumers would accept voice verification, compared with 80% accepting fingerprinting.” [1] "the first application of biometrics here was in 1968: a Wall Street brokerage used fingerprints to open the vault where the stock certificates were held. That application, cost $20,000 in 1968. It would probably cost $1,700 today, and by the year 2000, it'll probably cost just $300." -- ‘97 article [1] People have interesting preferences! According to the IBG's Consumer Response to Biometrics, people did not like facial scans as much as fingerprints as a substitute for a PIN in ATM, but both technologies rated between “somewhat comfortable” and “neutral” Reasons seemed to be these: – People don’t like to look at their own images in low resolution – People don’t like their picture taken – People don’t recognize “facial id” as an authenticator in the same way they recognize fingerprints – Facial scans don’t require consent (ie, hidden cameras) Big Business! “In 2000, total revenue for biometric hardware and software was $110 million, an increase of nearly 50% over a year ago. Total revenue is expected to grow to $594 million by 2003” [3] Who is using them? FCW.com January 4, 2001: “NASA’s Goddard Space Flight Center in Maryland wants its technicians and scientists to be "biometrically authenticated from the road or home," Europe “By the end of the forecast period in 2006, the fingerprint will account for nearly half of total sales in the biometric ID market, with voice authentication ranking in second position.” [6] Fingerprint Recognition Password and/or fingerprint Scan takes about 1 second Size roughly 250-1000 bytes for fingerprints (overall) Rayco Security Technically, most commercial use nowadays is finger scanning Finger print technology captures a representation of the finger; it involves storing the image of the finger and comparing. – Finger print storage can be close to 250 *K* bytes – AFIS “Automated Fingerprint Identification System” is the law enforcement tool used either to identify a fingerprint’s maker or to confirm prints Finger scan technology involves capturing /storing characteristics of the finger – Storage requirements usually 250-1000 bytes http://www.finger-scan.com/finger-scan_technology.htm Fingerprint Scanners The technology isn’t very expensive anymore - scanning devices can be purchased for less than $150. Precise Biometrics “IDMEE Scanner is a biometrics identification fingerprint scanning system designed to be a cost-effective biometrics security and convenience tool for individual computer workstations, networks, the Internet and OEM development. The IDMEE Scanner easily installs on a PC through a standard parallel port connection and is powered by either the PC’s keyboard or PS2 mouse connection. The IDMEE Scanner also has a RJ45 input port for an optional video camera, which can be used for performing visual face verification” www.biometrickey.com Using the scanner (from www.precisebiometrics.com) Speed and Accuracy Claims Most manufacturers claim high accuracy – False acceptance rates < 1 in 100,000 – False rejection rates < 1 in 100 Realtime speeds – <1 second to recognize – <5 seconds to enroll Issues: Storing Fingerprint data One concern with the original fingerprint devices was that they gave employer a representation of your fingerprint, which might be used in other contexts. Newer technologies don’t store the fingerprint -- “Vector Line Type” representations are one solution, where the characteristics are stored (not the representation). Stored characteristics in the Vector Line model are based on the common line forms of fingerprints - whorls, arches, etc The scan is converted from raster (dots) to a vector approx. Combined Systems The biomouse.com system’s BioMouse combines a scanner and a smartcard. The validation process here checks to be sure that the fingerprint matches that of the registered smartcard *bearer* partially intended to speed the process, partially intended to provide flexibility, and partially to provide some potential for privacy. Hand Geometry Rayco Hand geometry reader Hand Scans See [10] for more information – Not the most accurate but not bad; since hands tend to be similar, it doesn’t do well in a “discovery” (“identify”) mode – Storage requirements about 9-20 bytes – Usually a specialized reader device to measure aspects such as length, width, thickness, and surface area of the hand and fingers – Somewhat pricey - $1400+ Hotel Smartcard “Lock maintains an audit trail of the last 256 accesses including date, time, type of key card.” from Biometrics2000 Typing “Net Nanny cast its offering into the market with BioPassword LogOn for Windows NT. The client/server biometrics application recognizes a user's typing pattern and uses it to authenticate them to the network. The software uses a mathematical algorithm to record pressure, speed, and rhythm as a user types their user name and password. The typing pattern is compared against a template created when the software is initially installed” [3] (note software cost is under $90) Iris Scan Gather data by a camera within 3 feet of eye 512 byte IrisCode represents the visible characteristics of the eye It is claimed that the odds of the same IrisCode being returned by two different people is less than 1 in 10^(52) IrisCode includes “266 spots” to distinguish between irises (claim is most other biometrics have between 10-60 distinguishing spots) IrisCode may vary by as much as 25% for a given eye … but the odds of two different eyes being 75% similar is said to be 1 in 10^(16), so this seems acceptable Retinal Scan Template size small - 96 bytes Very accurate representation Changes likely only from degenerative diseases Fairly expensive - $2K range Harder to use than most and requires participant cooperation Combined Solutions and Spinoff businesses “Advanced Biometrics inc. is developing biometric track ball and mouse technology to be used in identification and authentication. – The track ball or mouse … maps the substructure of the human hand by measuring veins, deep creases, scars and fatty tissue density through infrared light. – … spun off a separate company, called DigiKnox, to be the central data storage warehouse for the potential millions of substructure scans. Officials said DigiKnox will purchase a bank to warehouse the database servers in an actual vault.” [7] BioAPI Organization started in ‘98 – “Achieve plug and play” between vendor implementations V 1.0 released March 2000 – Primitives for Enrollment, Verification, Identification – BSP (Biometric Service Provider) database interface – Primitives for capturing “samples” from client and enrollment/verification/ident on server BioAPI -- Enrollment Methodology – Capture of samples from device – Extract features of importance – Combine features to form a “template” using some algorithm (which is likely to be proprietary and device-specific) This is essentially the “password” BioAPI -- Verification Methodology – Capture of user samples from device – Extract features of importance – Combine features to form a “template” using some algorithm (which is likely to be proprietary and device-specific) – Compare to existing template for this user to determine whether it matches This is the “verification of user identity” step BioAPI -- Identification Methodology – Capture of user samples from device – Extract features of importance – Combine features to form a “template” using some algorithm (which is likely to be proprietary and device-specific) – Compare to existing population of templates to determine closest match and deduce user identity This is the “discovery of identity” step Biometric ID Record (BIR) Controversies - Schneier [4] “Biometrics is also lousy because biometric measurements are so easy to forge. It's easy to steal a biometric after the measurement is taken. In all of the applications discussed above, the verifier needs to verify not only that the biometric is accurate but that it has been input correctly.” Schneier “Which brings us to the second major problem with biometrics -- it doesn't handle failure very well. Imagine that Alice is using her thumbprint as a biometric, and someone steals it. Now what? This isn't a digital certificate, where some trusted third party can issue her another one. This is her thumb. She only has two. Once someone steals your biometric, it remains stolen for life; there's no getting back to a secure situation.” Schneier But Also: Saito [5] “How can we protect ourselves online without using a multitude of different passwords? Biometrics is the answer.” References NIST Biometrics Consortium Working Group – http://www.itl.nist.gov/div895/isis/bcwg/ Biometric Consortium – http://www.biometrics.org/ AVANTI Biometrics research site – http://homepage.ntlworld.com/avanti/ BioAPI – http://www.bioapi.org/ Precise Biometrics – http://www.precisebiometrics.org/ The Biometrics Digest – http://webusers.anet-stl.com/~wrogers/biometrics/ Book: – Biometrics - Advanced Identity Verification, J. Ashbourn Springer-Verlag, Oct 2000. Articles [1] Banking and biometrics – http://www.banking.com/aba/cover_0197.htm – ABA Banking Journal, January 1997. [2] Encrypted signatures enable paperless loan syndications – http://www.banking.com/aba/webnotes_0399.asp – ABA Banking Journal, March 1999. [3] Biometrics software aimed at improving Windows NT security – Inforworld.com, Dec 21, 2000 [4] Biometrics: Truths and Fiction – Bruce Schneier, TechTV, Dec 15, 2000 [5] William Saito on the Potential of Biometrics – Saito, TechTV, Dec 15, 2000 [6] Biometrics Devices Ready to Hit the Mass Market – Frost and Sullivan press release – 3584-11 - European Biometric Identification Markets More Articles [7] Advanced Biometrics gives security a hand – ZDNet November 30, 2000 [8] Biometrics Industry – April 1999 – http://www.livegrip.com/biometrics_industry.htm [9] Dutch Biometrics A Go-Go – Wired, November 8, 2000 [10] Daughen’s patents on iris scans – http://www.cl.cam.ac.uk/users/jgd1000,