DOC PREVIEW
UTD CS 6V81 - Lecture #15 Biometrics Applications - I

This preview shows page 1-2-3-4-5-6 out of 18 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Introduction to BiometricsOutlineReferencesTypes of ApplicationsTypes of Applications (Continued)Types of Applications (Concluded)Some Government ApplicationsSome Government Applications (Continued)Slide 9Slide 10Some Government Applications (Concluded)Grouping Biometrics ApplicationsAdditional Criteria for Understanding Biometric SystemsSeven Horizontal ClassificationsSeven Horizontal Classifications (Concluded)Biometrics Solution MatrixGroups of ApplicationsPlan for Remaining Lectures (Tentative)Introduction to BiometricsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #15Biometrics Applications - IOctober 17, 2005OutlineTypes of ApplicationsExample Government ApplicationsGrouping of ApplicationsPlan for next few lecturesReferencesCourse Text Book, Chapter 10http://www.biometricgroup.com/applications.htmlhttp://www.biometrics.org/REPORTS/CTSTG96/Types of ApplicationsIdentification Systems -Biometrics are increasingly integrated into large-scale systems for drivers’ licensing, surveillance, health and identity cards, and benefits issuance. -The need for singular identification and transactional verification has emerged in various public and private sector environments. IT/Network Security -As more and more valuable information is made accessible to employees via LAN and WAN, the risks associated with unauthorized access to sensitive data grow larger. -Protecting your network with passwords is problematic, as passwords are easily compromised, lost, or inappropriately shared.Types of Applications (Continued)e-Commerce and Internet -Biometrics are being positioned as a solution for e-Commerce and Internet security, designed to ensure that only authorized individuals can access sensitive data or execute transactions. Access Control -Biometrics have proven to be an effective solution for high-security access control, ensuring that only authorized individuals can access protected or secure areas. -Biometric systems require controlled and accurate enrollment processes, careful monitoring of security settings to ensure that the risk of unauthorized entry is low, and well-designed interfaces to ensure rapid acquisition and matchingTypes of Applications (Concluded)Smart Cards -Biometrics are an authentication technology; smart cards can be a storage, processing, and/or authentication technology.- In certain applications, the two technologies compete, such that an institution may deploy smart cards instead of biometrics for access control, or vice versa. -Increasingly, the two technologies are deployed in conjunction, strengthening each other’s capabilities.Some Government ApplicationsImmigration and Naturalization Service's (INS) Passenger Accelerated Service System (INSPASS)-INSPASS was designed as a means to provide prompt admission for frequent travelers to the US by allowing them to bypass the personal interview/inspection part of the entry process. It uses hand geometry to verify the identity of the traveler at an automated inspection station. CANPASS -It is the Canadian version of INSPASS, except that it uses a fingerprint biometric, rather than hand geometry, for traveler verification. The goal of CANPASS is to ease the transfer of goods and people between the US and CanadaSome Government Applications (Continued)PORTPASS-It is another INS initiative similar to INSPASS except that people in vehicles at borders are being monitored and it uses a voice recognition biometric, instead of hand geometry. -PORTPASS is used at a US/Canadian vehicle border crossing and is planned for use at US/Mexican border crossings. -One version of PORTPASS (the Automated Permit Port) requires the vehicle to stop. It will also have a Video Inspection Service, allowing a driver to conference with an Inspector should the biometric fail. -Another version, known as the Dedicated Commuter Lane, uses a radio frequency tag affixed to the vehicle in order to obtain the biometric as the vehicle is moving.Some Government Applications (Continued)Federal Bureau of Prisons-The Federal Bureau of Prisons is using hand geometry units to monitor the movements of prisoners, staff, and visitors within certain Federal prisons. -Visitors must enroll upon arrival and are given a magnetic stripe card containing information that points to his/her identifying information in a central database. This card must be carried with the visitor at all times-Staff and inmates must also enroll. Staff are enrolled to reduce the possibility of mistakenly identifying them as an inmate or for positive identification in the event of a disturbance. -Prisoners are enrolled for access control to places such as the cafeteria, recreation lounges, and the hospital. The system also allows for the tracking of prisoners' movements.Some Government Applications (Continued)Automated Fingerprint Image Reporting and Match (AFIRM)-The fingerprints of new applicants for welfare benefits are checked against a central database of prior claimants.Spanish National Social Security Identification Card (TASS)-The TASS program is a smart card initiative employing fingerprint technology to eliminate enrollment duplication and provide secure access to personal information upon retrieval. The Colombian Legislature-The Colombian Legislature uses hand geometry units to confirm the identity of the members of its two assemblies immediately prior to a vote.Some Government Applications (Concluded)Some Other Applications-California, Colorado, Florida, and Texas Departments of Motor Vehicles, Government Accounting Office's Electronic Benefits Transfer (EBT) Task Force, FBI's Integrated Automated Fingerprint Identification System (IAFIS), National Crime Information Center 2000 (NCIC 2000) Other Agencies-The Defense Advanced Research Projects Agency, Drug Enforcement Agency, Department of Defense, Department of Energy, Department of Public Safety, Department of State, Federal Bureau of Investigation, Federal Reserve Bank, Hill Air Force Base, the Pentagon, and the US Mint have several biometric devices with numerous users for access control applicationsGrouping Biometrics ApplicationsThree Categories of Applications(1) Logical Access Applications(2) Physical Access Applications(3) Identify or Verify the Identity of IndividualsAdditional Criteria for Understanding Biometric SystemsIn what manner does the user interact with the system?Does the use claim identity before interacting


View Full Document

UTD CS 6V81 - Lecture #15 Biometrics Applications - I

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Lecture #15 Biometrics Applications - I
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #15 Biometrics Applications - I and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #15 Biometrics Applications - I 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?