180 likes | 386 Views
Josh Tate. Stuff and things about things and stuff. Josh Tate. Advanced Authentication: A more secure way of identifying yourself. Advanced Authentication. Introduction. Very broad subject and highly researched. Focused on topics that could be quick to implement and (somewhat) inexpensive.
E N D
Josh Tate Stuff and things about things and stuff
Josh Tate Advanced Authentication: A more secure way of identifying yourself
Advanced Authentication Introduction • Very broad subject and highly researched. • Focused on topics that could be quick to implement and (somewhat) inexpensive. • Solutions that could be used at home/work/public.
Advanced Authentication What is Authentication: • Most common ways to authenticate today: Something you know Something you know/have Something you have ?
Advanced Authentication What is Authentication: (easily)
Advanced Authentication Authentication Methods I will cover: • Fingerprint / Knuckle Identification • Fingerprint & smart card combinations • EyePassShape
Advanced Authentication Fingerprint / Knuckle Identification • “No two fingerprints have ever been found alike in many billions of human and automated computer comparisons. Fingerprints are the very basis for criminal history foundation at every police agency on earth. Fingerprinting established the first forensic professional organization, the International Association for Identification (IAI), in 1915.” [1] • Researchers noticed that fingerprints could uniquely identify people as early as the 1800’s.
Advanced Authentication Fingerprint / Knuckle Identification
Advanced Authentication Fingerprint / Knuckle Identification
Advanced Authentication Fingerprint & smart card combinations • Very secure because it combines all 3 authentication techniques (are/have/know) • The research paper pitched this idea as a replacement for Passports / Drivers License / Credit Cards etc. • Stolen Wallet?
Advanced Authentication Fingerprint & smart card combinations
Advanced Authentication EyePassShape • Public authentication is time-critical. • Authentication token should be easy to remember. • Authentication has to be secure. • Authentication methods have to be easily deployable .
Advanced Authentication EyePassShape EyePIN Not very Time-Critical Very Secure Pass Shape Not very Secure Very Fast Both are easy to deploy and are easy to remember
Advanced Authentication EyePassShape • Fast • Easy to Remember • Secure • Deployable
Advanced Authentication EyePassShape
Advanced Authentication EyePassShape
Advanced Authentication References [1] The History of Fingerprints, January 2012, http://onin.com/fp/fphistory.html [2] Biometric Education » Fingerprint, http://www.barcode.ro/tutorials/biometrics/fingerprint.html [3] Pallav Gupta, Srivaths Ravi, Anand R, Kiral K. Jha, Efficient fingerprint-based user authentication for embedded systemsmDAC 2005 Proceedings of the 42nd annual Design Automation Conference, 244-247. [4] Lionel Beauge, AndrzejDrygallo, 2010, Fully featured secure biometric smart card device for fingerprint-based authentication and identification, MM&Sec 2010 Proceedings of the 12th ACM workshop on multimedia and security, 181-186. [5] Alexander De Luca, Martin Denzel, Heinrich Hussmann, 2009, Look Into My Eyes!: can you guess my password?, SOUPS 2009 5th Symposium on Usable Privacy and Security, Article 8.