SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
bioChec



 bioChec™
Keystroke Biometric
     Solutions
Biometric Definitions                                  bioChec

    Physical Biometrics

    – Defined as the statistical analysis of biological
      observations and phenomena

    – Characteristics:
       • Measurement of biological aspects of a person that
         determine identity
       • Static measurement
       • Absolute match

    – Examples:
       • DNA, Retina, Fingerprint, Vein structure
Biometric Classifications                               bioChec

    Behavioral Biometrics

    – Defined as the collection and classification of a
      series of intrinsic patterns displayed

    – Characteristics:
       • Measurement of characteristic traits exhibited by a
         person that can determine identity
       • Dynamic measurement
       • Confidence match

    – Examples:
       • Speech Recognition, Handwriting Analysis, Keystroke
         Biometrics, Facial Recognition
Software-Only Biometrics                                         bioChec

      “Keystroke Biometrics” is a behavioral biometric
   which creates a statistically unique signature from the
     typing patterns of an individual without the use of
                   specialized hardware.

    Keystroke Biometrics is a proven technology:

       • 1979: Technology originally developed by SRI International.
       • 1980: National Bureau of Standards (NBS) study concluded that
         computer keystroke authentication of 98% accuracy.
       …
       • 2009: bioChec granted U.S. Patent 7,509,686
Statistical Confidence Levels                                                 bioChec
  Fingerprint
    – Physical biometric
        • FAR= ~0%
        • FRR= ~1%
    – Uniqueness= 1 : 2980232238769531250x1024
  Keystroke Biometrics
    – Behavioral biometric
        • FAR = ~ 0.01%*
        • FRR = ~3.0%*
        • Crossover Rate = ~1.6%*
    – *Tweakable, Application-Defined
  Facial Recognition
    – Physical biometric
        • FAR / FRR vary significantly according to compression, distance, illumination,
          media, pose, resolution, and other temporal factors.

  Voice Recognition
    – Behavioral biometric
        • FAR = ~1.6%
        • FRR = ~8.1%
Software-Only Biometrics                                  bioChec

  Deploying software-only keystroke biometric solutions
    into an existing network infrastructure is a seamless
    and cost-effective way to augment corporate security.

     – No physical client-side deployment for installations or
       upgrades.
     – Users are not limited to individual or specific workstations.
     – Server and/or workstation managed levels of security.
     – Software components allow integration into multiple projects.
bioChec




bioChec™ as a Solution Provider
Business Concept                         bioChec

 bioChec™ addresses both product and
   service areas of biometric solutions

   bioChec™ provides a patented software-
     only biometric technology that is minimally
     invasive and easily deployable to a large
     community of users.

   bioChec™ provides SaaS fulfillment service
     for enhanced security solution provider
     implementations.
Product Offerings                        bioChec

  Custom Application Development
    – bioChecKey™ Keystroke Biometrics SDK

  Web-Based Intranets and Extranets
    – bioChec Online! ™


  Legacy Applications:
     – bioChec GINA! ™
bioChecKey™ Biometrics Engine                                                 bioChec
  Software-Only SDK
      –   Win32, Linux or Unix, Java (via JNI)

  Dialog Input Field Hooks (Win32, QT3, QT4, X11)
      –   Allows Rapid Application Development

  Adjustable Verification/Enrollment Parameters
      –   Tweak Implementations to your needs

  Expirational Encryption™ Technology
      –   Limits data decryption to N seconds to prevent stream hijacks

  Adaptive Template™ Technology
      –   Increases Template Strength with every successful login

  Dynamic Enrollment™
      –   For Initial Deployments, negates need for explicit enrollment

  Password Hardening (bioChec GINA! only)
      –   Replaces normal password with a bioChec-only password.
      –   Prevents all non-bioChec authentication (even Windows® Repair Console).
      –   Can recreates a new random password on every template update.
      –   Effectively isolates Windows® workstation from incoming access.
bioChec Online! ™                                            bioChec
  Online Authorization
     – Non-Invasive Client-Side deployment
         • Flash
         • Java Applet

     – Simple integration into existing infrastructures
         • WS-*
         • SaaS
         • Custom

     – Administrative Features
         • Adjustable Verification / Enrollment Parameters
         • Adaptive Template™ Technology
         • Dynamic Enrollment™ option

     – Security Features
         • Expirational Encryption™ Technology
         • Playback Resistance
         • PKI (RSA or Diffie-Helmann) encryption
Basic Authentication Model                                   bioChec



                                                                       DMZ

                                  Enterprise Auth Workflow

                 1                                            2
                  Primary AuthN                                AuthZ Rules




                     Auth D/S
                     Auth D/S
                                                                      Client
Token Authentication Model                                        bioChec

                      TOK




                                                                            DMZ

                                       Enterprise Auth Workflow

                 1                       2                         3
                 Primary AuthN   TOK
                                          Secondary Rules           AuthZ Rules




                     Auth D/S
                     Auth D/S                    Token D/S
                                                 Token D/S
                                                                           Client
bioChec Integration Model                                         bioChec

                      BIO




                                                                             DMZ

                                       Enterprise Auth Workflow           Client
                 1                       2                         5
                                                                    * Enhanced *
                 Primary AuthN   BIO
                                         Secondary Rules
                                                                    AuthZ Rules

                                             3   BIO
                                                       4

                     Auth D/S
                     Auth D/S



                                  Template D/S
                                  Template D/S
                                                                           Client
bioChec SaaS Model                                               bioChec

                      BIO




                                                                            DMZ

                                      Enterprise Auth Workflow

                1                       2                         6
                                                                   * Enhanced *
                Primary AuthN   BIO
                                        Secondary Rules
                                                                   AuthZ Rules

                                              3    BIO
                                                          5
                                                   bioChec™
                     Auth D/S
                     Auth D/S                      SaaS Proxy
                                                                          Client
                                                           BIO




                                                                      4
                    Template D/S
                    Template D/S
                                                                       bioChec
bioChec Broker Model                                              bioChec

                      TOK




                                                                             DMZ

       TOK
                                       Enterprise Auth Workflow

                 2                       3                         6
                                                                    * Enhanced *
                 Primary AuthN   TOK
                                         Secondary Rules
                                                                    AuthZ Rules




                     Auth D/S
                     Auth D/S                    Token D/S
                                                 Token D/S
                                                                           Client

             1
                                 Template D/S
                                 Template D/S
                                                                        bioChec
Work-In-Progress                                              bioChec
Ad-Hoc auditing for rogue workstation access

bioChec’s profile algorithm allows ad-hoc auditing of typing snippets.

Profiling, although not as accurate as templates, may be used to
    determine sudden changes in typing behavior.

These sudden changes may be attributed to a disparate user executing
   commands on another person’s workstation.

Extensions to the profiling algorithm will, in the future, be able to
    aggregate these disparities across an enterprise and possibly identify
    individuals consistent with the rogue access attempts in question.
Work-In-Progress                                                   bioChec
Secure Software Licensing and Registration.
  The future of this technology can be seen in secure product
  registration. The idea behind this will help prevent piracy, and create
  an audit trail for any piracy breaches.

  As a simple scenario, a user purchases a software package online.

   – Within the purchase process, the user is asked to enroll [online] a
     biometric (keystroke-dynamics-based) signature and is returned a single-
     use installation key.

   – Upon installing the actual software, the user is asked to verify their
     signature against this key.

   – This verification process destroys the original template and produces a
     runnable license tied to a combination of the specific installation (hard
     disk serial, CPU serial, NIC, MAC, et al) and user (signature Hash).

Weitere ähnliche Inhalte

Ähnlich wie bioChec Overview

Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Systems, Inc.
 
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSOStronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSORamesh Nagappan
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
ICAM - Demo Architecture review
ICAM - Demo Architecture reviewICAM - Demo Architecture review
ICAM - Demo Architecture reviewRamesh Nagappan
 
Enabling SAM Through Software IDTagging
Enabling SAM Through Software IDTaggingEnabling SAM Through Software IDTagging
Enabling SAM Through Software IDTaggingFlexera
 
ISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security ManagementISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security ManagementPhil Griffin
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Systems, Inc.
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlRamesh Nagappan
 
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...FIWARE
 
Protecting Online Identities - MIX09
Protecting Online Identities - MIX09Protecting Online Identities - MIX09
Protecting Online Identities - MIX09Jorgen Thelin
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityInnoTech
 
APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best PracticeShiu-Fun Poon
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer
 
Microservices security - jpmc tech fest 2018
Microservices security - jpmc tech fest 2018Microservices security - jpmc tech fest 2018
Microservices security - jpmc tech fest 2018MOnCloud
 
Process assessment sample
Process assessment sampleProcess assessment sample
Process assessment sampleDynamic Systems
 
Process assessment sample
Process assessment sampleProcess assessment sample
Process assessment sampleDynamic Systems
 
Smith Secure
Smith SecureSmith Secure
Smith Securedfeldbaum
 

Ähnlich wie bioChec Overview (20)

Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
(2007) BioKey - Privacy Preserving Biometric Authentication
(2007) BioKey - Privacy Preserving Biometric Authentication(2007) BioKey - Privacy Preserving Biometric Authentication
(2007) BioKey - Privacy Preserving Biometric Authentication
 
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSOStronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSO
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
ICAM - Demo Architecture review
ICAM - Demo Architecture reviewICAM - Demo Architecture review
ICAM - Demo Architecture review
 
Enabling SAM Through Software IDTagging
Enabling SAM Through Software IDTaggingEnabling SAM Through Software IDTagging
Enabling SAM Through Software IDTagging
 
ISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security ManagementISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security Management
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
 
Protecting Online Identities - MIX09
Protecting Online Identities - MIX09Protecting Online Identities - MIX09
Protecting Online Identities - MIX09
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best Practice
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
Microservices security - jpmc tech fest 2018
Microservices security - jpmc tech fest 2018Microservices security - jpmc tech fest 2018
Microservices security - jpmc tech fest 2018
 
Process assessment sample
Process assessment sampleProcess assessment sample
Process assessment sample
 
Process assessment sample
Process assessment sampleProcess assessment sample
Process assessment sample
 
Smith Secure
Smith SecureSmith Secure
Smith Secure
 
BSI Biometrics Standards Brochure
BSI Biometrics Standards BrochureBSI Biometrics Standards Brochure
BSI Biometrics Standards Brochure
 

Kürzlich hochgeladen

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

bioChec Overview

  • 2. Biometric Definitions bioChec Physical Biometrics – Defined as the statistical analysis of biological observations and phenomena – Characteristics: • Measurement of biological aspects of a person that determine identity • Static measurement • Absolute match – Examples: • DNA, Retina, Fingerprint, Vein structure
  • 3. Biometric Classifications bioChec Behavioral Biometrics – Defined as the collection and classification of a series of intrinsic patterns displayed – Characteristics: • Measurement of characteristic traits exhibited by a person that can determine identity • Dynamic measurement • Confidence match – Examples: • Speech Recognition, Handwriting Analysis, Keystroke Biometrics, Facial Recognition
  • 4. Software-Only Biometrics bioChec “Keystroke Biometrics” is a behavioral biometric which creates a statistically unique signature from the typing patterns of an individual without the use of specialized hardware. Keystroke Biometrics is a proven technology: • 1979: Technology originally developed by SRI International. • 1980: National Bureau of Standards (NBS) study concluded that computer keystroke authentication of 98% accuracy. … • 2009: bioChec granted U.S. Patent 7,509,686
  • 5. Statistical Confidence Levels bioChec Fingerprint – Physical biometric • FAR= ~0% • FRR= ~1% – Uniqueness= 1 : 2980232238769531250x1024 Keystroke Biometrics – Behavioral biometric • FAR = ~ 0.01%* • FRR = ~3.0%* • Crossover Rate = ~1.6%* – *Tweakable, Application-Defined Facial Recognition – Physical biometric • FAR / FRR vary significantly according to compression, distance, illumination, media, pose, resolution, and other temporal factors. Voice Recognition – Behavioral biometric • FAR = ~1.6% • FRR = ~8.1%
  • 6. Software-Only Biometrics bioChec Deploying software-only keystroke biometric solutions into an existing network infrastructure is a seamless and cost-effective way to augment corporate security. – No physical client-side deployment for installations or upgrades. – Users are not limited to individual or specific workstations. – Server and/or workstation managed levels of security. – Software components allow integration into multiple projects.
  • 7. bioChec bioChec™ as a Solution Provider
  • 8. Business Concept bioChec bioChec™ addresses both product and service areas of biometric solutions bioChec™ provides a patented software- only biometric technology that is minimally invasive and easily deployable to a large community of users. bioChec™ provides SaaS fulfillment service for enhanced security solution provider implementations.
  • 9. Product Offerings bioChec Custom Application Development – bioChecKey™ Keystroke Biometrics SDK Web-Based Intranets and Extranets – bioChec Online! ™ Legacy Applications: – bioChec GINA! ™
  • 10. bioChecKey™ Biometrics Engine bioChec Software-Only SDK – Win32, Linux or Unix, Java (via JNI) Dialog Input Field Hooks (Win32, QT3, QT4, X11) – Allows Rapid Application Development Adjustable Verification/Enrollment Parameters – Tweak Implementations to your needs Expirational Encryption™ Technology – Limits data decryption to N seconds to prevent stream hijacks Adaptive Template™ Technology – Increases Template Strength with every successful login Dynamic Enrollment™ – For Initial Deployments, negates need for explicit enrollment Password Hardening (bioChec GINA! only) – Replaces normal password with a bioChec-only password. – Prevents all non-bioChec authentication (even Windows® Repair Console). – Can recreates a new random password on every template update. – Effectively isolates Windows® workstation from incoming access.
  • 11. bioChec Online! ™ bioChec Online Authorization – Non-Invasive Client-Side deployment • Flash • Java Applet – Simple integration into existing infrastructures • WS-* • SaaS • Custom – Administrative Features • Adjustable Verification / Enrollment Parameters • Adaptive Template™ Technology • Dynamic Enrollment™ option – Security Features • Expirational Encryption™ Technology • Playback Resistance • PKI (RSA or Diffie-Helmann) encryption
  • 12. Basic Authentication Model bioChec DMZ Enterprise Auth Workflow 1 2 Primary AuthN AuthZ Rules Auth D/S Auth D/S Client
  • 13. Token Authentication Model bioChec TOK DMZ Enterprise Auth Workflow 1 2 3 Primary AuthN TOK Secondary Rules AuthZ Rules Auth D/S Auth D/S Token D/S Token D/S Client
  • 14. bioChec Integration Model bioChec BIO DMZ Enterprise Auth Workflow Client 1 2 5 * Enhanced * Primary AuthN BIO Secondary Rules AuthZ Rules 3 BIO 4 Auth D/S Auth D/S Template D/S Template D/S Client
  • 15. bioChec SaaS Model bioChec BIO DMZ Enterprise Auth Workflow 1 2 6 * Enhanced * Primary AuthN BIO Secondary Rules AuthZ Rules 3 BIO 5 bioChec™ Auth D/S Auth D/S SaaS Proxy Client BIO 4 Template D/S Template D/S bioChec
  • 16. bioChec Broker Model bioChec TOK DMZ TOK Enterprise Auth Workflow 2 3 6 * Enhanced * Primary AuthN TOK Secondary Rules AuthZ Rules Auth D/S Auth D/S Token D/S Token D/S Client 1 Template D/S Template D/S bioChec
  • 17. Work-In-Progress bioChec Ad-Hoc auditing for rogue workstation access bioChec’s profile algorithm allows ad-hoc auditing of typing snippets. Profiling, although not as accurate as templates, may be used to determine sudden changes in typing behavior. These sudden changes may be attributed to a disparate user executing commands on another person’s workstation. Extensions to the profiling algorithm will, in the future, be able to aggregate these disparities across an enterprise and possibly identify individuals consistent with the rogue access attempts in question.
  • 18. Work-In-Progress bioChec Secure Software Licensing and Registration. The future of this technology can be seen in secure product registration. The idea behind this will help prevent piracy, and create an audit trail for any piracy breaches. As a simple scenario, a user purchases a software package online. – Within the purchase process, the user is asked to enroll [online] a biometric (keystroke-dynamics-based) signature and is returned a single- use installation key. – Upon installing the actual software, the user is asked to verify their signature against this key. – This verification process destroys the original template and produces a runnable license tied to a combination of the specific installation (hard disk serial, CPU serial, NIC, MAC, et al) and user (signature Hash).