SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Werner Blessing,  Founder of BIOMETRY
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A modified Video camera is used for iris identification.
Pits Freckles Corona 266 DOF* * Each Degree of Freedom (Freiheitsgrad) has thousands Variations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template  1 … 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template  2 Template  0 1  2  3  4  5  6  7  8  9  0   number
 
[object Object],[object Object],[object Object],[object Object]
www.tabularasa-euproject.org 7th Framework  Research Programme  of the European Union  Trusted Biometrics under Replay & Spoofing Attacks
 
„ out of the box products“
Permanent  Authentication: ID – Perma Face Biometric Face Recognition Initial Authentication  with four figures Face, Voice, and Word Recognition
ID ComBiom  is an All in One Software. The user is always free to decide whether he wants to use  ComBiom  as a package or just single parts of it, such as  PermaFace  only or  PermaVoice  only.  ID Perma Face  will do a permanent biometric face control. If the wrong user is trying to steal data, the system would identify the thief and switch off. ID Perma Voice  identifies the user on it‘s biometric voice identification only. For example at night, without light.
 
API - ID Start MobiComBiom
 
Trust %  Value  Time  100 % 10 % Adaptive Trust Level Your individual/personal Trust Level: - Maximum Payment - Level of Credit at bank - Personal Setting  10  Min. 60  Min. = Maximum 100% = Adds  10% = Adds 5%
One Software Once enroled Many applications very adaptive use
[email_address]

Weitere ähnliche Inhalte

Was ist angesagt?

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
anasz
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 

Was ist angesagt? (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
BIOMETRYsso
BIOMETRYssoBIOMETRYsso
BIOMETRYsso
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometric
Biometric Biometric
Biometric
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
 
Biometric
BiometricBiometric
Biometric
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 

Andere mochten auch

Millenniumonderwijs
MillenniumonderwijsMillenniumonderwijs
Millenniumonderwijs
SuperPOLL
 
교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]
혁 김
 
Completa presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguisticCompleta presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguistic
ontinyentina
 
toekomstproject
toekomstprojecttoekomstproject
toekomstproject
SuperPOLL
 
Politics of the street
Politics of the streetPolitics of the street
Politics of the street
SuperPOLL
 
Erasmus, heaven or hell?
Erasmus, heaven or hell?Erasmus, heaven or hell?
Erasmus, heaven or hell?
SuperPOLL
 
детям о пожарной безопасности
детям о пожарной безопасностидетям о пожарной безопасности
детям о пожарной безопасности
virtualtaganrog
 
кружок соловушк визиткаа
кружок соловушк  визиткаакружок соловушк  визиткаа
кружок соловушк визиткаа
virtualtaganrog
 
пед психолог кузнецова портфолио
пед психолог кузнецова портфолиопед психолог кузнецова портфолио
пед психолог кузнецова портфолио
virtualtaganrog
 
Linea y Punto sobre Plano
Linea y Punto sobre PlanoLinea y Punto sobre Plano
Linea y Punto sobre Plano
marap163
 

Andere mochten auch (20)

Resolucion judicial
Resolucion judicialResolucion judicial
Resolucion judicial
 
Millenniumonderwijs
MillenniumonderwijsMillenniumonderwijs
Millenniumonderwijs
 
교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]
 
EAS321 essay prep and units 5 & 6
EAS321 essay prep and units 5 & 6EAS321 essay prep and units 5 & 6
EAS321 essay prep and units 5 & 6
 
Eas321 seminar 10
Eas321 seminar 10Eas321 seminar 10
Eas321 seminar 10
 
Semiotica
SemioticaSemiotica
Semiotica
 
Completa presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguisticCompleta presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguistic
 
Get a give
Get a giveGet a give
Get a give
 
toekomstproject
toekomstprojecttoekomstproject
toekomstproject
 
Politics of the street
Politics of the streetPolitics of the street
Politics of the street
 
Erasmus, heaven or hell?
Erasmus, heaven or hell?Erasmus, heaven or hell?
Erasmus, heaven or hell?
 
Wehrpflicht - Neujahrsempfang
Wehrpflicht - NeujahrsempfangWehrpflicht - Neujahrsempfang
Wehrpflicht - Neujahrsempfang
 
группа № 5
группа № 5группа № 5
группа № 5
 
детям о пожарной безопасности
детям о пожарной безопасностидетям о пожарной безопасности
детям о пожарной безопасности
 
солнце
солнцесолнце
солнце
 
Emotional focused-therapy-greenberg
Emotional focused-therapy-greenbergEmotional focused-therapy-greenberg
Emotional focused-therapy-greenberg
 
Vortrag Cartes in Asia
Vortrag Cartes in AsiaVortrag Cartes in Asia
Vortrag Cartes in Asia
 
кружок соловушк визиткаа
кружок соловушк  визиткаакружок соловушк  визиткаа
кружок соловушк визиткаа
 
пед психолог кузнецова портфолио
пед психолог кузнецова портфолиопед психолог кузнецова портфолио
пед психолог кузнецова портфолио
 
Linea y Punto sobre Plano
Linea y Punto sobre PlanoLinea y Punto sobre Plano
Linea y Punto sobre Plano
 

Ähnlich wie Vortrag CeBIT 2011 - Biometric Security

Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
MobileMonday Estonia
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
suniljoshi151
 
MobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication BiometricsMobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication Biometrics
BIOMETRY.com AG
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
STO STRATEGY
 

Ähnlich wie Vortrag CeBIT 2011 - Biometric Security (20)

Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
 
2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch
 
2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
MobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication BiometricsMobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication Biometrics
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
E banking security
E banking securityE banking security
E banking security
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Vortrag CeBIT 2011 - Biometric Security

  • 1. Werner Blessing, Founder of BIOMETRY
  • 2.  
  • 3.  
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. A modified Video camera is used for iris identification.
  • 10. Pits Freckles Corona 266 DOF* * Each Degree of Freedom (Freiheitsgrad) has thousands Variations
  • 11.
  • 12.  
  • 13.  
  • 14.  
  • 15. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template 1 … 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template 2 Template 0 1 2 3 4 5 6 7 8 9 0 number
  • 16.  
  • 17.
  • 18. www.tabularasa-euproject.org 7th Framework Research Programme of the European Union  Trusted Biometrics under Replay & Spoofing Attacks
  • 19.  
  • 20. „ out of the box products“
  • 21. Permanent Authentication: ID – Perma Face Biometric Face Recognition Initial Authentication with four figures Face, Voice, and Word Recognition
  • 22. ID ComBiom is an All in One Software. The user is always free to decide whether he wants to use ComBiom as a package or just single parts of it, such as PermaFace only or PermaVoice only. ID Perma Face will do a permanent biometric face control. If the wrong user is trying to steal data, the system would identify the thief and switch off. ID Perma Voice identifies the user on it‘s biometric voice identification only. For example at night, without light.
  • 23.  
  • 24. API - ID Start MobiComBiom
  • 25.  
  • 26. Trust % Value Time 100 % 10 % Adaptive Trust Level Your individual/personal Trust Level: - Maximum Payment - Level of Credit at bank - Personal Setting 10 Min. 60 Min. = Maximum 100% = Adds 10% = Adds 5%
  • 27. One Software Once enroled Many applications very adaptive use