Weitere ähnliche Inhalte
Ähnlich wie Bioslimdisk Presentation V1.1 (20)
Kürzlich hochgeladen (20)
Bioslimdisk Presentation V1.1
- 2. Overview
• Company Profile
• Biometric Technology
• Bioslimdisk Signature
2 © RiTech International Ltd, Confidential & Proprietary
- 4. RiTech International Ltd
• Ritech was established in 1994 as
Designer, developer, manufacturer and
distributor of innovative products,
services & systems in the area of
biometrics security and portable data
storage.
• Specializes in biometrics security
technology with in-house R&D.
• Overseas operation network: Malaysia,
Hong Kong, China, India and Europe.
4 © RiTech International Ltd, Confidential & Proprietary
- 5. Vision
First Choice Solution provider in the
Biometric security industry
Biometric
Process
Algorithms
Implementation knowledge
Customised Solutions
Ergonomics and desgin
Sensors
5 © RiTech International Ltd, Confidential & Proprietary
- 6. Objectives
Advanced Research and Development
• Biometrics products for portable information
storage and transportation
• Biometrics products for Intellectual Property
Protection
• Biometrics products for secure identification
over networks
• Biometrics products for as a secure
replacement over existing keys, cards,
password which tend to be a burden
6 © RiTech International Ltd, Confidential & Proprietary
- 8. What is Biometric?
The Science of measuring
and statistically analyzing
biological data
8 © RiTech International Ltd, Confidential & Proprietary
- 9. What is Biometric?
Biometric Technology
Authentication can be divided into three
different factors:
• something you know
• something you have
• something you are
9 © RiTech International Ltd, Confidential & Proprietary
- 10. Something you know
Common
• Pin Numbers/Code
• Learn it , You have to remember the
Code Number
• Forced to memorize passwords
Disadvantage:-
Software hacking tools via
internet, easy to steal by
anyone. (e.g. Keylogger)
10 © RiTech International Ltd, Confidential & Proprietary
- 11. Something you have
Example Smart cards
• Cash Card
• ATM Card
• Visa/Master Card
• Door/Building Access Card
Disadvantage:-
If picked up by anyone, it can still be
used. (e.g. Paying at a Petrol Station)
11 © RiTech International Ltd, Confidential & Proprietary
- 12. Something you are
Biometrics is what you are!
What you have:
1. Your Finger > Fingerprint
2. You cannot loose it
3. You cannot give it away
You cannot tell a friend to use your prints.
12 © RiTech International Ltd, Confidential & Proprietary
- 13. Types of Biometric
1. BEHAVIOURAL
– Voice Patterns
– Signature Verification
– Key Stroke Patterns (Signatures)
2. PHYSIOLOGICAL
– Fingerprints
– Hand Geometry
– Retinal & Iris Scanning
– Facial Recognition
– DNA Fingerprinting
13 © RiTech International Ltd, Confidential & Proprietary
- 14. Biometric Comparison
Comparison of various biometric
technologies
It is possible to understand if a human characteristic can be
used for biometrics in terms of the following parameters:
• Universality => each person should have the characteristic
• Uniqueness => is how well the biometric separates individually
from another.
• Permanence => measures how well a biometric resists aging.
• Collectability => ease of acquisition for measurement.
• Performance => accuracy, speed, and robustness of
technology used.
• Acceptability => degree of approval of a technology.
• Circumvention => ease of use of a substitute.
14 © RiTech International Ltd, Confidential & Proprietary
- 15. Biometric Comparison
Comparison of existing biometric systems
Comparison of various biometric technologies, modified from Jain et al.,
2004 (H=High, M=Medium, L=Low)
Biometrics: Universality Uniqueness Permanence Collectability Performance Acceptability Circumvention
Face H L M H L H L
Fingerprint M H H M H M H
Hand geometry M M M H M M M
Keystrokes L L L M L M M
Hand veins M M M M M M H
Iris H H H M H L H
Retinal scan H H M L H L H
Signature L L L H L H L
Voice M L L M L H L
Facial
H H L H M H H
thermograph
Odor H H H L L M L
DNA H H H L H L L
Gait M L L H L H M
Ear Canal M M H M M H M
15 © RiTech International Ltd, Confidential & Proprietary
- 16. Fingerprint Identification
Minutiae Definition
• Form of Fingerprint
• Number of Lines
• Distance Between Marks
16 © RiTech International Ltd, Confidential & Proprietary
- 17. Processing & Identification
Fingerprint
How many minutiae are needed for
comparison?
–Generally, a complete
fingerprint is made up
of up to 100 minutiae
–Fingerprint recognition
normally requires 20~30
minutiae for processing
17 © RiTech International Ltd, Confidential & Proprietary
- 19. Biometric Advantages
Advantages of Biometrics
for Access Control
Copy Theft Forgotten Lost
Key
X X X X
Badge
-
X X X
PIN Code
X -
X -
Biometric
- - - -
Feature
19 © RiTech International Ltd, Confidential & Proprietary
- 21. WHY?
• Threat of data theft is real and costly
• Affects employees negatively
• Affects company negatively
• Loss of productivity and credibility
• Loss of profits and sustainability
21 © RiTech International Ltd, Confidential & Proprietary
- 22. HOW?
• Physical theft and hacking
Actual device is stolen and tapped for data
• Social engineering
Passwords or access keys can be coaxed
• Virtual hacking and theft
Popular method of data theft
• Man-in-the-Middle attacks
Spying and snooping on communications
22 © RiTech International Ltd, Confidential & Proprietary
- 23. Securing Data
Signature can meet security
challenges with
Tamper-proof with self-destruct
function
Fingerprint recognition
(biometric)
Built-in AES-128 bit data
encryption
Features to protect user
identification
23
No passwords during usage
© RiTech International Ltd, Confidential & Proprietary
- 24. Safekeeping
Self Destruct Feature
Activated when tampering is detected
All data drive is destroyed
Keeps confidential data out of reach
No backdoor access
No password or function to reset security
Only valid fingerprints are allowed access
24 © RiTech International Ltd, Confidential & Proprietary
- 25. Hardware Benefits
AES-128bit hardware encryption
Keys never leave Signature
Avoids tapping/snooping of keys
All data on drive is encrypted
On the fly encrypt and decrypt
Totally hardware-based
Resistant to software-based attacks
Security methods are encapsulated in
hardware
25 © RiTech International Ltd, Confidential & Proprietary
- 26. Protecting Fingerprints
Dual-finger authentication
Reduces latent fingerprint
copy
Intruder requires 2 unique
fingerprints
Limiting fingerprint retries
Intruder has less time to guess correct
fingerprint
Limits tries and time for correct fingerprint
26 © RiTech International Ltd, Confidential & Proprietary
- 27. Convenience
• Anti-static rubberized casing
Hard to copy fingerprints on device
Less dust attraction to protect sensor
• Cross platform compatibility
Nofurther software or software needed
Works in Windows, MAC, Linux, Solaris, etc.
27 © RiTech International Ltd, Confidential & Proprietary
- 28. Unique Service
• Our technology is mature and
battletested
Our company is the leader in this field
• Quick response to security breaches
Product is constantly updated
• Customization to end users
Security tokens, 3rd party software
28 © RiTech International Ltd, Confidential & Proprietary
- 29. Summary of Features
1) Dual-Finger Authentication
2) Unique Self Destruct
3) Hardware Crypto AES-128bit
4) Worldwide Patents Awarded
United Kingdom, Netherlands, Germany, France, China, Hong
Kong, Singapore, Malaysia and many more.
29 © RiTech International Ltd, Confidential & Proprietary