Professional Documents
Culture Documents
• Background Info
• Challenges
• Protection in Layers
• Solutions
• Factors to Consider
• Summary
• Conclusion
User Strategy
Advanced
Business Strategy
Facial Recognition
Finger Scanning
Website
Fingerprint scanning
▪ Randomized combination
An automated notification is
sent to your mobile device
ATM’s
• Limited ATM functionality
• Fingerprint scanner
Educate Customers
$3,375,000
Introduction Solution Reasoning Action 22
Risks
Risk Mitigation
Not all individuals Implementing random fingerprint reader, only requires a device
own a mobile with a camera to authenticate randomly selected fingerprints.
device
Inconvenient for Make set-up process simple (under 5 minutes), use algorithm in
customers to set-up the background to identify device capabilities and suggest best
authentication biometric option.
Testing
Debugging
Launch
Educating Employees
Educating Clients
Adaptive Authentication
Cloud Computing
LAYERED PROTECTION IS
MAXIMUM SECURITY
25
Conclusion
Deliver a Be the
unified Get better most
customer every day trusted
experience. choice
26
ARENA
Thank You
Any Questions?
27
Appendix: Mass producing biometrics
28
Appendix: Biometric types
Size of Long Term Security
Biometrics Type Accuracy Cost
Template Stability Level
29
Appendix: Fingerprint card purchasing
30
Appendix: BIPA
Biometric Information Privacy Act
Illinois, Washington, Texas
•Obtain consent from individuals if the company intends to collect or disclose
their personal biometric identifiers.
•Destroy biometric identifiers in a timely manner.
•Securely store biometric identifiers.
For now, it’s legal in 48 states for software to identify you using images taken
without your consent while you were in public. Texas and Illinois don’t allow it
for commercial use, but it’s legal nationwide for law enforcement. And even
when consent is obtained, it’s often done so in a way you may not be aware of:
in the fine print of Terms of Service agreements that people routinely don't
read.
31
Appendix: Fingerprint hacking
The Chaos Computer Club's biometric hacking team has announced a
successful attack on Apple's Iphone biometric fingerprint lock, using a
variation on the traditional fingerprint-cloning technique. CCC's Starbug
summarizes: "As we have said now for more than years, fingerprints should
not be used to secure anything. You leave them everywhere, and it is far too
easy to make fake fingers out of lifted prints."
"We hope that this finally puts to rest the illusions people have about
fingerprint biometrics. It is plain stupid to use something that you can´t
change and that you leave everywhere every day as a security token", said
Frank Rieger, spokesperson of the CCC. "The public should no longer be
fooled by the biometrics industry with false security claims.
32
Appendix: Security
33
Appendix: Rural America gone
34
Appendix: Hacking for fingerprints
35
Appendix: Dissatisfied reviews
36