SlideShare a Scribd company logo
Biometric Security
for Mobile
THE “WHO YOU ARE” OF AUTHENTICATION
JERRY RUGGIERI / CITIZENS BANK
1
All Authentication Options
 What you know, e.g. password
 What you have, e.g. soft- or hard-token
 Who you are, e.g. any biometric
 How you behave, e.g. adaptive
authentication
2
Passwords
Your password is “dinosaur”
 October 2013 – Adobe announces 38 M passwords are compromised
 Password hints posted in cleartext
 Passwords not salted
 Days later they’re posted online and many are soon broken
 June 2012 – LinkedIn announces 7M of 150M passwords stolen
 Passwords not salted
 Days later they’re posted online and …
 Customers using same password for Facebook, garage door openers,
and banking
 Passwords heavily re-used or shared
 Passwords have to be remembered (and typed)
 Passwords can be “cracked” (recovered)
3
Biometric Authentication Methods 4
Biometric Categories 5
Facial Recognition
 Pro’s
 Convenient
 Liveness Test
 Con’s
 Lighting condition requirement
 Can be faked with static and/or animated gif from
public photos
 Repudiation
6
Fingerprint
 Pro’s
 EER of around 1%
 Convenience
 Liveness Test
 Non-repudiation
 Con’s
 Specialized Hardware
 Finger cleanliness
 Cuts to finger
 Angle or pressure of placement
 Biometric privacy concerns
 Fingerprints can be captured easily
 Search for “MythBusters Fingerprints Busted” on YouTube
7
Voice
 Pro’s
 Convenience
 Cost
 EER of around 2-3%
 Liveness Test
 Non-repudiation
 Can be authenticated remotely
 Con’s
 Cold or illness affecting voice
 Environmental noise
 Behavioral or temporal speaking differences
 User education or awareness to use
8
Biometric Evaluation Factors
 Accuracy Factors
 False Acceptance Rate (FAR)
 False Rejection Rate (FRR)
 Equal Error Rate (EER)
 Failure To Enroll (FTE)
 Failure To Capture (FTC)
 Security
 Usability
 Integration
 Cost
 Privacy and Regulatory Factors
9
Equal Error Rate Curve 10
11
Apple’s Fingerprint Hardware 12
True Speaker Recordings 13
Imposter Speaker Recordings 14
Enrollment, Authentication Process 15
Biometric Distance for Imposters 16
Voice Biometric Use Cases
 Use Cases
 Fast Balance
 Step up authentication option
 Online Account Opening
 Login authentication
 Male v. Female voices
 Male frequency 85-180 Hz
 Female frequency 165-255 Hz
 We hear frequency as the pitch
 Double the frequency we perceive it as “twice as high”
17
VoiceKeyID™ Algorithm
Authenticates in ½ second
Runs on device, no servers needed
Configurable for low FAR (False Acceptance Rate)
Multi-lingual, any language or song or repeatable gibberish will work
Requires 10-12 syllables or 4-6 seconds of speech
Robustness against recorded attacks
Low Failure To Enroll Errors
Low Storage Requirement (50-100KB)
Secure Storage
Can identify forced failure attempts and deny them
Available for use anywhere in apps
Patent protected in US and China
18
19
VoiceKeyID™ Demo App

More Related Content

PPTX
Biometric security
Tanner Stuewe
 
PDF
Defending Biometric Security
Ned Hayes
 
PPT
Biometrics
senejug
 
PPTX
Biometrics Pros & cons
Gagan Gowda
 
PPTX
Biometric security using cryptography
Sampat Patnaik
 
PPT
Biometric
Vinay Gupta
 
PPT
Biometricstechnology in iot and machine learning
Ankit Gupta
 
PPTX
Biometrics
anoop80686
 
Biometric security
Tanner Stuewe
 
Defending Biometric Security
Ned Hayes
 
Biometrics
senejug
 
Biometrics Pros & cons
Gagan Gowda
 
Biometric security using cryptography
Sampat Patnaik
 
Biometric
Vinay Gupta
 
Biometricstechnology in iot and machine learning
Ankit Gupta
 
Biometrics
anoop80686
 

What's hot (20)

PPTX
Biometrics security
Vuda Sreenivasarao
 
PPTX
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
PPTX
Biometrics
meeravali shaik
 
PPTX
Biometric Systems
Sn Moddho
 
PPT
Biometrics
Alan Leewllyn Bivera
 
PPT
Biometric
Pratish Sardar
 
ODP
India's UID Project: Biometrics Vulnerabilities & Exploits
Anivar Aravind
 
PPTX
Biometrics technology
Niharika Gupta
 
PPTX
Biometrics overview ppt
amee yaami
 
PPTX
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
PPT
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
PPTX
Biometrics
Divya Shah
 
PPTX
Biometricsppt
DrKRBadhiti
 
PPTX
Biometrics
shweta-sharma99
 
PPTX
Biometric security tech
mmubashirkhan
 
PDF
Biometric Technology
twuniversity
 
PPTX
Biometric security system
Mithun Paul
 
PPT
Biometric slideshare
prachi
 
PPTX
Biometrics
Priyanka Sharma
 
PPTX
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Biometrics security
Vuda Sreenivasarao
 
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Biometrics
meeravali shaik
 
Biometric Systems
Sn Moddho
 
Biometric
Pratish Sardar
 
India's UID Project: Biometrics Vulnerabilities & Exploits
Anivar Aravind
 
Biometrics technology
Niharika Gupta
 
Biometrics overview ppt
amee yaami
 
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
Biometrics
Divya Shah
 
Biometricsppt
DrKRBadhiti
 
Biometrics
shweta-sharma99
 
Biometric security tech
mmubashirkhan
 
Biometric Technology
twuniversity
 
Biometric security system
Mithun Paul
 
Biometric slideshare
prachi
 
Biometrics
Priyanka Sharma
 
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Ad

Viewers also liked (20)

PDF
CISSP_Exam_Prep_Guide
Jerry Ruggieri
 
PPTX
KeystrokeGuard_Presentation_20141024
Frank Maiorca
 
PDF
Identity_Management_Vendor_Evaluation
Jerry Ruggieri
 
PPTX
Skyfi Labs Biometric Authentication Project
vasanthvidyakar
 
PDF
New Trends in Mobile Authentication
Nok Nok Labs, Inc
 
PPTX
Biometrics For Security Systems
Suhas Deshpande
 
PPTX
BIOMETRIC SECURITY SYSTEM
Jignesh Prajapati
 
PPTX
brain machine interface ppt
Soumee Pattnaik
 
PPTX
Anomaly detection in deep learning (Updated) English
Adam Gibson
 
PDF
The Top 6 FINTECH TRENDS for 2017
The Pathway Group
 
PPTX
Using Machine Learning & AI to Enhance Fraud Detection
White Clarke Group
 
PPTX
Machine learning use cases in finance
David Guerineau
 
PPTX
Introduction to biometric systems security
Self
 
PPTX
Biometric authentication ppt by navin 6 feb
Navin Kumar
 
PPT
A study on biometric authentication techniques
Subhash Basistha
 
PPT
Bio-metrics Technology
Avanitrambadiya
 
PPTX
Deep Learning for Fraud Detection
DataWorks Summit/Hadoop Summit
 
PDF
PayPal's Fraud Detection with Deep Learning in H2O World 2014
Sri Ambati
 
PPT
brain computer-interfaces PPT
Vijay Mehta
 
PPT
Biometric Presentation
rs2003
 
CISSP_Exam_Prep_Guide
Jerry Ruggieri
 
KeystrokeGuard_Presentation_20141024
Frank Maiorca
 
Identity_Management_Vendor_Evaluation
Jerry Ruggieri
 
Skyfi Labs Biometric Authentication Project
vasanthvidyakar
 
New Trends in Mobile Authentication
Nok Nok Labs, Inc
 
Biometrics For Security Systems
Suhas Deshpande
 
BIOMETRIC SECURITY SYSTEM
Jignesh Prajapati
 
brain machine interface ppt
Soumee Pattnaik
 
Anomaly detection in deep learning (Updated) English
Adam Gibson
 
The Top 6 FINTECH TRENDS for 2017
The Pathway Group
 
Using Machine Learning & AI to Enhance Fraud Detection
White Clarke Group
 
Machine learning use cases in finance
David Guerineau
 
Introduction to biometric systems security
Self
 
Biometric authentication ppt by navin 6 feb
Navin Kumar
 
A study on biometric authentication techniques
Subhash Basistha
 
Bio-metrics Technology
Avanitrambadiya
 
Deep Learning for Fraud Detection
DataWorks Summit/Hadoop Summit
 
PayPal's Fraud Detection with Deep Learning in H2O World 2014
Sri Ambati
 
brain computer-interfaces PPT
Vijay Mehta
 
Biometric Presentation
rs2003
 
Ad

Similar to Biometric Security Mobile (20)

PPTX
Sxsw ppt voice-1
Dan Miller
 
PPTX
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Easy Solutions Inc
 
PPTX
Behavioral biometrics mechanism for delaying password obsolescence
Elaine Wooton
 
PDF
The Password Is Dead: An Argument for Multifactor Biometric Authentication
Veridium
 
PPTX
Safety of my biometric data
nishiyath
 
PDF
Biometrics Authentication
Tony Chew
 
PPTX
Biometric authentication
Abduhalim Beknazarov
 
PDF
Biometrics - The Future of Authentication in the Banking Industry
Tony Chew
 
PDF
Brafton White Paper Example
Kayla Perry
 
PDF
5 Biometrics Usability Lessons
Comrade
 
PPTX
Basic of Biometrics Technology
NEHA SINGH
 
PDF
(2007) Case Study: Phone-based Voice Biometrics for Remote Authentication
International Center for Biometric Research
 
PPT
Bio Metrics
nayakslideshare
 
PDF
How to Test Biometric Authentication on Mobile Apps.pdf
kalichargn70th171
 
PDF
Patricio Maller: Autenticación biométrica desde la perspectiva de los usuarios.
Interaction South America 2014
 
PDF
Biometrics and 2FA Authentication_ A Detailed Analysis of Security Approaches...
flufftailshop
 
PDF
Biometrics and 2FA Authentication_ A Detailed Analysis of Security Approaches...
kalichargn70th171
 
PPTX
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
PPTX
Biometric authentication
mahtabrasheed195
 
PPT
Electronic authentication more than just a password
Nicholas Davis
 
Sxsw ppt voice-1
Dan Miller
 
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Easy Solutions Inc
 
Behavioral biometrics mechanism for delaying password obsolescence
Elaine Wooton
 
The Password Is Dead: An Argument for Multifactor Biometric Authentication
Veridium
 
Safety of my biometric data
nishiyath
 
Biometrics Authentication
Tony Chew
 
Biometric authentication
Abduhalim Beknazarov
 
Biometrics - The Future of Authentication in the Banking Industry
Tony Chew
 
Brafton White Paper Example
Kayla Perry
 
5 Biometrics Usability Lessons
Comrade
 
Basic of Biometrics Technology
NEHA SINGH
 
(2007) Case Study: Phone-based Voice Biometrics for Remote Authentication
International Center for Biometric Research
 
Bio Metrics
nayakslideshare
 
How to Test Biometric Authentication on Mobile Apps.pdf
kalichargn70th171
 
Patricio Maller: Autenticación biométrica desde la perspectiva de los usuarios.
Interaction South America 2014
 
Biometrics and 2FA Authentication_ A Detailed Analysis of Security Approaches...
flufftailshop
 
Biometrics and 2FA Authentication_ A Detailed Analysis of Security Approaches...
kalichargn70th171
 
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
Biometric authentication
mahtabrasheed195
 
Electronic authentication more than just a password
Nicholas Davis
 

Biometric Security Mobile

  • 1. Biometric Security for Mobile THE “WHO YOU ARE” OF AUTHENTICATION JERRY RUGGIERI / CITIZENS BANK 1
  • 2. All Authentication Options  What you know, e.g. password  What you have, e.g. soft- or hard-token  Who you are, e.g. any biometric  How you behave, e.g. adaptive authentication 2
  • 3. Passwords Your password is “dinosaur”  October 2013 – Adobe announces 38 M passwords are compromised  Password hints posted in cleartext  Passwords not salted  Days later they’re posted online and many are soon broken  June 2012 – LinkedIn announces 7M of 150M passwords stolen  Passwords not salted  Days later they’re posted online and …  Customers using same password for Facebook, garage door openers, and banking  Passwords heavily re-used or shared  Passwords have to be remembered (and typed)  Passwords can be “cracked” (recovered) 3
  • 6. Facial Recognition  Pro’s  Convenient  Liveness Test  Con’s  Lighting condition requirement  Can be faked with static and/or animated gif from public photos  Repudiation 6
  • 7. Fingerprint  Pro’s  EER of around 1%  Convenience  Liveness Test  Non-repudiation  Con’s  Specialized Hardware  Finger cleanliness  Cuts to finger  Angle or pressure of placement  Biometric privacy concerns  Fingerprints can be captured easily  Search for “MythBusters Fingerprints Busted” on YouTube 7
  • 8. Voice  Pro’s  Convenience  Cost  EER of around 2-3%  Liveness Test  Non-repudiation  Can be authenticated remotely  Con’s  Cold or illness affecting voice  Environmental noise  Behavioral or temporal speaking differences  User education or awareness to use 8
  • 9. Biometric Evaluation Factors  Accuracy Factors  False Acceptance Rate (FAR)  False Rejection Rate (FRR)  Equal Error Rate (EER)  Failure To Enroll (FTE)  Failure To Capture (FTC)  Security  Usability  Integration  Cost  Privacy and Regulatory Factors 9
  • 10. Equal Error Rate Curve 10
  • 11. 11
  • 16. Biometric Distance for Imposters 16
  • 17. Voice Biometric Use Cases  Use Cases  Fast Balance  Step up authentication option  Online Account Opening  Login authentication  Male v. Female voices  Male frequency 85-180 Hz  Female frequency 165-255 Hz  We hear frequency as the pitch  Double the frequency we perceive it as “twice as high” 17
  • 18. VoiceKeyID™ Algorithm Authenticates in ½ second Runs on device, no servers needed Configurable for low FAR (False Acceptance Rate) Multi-lingual, any language or song or repeatable gibberish will work Requires 10-12 syllables or 4-6 seconds of speech Robustness against recorded attacks Low Failure To Enroll Errors Low Storage Requirement (50-100KB) Secure Storage Can identify forced failure attempts and deny them Available for use anywhere in apps Patent protected in US and China 18