Title: Manasa Rao
1 Biometrics Based Smart card
Authentication System
Presented By. Manasa Rao TCN Research
Group
Advisors Dr. Saeed Rajput Dr.Abhijit Pandya Dr.
Sam Hsu 24th February,2005
2Objective To design and implement a prototype
for authentication using fingerprints and smart
cards. Deliverables Inputs1)Fingerprints as
biometric 2) Smart card as personal
id Process Development of application to process
and authenticate the user Output1)Access to
system after verification. 2)Perform
private key operation successfully
3)Authenticate the user
3- It is science of identification of a user based
on a physical characteristics - biometrics based authentication systems have
been gaining popularity - Makes it easy to detect a stranger or identify a
potential breach of security
4System Overview
Terminal
Smart Card
Fingerprint Scanner
Smart Card Authentication System
5Use Case Diagram-Fingerprint Scanner
Collect raw biometric data
Signal processing
Extract fingerprint features
Scanner(Actor)
6Use Case Diagram-Terminal
Recognize fingerprint scanner
Integrate smart cards
Run applications of subsystems
terminal
7Register fingerprint
Authenticate and verify
Fingerprint features
Identify
User
8Use Case Diagram-Smart Card System
Store public key
Public key
Store private key
Pvt key
hash
Run algorithms
Random no. generator
authenticate
Smart card system
9Smart Card Subsystem
- Every user would have one cryptographic key pair
- these would be 1024/2048 bit string of binary
digits with unique property - the smart card has cryptographic keys and
biometrics fingerprint data - It has both public and private key
- Minutia data are compared with data present on
smart card - the fingerprint data here acts as password to
decrypt the private key - if data matches then the private key is made
available and system authenticates the user
10Smartcard system
Scanner
Terminal
Send raw biometric data
Send fingerprint features
Send public key
CA certificate
11- Rainbows iKey 3000
- It is a powerful 2 factor authentication USB
token - it supports PKI and digital signature needs by
providing on-board cryptographic key generation
- This confirms users identity based on what user
has(an ikey) and something the user knows(a
PIN)(for this project , fingerprint of the user) - has 8 bit processor
- ITSEC E4 high certified
- on-token key signing
12FingerPrint Features
1)Coarse Features loops, arch and
whorls Used for presorting during an
identification with a very large data base
2)Pore Structure It is seldom used, due to
large fluctuations in the quality of the scanning
procedure.
13- Minutiae are the endings and the branching of the
finger lines - these follow a strong random pattern
- carriers of "uniqueness
- They are the matching discontinuities in ridge
and - valley pattern
- 3 types of minutia
3)Fine features- Minutia
14Mathematical representation of a pattern
- The line that creates a fingerprint pattern is
called the "ridge. - Its disconnection part and a part that splits
into two branches is the bifurcation part - The disconnection portion is called the "end
point," and the bifurcation portion is called the
"bifurcation point.
15- Each end point and bifurcation point is called a
"Minutia. - An ordinary fingerprint has about 50 minutiae in
it. - The "location" and "direction" are extracted
- from the minutia.
- The relation is the number of ridges between the
minutiae. - significantly improves the matching accuracy
when - added to the information on the minutia.
16(No Transcript)
17Types of Fingerprint Sensors
Static capacitive Type 1 Static capacitive Type
2 Dynamic capacitive Luminescent capacitive
Optic reflexive Optic transmissive with fiber
optic plate Acoustic (ultrasound) Pressure
sensitive Thermal line Capacitive and optical
line
18Secugen FDU01A Fingerprint Scanner
- Works on fingerpoint version 1.2
- It integrates fingerprint matching technology
into applications written for Microsoft windows
OS - Controls are FPRegister and FPMatch
- Enables components to perform 2 types of
matching Verification and Identification - Control has capability of storing fingerprint
templates into databases.
19- A three-dimensional fingerprint is applied to the
sensor window of a SecuGen fingerprint
recognition device - the fingerprint is scanned
- a gray scale fingerprint image is captured
- All fingerprints contain number of minutiae
- they include certain visible aspects of
fingerprints such as ridges, ridge endings, and
bifurcations (forks in ridges) - Minutiae are generally found in the core points
of fingerprints - core points are located near the centers of
fingerprints.
20- Core points on different fingerprint patterns
- A core point is defined as the topmost point on
the innermost upwardly curving ridgeline.
21Secugen Desktop-DEMO
22(No Transcript)
23References
1)Statistical Analysis and system performance
estimates by Roddy and Stosz http//www.biometri
cs.org/REPORTS/IEEE_pre.pdf 2)Fingerprintmatching
using minutiae and template matching by Anil
Jain and Arun Ross, Michigan State
University http//biometrics.cse.msu.edu/RossMinT
exture_ICIP01.pdf 3)Security protocols for
biometrics by Luciano Rilo and Chris Mitchell
http//www.isg.rhul.ac.uk/cjm/spfbbc.pdf
244) http//www.cubs.buffalo.edu/informatics.shtml
5) http//www.bromba.com/faq/fpfaqe.htmFingerprin
t-Merkmale 6) http//www2.linuxjournal.com/articl
e/3013 7)Secugen Biometrics Solutions
http//www.secugen.com/support/tech.htm5
25Thank You!!!