Transcript
Page 1: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Usable Biometrics

Ashley BrooksUsability and Privacy 95-899Cranor, Reiter, and HongApril 11, 2006

Page 2: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Outline Biometric Basics

What is Biometrics?Why use Biometrics?Model of Biometric systemTypes of Biometrics

Evaluating Accuracy User Acceptance Advantages & Disadvantages

Page 3: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Biometrics Derived from the Greek words

“Bio”: Life“Metric”: to measure

Measures and Analyzes characteristicsPhysiologicalBehavioral

Authentication

Page 4: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Authentication 2 major means for authentication

IdentificationVerification

Identification vs. VerificationQuestion raisedAnalysisUses

Page 5: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Biometric Components

Page 6: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Types of Biometrics

PhysiologicalFingerprintsFaceEyesDNA

BehavioralVoiceKeystroke

Page 7: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Fingerprinting

Page 8: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Face

Page 9: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Eyes

Page 10: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

DNA

Page 11: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Voice

Page 12: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Key Stroke Requires no special

hardware Methods are

transparent to users increasing user acceptance

Can be used for cryptographically stronger secrets for login and encryption

Page 13: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Accuracy Usability Metrics

Failure to Enroll (FTE)Failure to Acquire (FTA)

Performance MetricsFalse Acceptance Rates (FAR)False Rejection Rates (FRR)

Page 14: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Usability MetricsFailure to enroll (FTE)

Medicine IntakeHoarsenessSticky fingersCataractRare skin diseases

Failure to acquire (FTA)Smudged finger

printsRetina alignmentMumblingHand positioning

Page 15: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Performance Metrics

Page 16: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

User Acceptance Socially acceptable

Knowledge of technology and computers

Acceptance of the concept Usability Security Personal privacy

Page 17: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Usability ConsiderationsFamiliarity with characteristicsExperience with devicesEnvironment of useTransaction Criticality

Page 18: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Security Considerations Biometrics are not secrets and are

therefore susceptible to modified or spoofed measurements

There is no recourse for revoking a compromised identifier

Strategic Solutions Liveness testing Multi-biometrics

Page 19: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Privacy Considerations

A reliable biometric system provides an irrefutable proof of identity

Threatens individuals right to anonymity Cultural concerns Religious concerns Violates civil liberties

Strategic Solutions Biometric cryptosystems Transparency

Page 20: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

AdvantagesReduces cost within organizations Increases securityCompetitive advantageConvenience to employeesNon-repudiationEliminates a paper trail

Page 21: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

DisadvantagesAccuracy of PerformanceFailure to enroll rate Information AbuseMay violate privacy

Page 22: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

Conclusion Biometrics is a technology that

can simplify the process of authentication

Biometrics can be best used in situations where specific identity or exception identity is desired

Page 23: Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

References Tynan, Dan, “Biometrics: from Reel to Real”

www.pcworld.com/resource/printable/article/o,aid,120889,00.asp Yudkowsky, Chaim, “Byte of Success”,

http://accounting.smartpros.com/x40536.xml http://perso.wanadoo.fr/fingerchip/biometrics/movies.htm Biometrics

http://searchsecurity.techtarget.com/sdefinition/0,,sid14_gci211666,00.html International Biometric Group,

http://www.biometricgroup.com/reports/public/reports/ Patrick, Andrew S., “Usability and Acceptability of Biometric Security

Systems” , Institute for Information Technology National Research Council Biometric Assessment Benefits http://www.ax-sbiometrics.com/riskans.htm Bioidentification http://www.bromba.com/faq/biofaqe.htm Fact sheet

http://www.jrc.cec.eu.int/download/press/20050330_biometrics_fact_sheet.pdf