SlideShare une entreprise Scribd logo
1  sur  28
Werner Blessing,  Founder of BIOMETRY
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A modified Video camera is used for iris identification.
Pits Freckles Corona 266 DOF* * Each Degree of Freedom (Freiheitsgrad) has thousands Variations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template  1 … 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template  2 Template  0 1  2  3  4  5  6  7  8  9  0   number
 
[object Object],[object Object],[object Object],[object Object]
www.tabularasa-euproject.org 7th Framework  Research Programme  of the European Union  Trusted Biometrics under Replay & Spoofing Attacks
 
„ out of the box products“
Permanent  Authentication: ID – Perma Face Biometric Face Recognition Initial Authentication  with four figures Face, Voice, and Word Recognition
ID ComBiom  is an All in One Software. The user is always free to decide whether he wants to use  ComBiom  as a package or just single parts of it, such as  PermaFace  only or  PermaVoice  only.  ID Perma Face  will do a permanent biometric face control. If the wrong user is trying to steal data, the system would identify the thief and switch off. ID Perma Voice  identifies the user on it‘s biometric voice identification only. For example at night, without light.
 
API - ID Start MobiComBiom
 
Trust %  Value  Time  100 % 10 % Adaptive Trust Level Your individual/personal Trust Level: - Maximum Payment - Level of Credit at bank - Personal Setting  10  Min. 60  Min. = Maximum 100% = Adds  10% = Adds 5%
One Software Once enroled Many applications very adaptive use
[email_address]

Contenu connexe

Tendances

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
anasz
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 

Tendances (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
BIOMETRYsso
BIOMETRYssoBIOMETRYsso
BIOMETRYsso
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometric
Biometric Biometric
Biometric
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
 
Biometric
BiometricBiometric
Biometric
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 

En vedette

Millenniumonderwijs
MillenniumonderwijsMillenniumonderwijs
Millenniumonderwijs
SuperPOLL
 
교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]
혁 김
 
Completa presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguisticCompleta presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguistic
ontinyentina
 
toekomstproject
toekomstprojecttoekomstproject
toekomstproject
SuperPOLL
 
Politics of the street
Politics of the streetPolitics of the street
Politics of the street
SuperPOLL
 
Erasmus, heaven or hell?
Erasmus, heaven or hell?Erasmus, heaven or hell?
Erasmus, heaven or hell?
SuperPOLL
 
детям о пожарной безопасности
детям о пожарной безопасностидетям о пожарной безопасности
детям о пожарной безопасности
virtualtaganrog
 
кружок соловушк визиткаа
кружок соловушк  визиткаакружок соловушк  визиткаа
кружок соловушк визиткаа
virtualtaganrog
 
пед психолог кузнецова портфолио
пед психолог кузнецова портфолиопед психолог кузнецова портфолио
пед психолог кузнецова портфолио
virtualtaganrog
 
Linea y Punto sobre Plano
Linea y Punto sobre PlanoLinea y Punto sobre Plano
Linea y Punto sobre Plano
marap163
 

En vedette (20)

Resolucion judicial
Resolucion judicialResolucion judicial
Resolucion judicial
 
Millenniumonderwijs
MillenniumonderwijsMillenniumonderwijs
Millenniumonderwijs
 
교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]교육정보 서비스 특론 과제[김 혁]
교육정보 서비스 특론 과제[김 혁]
 
EAS321 essay prep and units 5 & 6
EAS321 essay prep and units 5 & 6EAS321 essay prep and units 5 & 6
EAS321 essay prep and units 5 & 6
 
Eas321 seminar 10
Eas321 seminar 10Eas321 seminar 10
Eas321 seminar 10
 
Semiotica
SemioticaSemiotica
Semiotica
 
Completa presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguisticCompleta presentación de sanitat amb linguistic
Completa presentación de sanitat amb linguistic
 
Get a give
Get a giveGet a give
Get a give
 
toekomstproject
toekomstprojecttoekomstproject
toekomstproject
 
Politics of the street
Politics of the streetPolitics of the street
Politics of the street
 
Erasmus, heaven or hell?
Erasmus, heaven or hell?Erasmus, heaven or hell?
Erasmus, heaven or hell?
 
Wehrpflicht - Neujahrsempfang
Wehrpflicht - NeujahrsempfangWehrpflicht - Neujahrsempfang
Wehrpflicht - Neujahrsempfang
 
группа № 5
группа № 5группа № 5
группа № 5
 
детям о пожарной безопасности
детям о пожарной безопасностидетям о пожарной безопасности
детям о пожарной безопасности
 
солнце
солнцесолнце
солнце
 
Emotional focused-therapy-greenberg
Emotional focused-therapy-greenbergEmotional focused-therapy-greenberg
Emotional focused-therapy-greenberg
 
Vortrag Cartes in Asia
Vortrag Cartes in AsiaVortrag Cartes in Asia
Vortrag Cartes in Asia
 
кружок соловушк визиткаа
кружок соловушк  визиткаакружок соловушк  визиткаа
кружок соловушк визиткаа
 
пед психолог кузнецова портфолио
пед психолог кузнецова портфолиопед психолог кузнецова портфолио
пед психолог кузнецова портфолио
 
Linea y Punto sobre Plano
Linea y Punto sobre PlanoLinea y Punto sobre Plano
Linea y Punto sobre Plano
 

Similaire à Vortrag CeBIT 2011 - Biometric Security

Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
MobileMonday Estonia
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
suniljoshi151
 
MobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication BiometricsMobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication Biometrics
BIOMETRY.com AG
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
STO STRATEGY
 

Similaire à Vortrag CeBIT 2011 - Biometric Security (20)

Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
 
2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch
 
2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
MobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication BiometricsMobiComBiom: Mobile Comunication Biometrics
MobiComBiom: Mobile Comunication Biometrics
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
E banking security
E banking securityE banking security
E banking security
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Vortrag CeBIT 2011 - Biometric Security

  • 1. Werner Blessing, Founder of BIOMETRY
  • 2.  
  • 3.  
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. A modified Video camera is used for iris identification.
  • 10. Pits Freckles Corona 266 DOF* * Each Degree of Freedom (Freiheitsgrad) has thousands Variations
  • 11.
  • 12.  
  • 13.  
  • 14.  
  • 15. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template 1 … 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template 2 Template 0 1 2 3 4 5 6 7 8 9 0 number
  • 16.  
  • 17.
  • 18. www.tabularasa-euproject.org 7th Framework Research Programme of the European Union  Trusted Biometrics under Replay & Spoofing Attacks
  • 19.  
  • 20. „ out of the box products“
  • 21. Permanent Authentication: ID – Perma Face Biometric Face Recognition Initial Authentication with four figures Face, Voice, and Word Recognition
  • 22. ID ComBiom is an All in One Software. The user is always free to decide whether he wants to use ComBiom as a package or just single parts of it, such as PermaFace only or PermaVoice only. ID Perma Face will do a permanent biometric face control. If the wrong user is trying to steal data, the system would identify the thief and switch off. ID Perma Voice identifies the user on it‘s biometric voice identification only. For example at night, without light.
  • 23.  
  • 24. API - ID Start MobiComBiom
  • 25.  
  • 26. Trust % Value Time 100 % 10 % Adaptive Trust Level Your individual/personal Trust Level: - Maximum Payment - Level of Credit at bank - Personal Setting 10 Min. 60 Min. = Maximum 100% = Adds 10% = Adds 5%
  • 27. One Software Once enroled Many applications very adaptive use