biometrics: libraries have begun to see the value of biometrics. m.g. selvi technical officer center...

23
have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics, University of Madras.

Upload: russell-reed

Post on 16-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

BIOMETRICS: Libraries have begun to see the value of biometrics.M.G. SELVITechnical OfficerCenter of Advanced Study in Crystallography and Biophysics,University of Madras.

INTRODUCTION

Biometrics is the Biometrics is the Science and Science and Technology of Technology of Measuring and Measuring and Analyzing Biological Analyzing Biological data.data.

It is an Automated Method of recognizing a person based on a Physiological or

Behavioral characteristicsThe Features measured are,

facefinger printhand geometryhand writingirisvoiceblood vessels in the retinacoloration in the cornea of the eyeDNA from tissue samples

Biometric-Based Authentication Dr. S.R. RANGANATHAN, Father of Dr. S.R. RANGANATHAN, Father of

Library Science said, “ Library Science said, “ The Right Book to The Right Book to the Right Reader at the Right Time the Right Reader at the Right Time ””

At present distinguishing “The Right At present distinguishing “The Right Person” from an imposter is the key to Person” from an imposter is the key to security and trust.security and trust.

Biometric based solution provide Biometric based solution provide Personal data privacyPersonal data privacy Confidential financial transactionConfidential financial transaction

Biometric-base authentication applications include WorkstationWorkstation Network and Domain accessNetwork and Domain access Single Sign-onSingle Sign-on Application logonApplication logon Data ProtectionData Protection Remote access to resourcesRemote access to resources Transaction security and Transaction security and Web security.Web security.

Biometric Device – Fingerprint

Finger Print isFinger Print is not easily not easily

borrowed, borrowed, lostlost stolenstolen forgottenforgotten falsified orfalsified or guessed.guessed.

Biometrics and LibrariesIn libraries, finger print In libraries, finger print

identification has the additional benefits identification has the additional benefits ofof

oConvenienceConvenienceoCustomer confidenceCustomer confidenceoPrevent theft and vandalismPrevent theft and vandalismoPrevent unauthorized & Prevent unauthorized &

fraudulent usefraudulent useoImproves safetyImproves safetyoAccuracy andAccuracy andoSecuritySecurity

Biometric Finger Scanners

It consists of It consists of o A reader or scanning A reader or scanning

devicedeviceo Software that converts the Software that converts the

scanned information into scanned information into Digital form and compares Digital form and compares match pointsmatch points

o A Database that stores the A Database that stores the Biometric data for Biometric data for comparisoncomparison

Biometric System

Finger print identification Finger print identification process consists of two process consists of two essential proceduresessential procedures

EnrollmentEnrollment AuthenticationAuthentication

No person’s finger No person’s finger prints are identical to prints are identical to those of another those of another individual! individual!

Comparison for identification

A Verification A Verification SystemSystem

It conducts a one-to-It conducts a one-to-one comparison (1:1) one comparison (1:1) to determine whether to determine whether the identity is true.the identity is true.

eg. Accessing an eg. Accessing an online secure data online secure data source.source.

An Identification An Identification SystemSystem

It conducts a one-to-It conducts a one-to-many (1:N) many (1:N) comparison to comparison to establish a subject’s establish a subject’s identity.identity.

eg.Front counter eg.Front counter check-incheck-in

Benefits of Biometrics in LibrariesFrom LIBRARY POINT OF VIEWFrom LIBRARY POINT OF VIEW Recurring cost for Library card eliminatedRecurring cost for Library card eliminated Easy and foolproof verification of end userEasy and foolproof verification of end user Rack management for book retrievalRack management for book retrieval Dynamic & easy searching of booksDynamic & easy searching of books Online budget and account maintenanceOnline budget and account maintenance Instant reportsInstant reports No misuse of authority No misuse of authority Full inventory controlFull inventory control

From Student/ Member point of view

•                   Problems due to library card will be Problems due to library card will be eliminated.eliminated.

•                   No misuse of library card is possible due to No misuse of library card is possible due to fingerprint.fingerprint.

•                   Searching of complete library on a fingertip Searching of complete library on a fingertip without scanning whole manual register.without scanning whole manual register.

•                   No time wastage in issuing/returning of No time wastage in issuing/returning of booksbooks

•               Control in Library Internet Access, Self Control in Library Internet Access, Self check out systems and Electronic media control check out systems and Electronic media control (DVDs, CDs).(DVDs, CDs).

Diagram explaining biometric needs for employees & members in

libraries

CENTRAL SERVER AND

MANAGER

EMPLOYEES

MEMBERS

NON-MEMBERS

PASSWORD – Password management &

Control for Computers,Websites,

Application & Corporate Networks

TELLER – File Cabinet and Drawer Access

TIME – Employee Time and

Attendance

MEMBER – I.D. Theft Prevention for Employees and Members

ACCESS – Interior and/or Exterior Door Access

BIOMETRICS IN PC ACCESS, NETWORK ACCESS, PASSWORD ELIMINATION IN

LIBRARIES

                Protects individual PCs and Network Access.Protects individual PCs and Network Access.

                Reduce IT helpdesks calls for password resets.Reduce IT helpdesks calls for password resets.

                Authenticate who is accessing what PC, Authenticate who is accessing what PC, Network, and application with exceptional Network, and application with exceptional accuracy.accuracy.

                Associate a single fingerprint with as many or as Associate a single fingerprint with as many or as few passwords or PINs on a system. Single sign or few passwords or PINs on a system. Single sign or convenience for application and websites.convenience for application and websites.

                Logon automatically without having to type in Logon automatically without having to type in another password.another password.

                Eliminate the security risks of written Eliminate the security risks of written down passwords.down passwords.

                Protects passwords from most key Protects passwords from most key logging viruses.logging viruses.

                Prevent stolen or Borrowed Prevent stolen or Borrowed passwords.passwords.

                Easy to use and enroll fingerprint Easy to use and enroll fingerprint profiles.profiles.

                Easy installation.Easy installation.

Web-Based Biometric Authentication System (WBAS)

The authentication can be done by:

Fingerprint only (needs a Fingerprint only (needs a fingerprint reader) fingerprint reader)

Face only (needs a Face only (needs a webcam/camera) webcam/camera)

Fingerprint and Face (needs a Fingerprint and Face (needs a fingerprint reader and a fingerprint reader and a webcam/camera) webcam/camera)

Biometrics and smart card system

Biometrics add an additional Biometrics add an additional layer of security to a smart layer of security to a smart card systemcard system

Smart cards provide the Smart cards provide the ““something you havesomething you have”factor.”factor.

The “The “Something you knowSomething you know”is ”is

usually a PINusually a PIN Integrating a finger print Integrating a finger print

scanner into a smart card reader scanner into a smart card reader increases security by adding increases security by adding ““something you aresomething you are””

Biometrics in INDIAIndia which is perpetually under the India which is perpetually under the threat of terrorism and security threat of terrorism and security breach, is gearing up to adopt various breach, is gearing up to adopt various biometric methods.biometric methods.

It is used in It is used in •Defense and Security IndustryDefense and Security Industry•Police AdministrationPolice Administration•Finance Ministry (PANs)Finance Ministry (PANs)•Home Affairs (IDs)Home Affairs (IDs)•LibrariesLibraries

BIOMETRICS INDIA EXPO 2007:

 The First International The First International Conference Conference

and Exhibition of Biometric Technologies and Exhibition of Biometric Technologies and Applicationsand Applications will be held at will be held at PRAGATI PRAGATI MAIDAN, NEW DELHIMAIDAN, NEW DELHI, September 13-, September 13-15, 2007.15, 2007.

CONCLUSION

Technology is growing rapidly, but at Technology is growing rapidly, but at the  the  

same time security breaches and same time security breaches and transaction frauds are also in the transaction frauds are also in the increase world over. All agencies increase world over. All agencies including Libraries who are in need of including Libraries who are in need of security, surveillance and safety have to security, surveillance and safety have to adopt biometrics.adopt biometrics.

““THE FUTURE DEPENDS ON WHAT WE THE FUTURE DEPENDS ON WHAT WE DO IN THE PRESENT”DO IN THE PRESENT”

-MAHATMA GANDHI-MAHATMA GANDHI

Let us hope for a safe and secure Let us hope for a safe and secure future!future!

Thank you,