n stage authentication with biometric devices presented by: nate rotschafer sophomore peter kiewit...
TRANSCRIPT
![Page 1: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/1.jpg)
N Stage Authentication with N Stage Authentication with Biometric DevicesBiometric Devices
Presented by:Presented by:
Nate RotschaferNate Rotschafer
SophomoreSophomore
Peter Kiewit InstitutePeter Kiewit Institute
Revised: July 8, 2002
![Page 2: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/2.jpg)
N Stage AuthenticationN Stage Authentication OutlineOutline
– Background on AuthenticationBackground on Authentication– General Network SecurityGeneral Network Security– Need for High Grade AuthenticationNeed for High Grade Authentication– Need for Multiple Factor AuthenticationNeed for Multiple Factor Authentication– Background on Error TypesBackground on Error Types– Forms of Biometric AuthenticationForms of Biometric Authentication– Pros and Cons of Each Biometric TechnologyPros and Cons of Each Biometric Technology– What’s Hot? What’s Not?What’s Hot? What’s Not?– Major PlayersMajor Players– Network Management with Biometric DevicesNetwork Management with Biometric Devices– ProblemsProblems– Proper Network Security with Biometric DevicesProper Network Security with Biometric Devices– Demos and DiscussionDemos and Discussion– PrognosisPrognosis
![Page 3: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/3.jpg)
Background on Background on AuthenticationAuthentication
![Page 4: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/4.jpg)
IdentificationIdentification
The method used by a system (not The method used by a system (not necessarily a computer) to uniquely necessarily a computer) to uniquely identify an individual or group.identify an individual or group.
Examples: User names, Driver’s Examples: User names, Driver’s License, School ID, License, School ID,
Security Badge, Security Badge, Passport Passport
![Page 5: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/5.jpg)
AuthenticationAuthentication
The method(s) used to verify the The method(s) used to verify the given identification against a given identification against a database of known information.database of known information.
Examples: Passwords, Examples: Passwords, Fingerprints, Iris Fingerprints, Iris
Prints,Prints, NegotiationNegotiation
![Page 6: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/6.jpg)
Development of Development of AuthenticationAuthentication
What you know…What you know… What you have…What you have… What you are…What you are… Future Development: How you Future Development: How you
are...are...
![Page 7: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/7.jpg)
General Network SecurityGeneral Network Security
![Page 8: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/8.jpg)
Security is NOTSecurity is NOT
Installing a firewallInstalling a firewall A product or ServiceA product or Service Running an audit and shutting Running an audit and shutting
things offthings off
![Page 9: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/9.jpg)
Security ISSecurity IS
Working productively and without Working productively and without interruptionsinterruptions
Only as good as the weakest linkOnly as good as the weakest link Risk management of resources Risk management of resources
(equipment, people)(equipment, people) Physical securityPhysical security A process, methodology, policies and A process, methodology, policies and
peoplepeople Is 24x7x365Is 24x7x365
![Page 10: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/10.jpg)
General Network SecurityGeneral Network Security
No silver bullet to network securityNo silver bullet to network security Replay attacksReplay attacks Denial of Service ((D)DoS)Denial of Service ((D)DoS) SpoofingSpoofing UsersUsers Dictionary AttacksDictionary Attacks
![Page 11: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/11.jpg)
Security ThoughtsSecurity Thoughts
80-90% are internal issues80-90% are internal issues Hard drive crash (what did you loose, Hard drive crash (what did you loose,
and how long to get back up?)and how long to get back up?) Firewall penetration (what can they do, Firewall penetration (what can they do,
what do they see?)what do they see?) Internet failed (how much lost Internet failed (how much lost
productivity/revenue, backup net productivity/revenue, backup net connection?)connection?)
Some can always get inSome can always get in
![Page 12: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/12.jpg)
General Network Security General Network Security ConclusionConclusion
Biometrics will help but will not Biometrics will help but will not solve all problemssolve all problems
Users are the “weakest link”Users are the “weakest link” Proactive security planProactive security plan
![Page 13: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/13.jpg)
Need for High Grade Need for High Grade AuthenticationAuthentication
![Page 14: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/14.jpg)
Need for High Grade Need for High Grade AuthenticationAuthentication
High Security AreasHigh Security Areas Multiple Factor AuthenticationMultiple Factor Authentication Challenge and Response Challenge and Response
AuthenticationAuthentication High Assurance of Proper High Assurance of Proper
IdentificationIdentification Data Retrieval Based on the PersonData Retrieval Based on the Person
![Page 15: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/15.jpg)
Background on Error TypesBackground on Error Types
![Page 16: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/16.jpg)
Type I Error --- Accept in Type I Error --- Accept in ErrorError
Balance Between Type I and Type Balance Between Type I and Type II ErrorII Error
Most DangerousMost Dangerous High ExposureHigh Exposure PreventablePreventable Need for Additional Security Need for Additional Security
MeasuresMeasures
![Page 17: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/17.jpg)
Type II --- Deny in ErrorType II --- Deny in Error
Balance Between Type I and Type Balance Between Type I and Type II ErrorII Error
Only an InconvenienceOnly an Inconvenience PrventablePrventable Established by a High Security Established by a High Security
PolicyPolicy
![Page 18: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/18.jpg)
Forms of Biometric Forms of Biometric AuthenticationAuthentication
![Page 19: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/19.jpg)
Forms of Biometric Forms of Biometric DevicesDevices
Fingerprint ScannersFingerprint Scanners Retina ScannersRetina Scanners Iris ScannersIris Scanners Voice Print ScannersVoice Print Scanners Handwriting RecognitionHandwriting Recognition Face RecognitionFace Recognition Personal GeometryPersonal Geometry DNADNA
![Page 20: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/20.jpg)
Pros and Cons of Each Pros and Cons of Each Biometric TechnologyBiometric Technology
![Page 21: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/21.jpg)
Fingerprint ScannersFingerprint Scanners
ProsPros ConsCons
![Page 22: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/22.jpg)
Retina ScannersRetina Scanners
ProsPros ConsCons
![Page 23: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/23.jpg)
Iris ScannersIris Scanners
ProsPros ConsCons
![Page 24: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/24.jpg)
Voice Print ScannersVoice Print Scanners
ProsPros ConsCons
![Page 25: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/25.jpg)
Handwriting RecognitionHandwriting Recognition
ProsPros ConsCons
![Page 26: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/26.jpg)
Personal GeometryPersonal Geometry
ProsPros ConsCons
![Page 27: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/27.jpg)
Face RecognitionFace Recognition
ProsPros ConsCons
![Page 28: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/28.jpg)
DNADNA
ProsPros ConsCons
![Page 29: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/29.jpg)
What’s Hot? What’s Not?What’s Hot? What’s Not?
![Page 30: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/30.jpg)
What’s Hot?What’s Hot? Fingerprint ScannersFingerprint Scanners Iris ScannersIris Scanners N Stage AuthenticationN Stage Authentication InteroperabilityInteroperability InterchangeabilityInterchangeability StandardsStandards Server Signature StorageServer Signature Storage
![Page 31: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/31.jpg)
What’s Not?What’s Not?
Retina ScannersRetina Scanners DNADNA 1 or 2 Stage Authentication1 or 2 Stage Authentication
![Page 32: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/32.jpg)
Major PlayersMajor Players
![Page 33: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/33.jpg)
Major PlayersMajor Players
Most ISP NOCsMost ISP NOCs Healthcare OrganizationsHealthcare Organizations Banking IndustryBanking Industry Military/Government AgenciesMilitary/Government Agencies Department of DefenseDepartment of Defense Schools?Schools?
![Page 34: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/34.jpg)
Network Management with Network Management with Biometric DevicesBiometric Devices
![Page 35: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/35.jpg)
CostCost
Fingerprint Scanner --- $100-150Fingerprint Scanner --- $100-150 Retina Scanner --- $400-500Retina Scanner --- $400-500 Iris Scanner --- $200-300Iris Scanner --- $200-300 Voice Print Scanner --- $150-200Voice Print Scanner --- $150-200 Face Recognition --- $150-250Face Recognition --- $150-250
![Page 36: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/36.jpg)
Ease of DeploymentEase of Deployment
Fingerprint Scanner --- EasyFingerprint Scanner --- Easy Retina Scanner --- HardRetina Scanner --- Hard Iris Scanner --- HardIris Scanner --- Hard Voice Print Scanner --- MediumVoice Print Scanner --- Medium Face Recognition --- EasyFace Recognition --- Easy
![Page 37: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/37.jpg)
Ease of ManagementEase of Management
Fingerprint Scanner --- EasyFingerprint Scanner --- Easy Retina Scanner --- MediumRetina Scanner --- Medium Iris Scanner --- MediumIris Scanner --- Medium Voice Print Scanner --- EasyVoice Print Scanner --- Easy Face Recognition --- MediumFace Recognition --- Medium
![Page 38: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/38.jpg)
User EffectsUser Effects
Fingerprint Scanner --- MediumFingerprint Scanner --- Medium Retina Scanner --- MediumRetina Scanner --- Medium Iris Scanner --- MediumIris Scanner --- Medium Voice Print Scanner --- HighVoice Print Scanner --- High Face Recognition --- MediumFace Recognition --- Medium
![Page 39: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/39.jpg)
ProblemsProblems
![Page 40: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/40.jpg)
![Page 41: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/41.jpg)
Proper Network Security With Proper Network Security With Biometric DevicesBiometric Devices
![Page 42: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/42.jpg)
Securing Biometric Securing Biometric SignaturesSignatures
Tamper resistant storageTamper resistant storage Protection from corruptionProtection from corruption Secure signature changesSecure signature changes Secure backupsSecure backups Stop signature interceptionStop signature interception Protect latent signaturesProtect latent signatures
![Page 43: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/43.jpg)
Logon SecurityLogon Security
Trusted Path to the authentication Trusted Path to the authentication device device
Tamper resistance Tamper resistance Clear or encrypted transmissionClear or encrypted transmission Continuous monitoringContinuous monitoring What “goes down the wire”?What “goes down the wire”? Real biometric?Real biometric?
![Page 44: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/44.jpg)
Bypass PreventionBypass Prevention
Tamper resistance at the local Tamper resistance at the local machinemachine
Enhanced biometrics to tell a real Enhanced biometrics to tell a real biometric from a fake biometric biometric from a fake biometric
Both biometrics and passwords Both biometrics and passwords needed needed
![Page 45: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/45.jpg)
ConsistencyConsistency
Environmental effects Environmental effects All network users adhere to the All network users adhere to the
same policysame policy All network machines configured All network machines configured
identicallyidentically
![Page 46: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/46.jpg)
Can Biometrics be Can Biometrics be Bypassed?Bypassed?
How they are connectedHow they are connected The device can be fooledThe device can be fooled ConsistencyConsistency
![Page 47: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/47.jpg)
Demos and DiscussionDemos and Discussion
![Page 48: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/48.jpg)
Demo of Fingerprint Demo of Fingerprint Scanner AuthenticationScanner Authentication
![Page 49: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/49.jpg)
Demo of Iris Scanner Demo of Iris Scanner AuthenticationAuthentication
![Page 50: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/50.jpg)
Wire Capture AnalysisWire Capture Analysis
![Page 51: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/51.jpg)
Recent Bypassing MethodsRecent Bypassing Methods
![Page 52: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/52.jpg)
How to BypassHow to Bypass
![Page 53: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/53.jpg)
Question and AnswerQuestion and Answer
![Page 54: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/54.jpg)
Thanks To:Thanks To:
Dr. Blaine Burnham, Director of Dr. Blaine Burnham, Director of NUCIANUCIA
Defcon 10Defcon 10 Peter Kiewit InstitutePeter Kiewit Institute Dan DevriesDan Devries
![Page 55: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/55.jpg)
Contact InfoContact Info
E-Mail: E-Mail: [email protected]@geniussystems.net
Slides: Slides: http://www.geniussystems.nethttp://www.geniussystems.net– Goto the :. Talks .: section and then to Goto the :. Talks .: section and then to
the “Biometrics” folder then to the the “Biometrics” folder then to the “Defcon” folder and download “Defcon” folder and download the .ppt slides of the presentation.the .ppt slides of the presentation.
![Page 56: N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002](https://reader037.vdocuments.us/reader037/viewer/2022103122/56649cfe5503460f949cf061/html5/thumbnails/56.jpg)
LinksLinks
http://www.http://www.theregustheregus.com/content/55/24956.html.com/content/55/24956.html
http://www.http://www.heiseheise.de/.de/ctct//englishenglish/02/11/114//02/11/114/ http://www.http://www.precisebiometricsprecisebiometrics.com/.com/ http://www.http://www.saflinksaflink.com/.com/ http://http://statstat..tamutamu..eduedu/Biometrics//Biometrics/ http://www.biometrics.org/http://www.biometrics.org/ http://biometrics.http://biometrics.csecse..msumsu..eduedu//