12.07.2015 Views

Biometrics and its applications in Singapore - Biometrics Institute

Biometrics and its applications in Singapore - Biometrics Institute

Biometrics and its applications in Singapore - Biometrics Institute

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Biometrics</strong> <strong>and</strong> <strong>its</strong> <strong>applications</strong> <strong>in</strong>S<strong>in</strong>gaporeM<strong>in</strong>istry of Home AffairsS<strong>in</strong>gapore*All images are copyrights of their respective owners


Public Sector: BIKES ProjectOverview:- <strong>Biometrics</strong> Identification of Motor-BikersSystems Facilitates self- immigration clearance atdesignated lanes for motorcyclists (i.e. 1person per motorcycle)Highlights:- Requires the user to pre-register hisF<strong>in</strong>gerpr<strong>in</strong>t at enrolment stations About 40,000 enrolees Scheme is made available to S<strong>in</strong>gapore Citizens All S<strong>in</strong>gapore Permanent ResidentsBenef<strong>its</strong>:- Clearance now takes under 16 secondsper motorcyclistNext steps:- To allow for clearance of pillion riders aswell Do<strong>in</strong>g this for cars will be the Holy Grail*All images are copyrights of their respective owners


Public Sector: eIACS ProjectOverview:- enhanced Immigration Automated ClearanceSystem Automated immigration clearance us<strong>in</strong>g:- Mach<strong>in</strong>e- Readable S<strong>in</strong>gapore Passport User’s F<strong>in</strong>gerpr<strong>in</strong>tHighlights:- First commissioned <strong>in</strong> Mar 2006 Annual figures place 1.8 million S<strong>in</strong>gaporeansclear<strong>in</strong>g via eIACS lanes Won “Most Innovative Use of InfoCommTechnology (Public Sector) at the 2006 NationalInfoComm Awards Won the Gold Award at the <strong>in</strong>augural TEC PublicService Innovation Awards ceremonyBenef<strong>its</strong>:- Enables the 3 million S<strong>in</strong>gapore Passport holdersto clear Immigration under 12 seconds No user pre-registration requiredNext Steps:- Implement<strong>in</strong>g this for S<strong>in</strong>gapore PermanentResidents (SPR) In future, how to <strong>in</strong>clude all foreign visitors toS<strong>in</strong>gapore will be the Holy Grail*All images are copyrights of their respective owners


S<strong>in</strong>gapore St<strong>and</strong>ard ID The S<strong>in</strong>gapore St<strong>and</strong>ard ID (SSID) or SS 529SSID is a common st<strong>and</strong>ard applicable tovarious identification cards <strong>and</strong> their read<strong>in</strong>gdevices used by government agencies <strong>and</strong>private organisations <strong>in</strong> S<strong>in</strong>gapore Based on ICAO’s electronic passports (e-passport)specifications With extensions for data <strong>and</strong> security that isnot required or stored <strong>in</strong> an e-passport Specifies Data structure, security <strong>and</strong> access conditionsfor a smartcard that conta<strong>in</strong>s personalidentification data Supports Contact or contactless read<strong>in</strong>g<strong>Biometrics</strong> Adoption of SS 529 SSID Civil Aviation Authority of S<strong>in</strong>gapore PSA S<strong>in</strong>gapore Term<strong>in</strong>alsChangi International Airport*All images are copyrights of their respective owners


Private Sector Initiatives<strong>Biometrics</strong> Projects <strong>in</strong> S<strong>in</strong>gapore


Private Sector:Foreign Worker Dormitories Overview S<strong>in</strong>gapore- based Face Recognition vendor Dormitory Management Company (MultiHub) Deployed 2D Facial Recognition screen<strong>in</strong>g atentrance Prevent illegal immigrants from seek<strong>in</strong>g shelter Prevent shar<strong>in</strong>g of access cards among workers Highlights:- 4,500 enrolees 10 lanes of secure access <strong>in</strong> an outdoorenvironment Resistant to light<strong>in</strong>g conditions 32 cameras to track & monitor workers’movements*All images are copyrights of their respective owners


Private Sector:Pay-by-TouchBackground Privately held US company which enabled consumersto pay for goods <strong>and</strong> services with a swipe of theirf<strong>in</strong>ger on a biometric sensorNov 2006: Partnered with Citibank (S<strong>in</strong>gapore) forpayment process<strong>in</strong>g with “the touch of a f<strong>in</strong>ger” “Card-less” credit card transactions at retailoutlets Abrupt closure on 19 th March 2008S<strong>in</strong>gaporean sentiments on the affair Innovative payment scheme was widely accepted <strong>and</strong>adopted Many wrote letters to newspaper forums to suggestanother company to revive the biometric paymentscheme*All images are copyrights of their respective owners


Other matters:Failed Attack on S<strong>in</strong>gapore ePassportRFID Enabled 'Biometric' passports conta<strong>in</strong>:- F<strong>in</strong>gerpr<strong>in</strong>t Facial Image Birth Certificate Home Address Phone NumbersDur<strong>in</strong>g SyScan 2008, Adam Laurie shared onthe test results of an attempt to read <strong>and</strong> thenmodify the contents of RFID chip Succeeded on several countries’ ePassport Implemented only Basic Access Control(BAC) Low entropy & susceptible to brute forceattack But unable to read the DG3 (f<strong>in</strong>gerpr<strong>in</strong>t data)on S<strong>in</strong>gapore ePassport Protected by Extended Access Control (EAC)*All images are copyrights of their respective owners


*All images are copyrights of their respective owners


Knowledge Shar<strong>in</strong>g What is the Next Generation DocumentSecurity concept? Perform real-time checks aga<strong>in</strong>st thedocument’s Access Control List (ACL) beforeunlock<strong>in</strong>g the documents for view<strong>in</strong>g Automatically lock the document upondetect<strong>in</strong>g the user’s absence Able to block all unauthorized user access Video Demos POC demo: Encrypted document repositorywith <strong>Biometrics</strong>*All images are copyrights of their respective owners


Video Demo:Secure SharePo<strong>in</strong>t withF<strong>in</strong>gerpr<strong>in</strong>t <strong>Biometrics</strong>


Interest<strong>in</strong>g Challenges*All images are copyrights of their respective owners


Challenge:Mobile <strong>Biometrics</strong> What S<strong>in</strong>gapore envisions:- No need for proprietary drivers to be <strong>in</strong>stalled(i.e. Driver-less) Just plug <strong>in</strong> any USB biometric reader <strong>and</strong> beable to convert any user mode (e.g. lockeddown kiosk) <strong>in</strong>to a biometrics- capableworkstationNot just do a simple “embedded match toaccess USB storage” To implement cloud- capable, portable <strong>and</strong>distributed security us<strong>in</strong>g USB devicesaugmented with <strong>Biometrics</strong> <strong>Biometrics</strong> is crucial for “proof of presence” Comb<strong>in</strong>ed scheme with digital signatures Obstacles faced:- No biometric reader available which canoperate without drivers*All images are copyrights of their respective owners


*All images are copyrights of their respective owners


<strong>Biometrics</strong> transition to ma<strong>in</strong>stream Although many of us th<strong>in</strong>k of <strong>Biometrics</strong> as someth<strong>in</strong>g“ma<strong>in</strong>stream” or acceptable, there are reservations overthe security of such devices by everyday users Example – Biometric flash devices As seen from user comments Users still f<strong>in</strong>d biometric flash devices difficult to operate (swipesensor technology), reliability of sensors <strong>in</strong> doubt There are doubts about security (password access is alwaysbackup for biometrics, defeats purpose of pay<strong>in</strong>g more for<strong>Biometrics</strong>, attempt to connect biometric drives withoutauthentication)*All images are copyrights of their respective owners


Black hat attacks– Notebook Face Recognition Biometric attacks feature yet aga<strong>in</strong> <strong>in</strong> Black Hat 2009 Vietnamese researchers show attacks on notebookFR log<strong>in</strong>s MHA tested photo attacks on webcam with FR back <strong>in</strong> 06 Simple photo attack or video attacks suffice Best practice: 2-factor authentication*All images are copyrights of their respective owners


Whats Next?We see new technology <strong>and</strong> <strong>applications</strong> help<strong>in</strong>g to susta<strong>in</strong><strong>in</strong>terest <strong>in</strong> <strong>Biometrics</strong> Saliva <strong>Biometrics</strong> – Push<strong>in</strong>g the envelope?From New Scientist – “A new worldwide survey of thehuman saliva microbiome – the bugs <strong>in</strong> our spit – f<strong>in</strong>dsthat a man from La Paz, Bolivia, shares no moremicrobes <strong>in</strong> common with his neighbours than with awoman from Shanghai.”http://www.newscientist.com/article/dn16678-spit-bacteria-could-be-as-dist<strong>in</strong>ct-asf<strong>in</strong>gerpr<strong>in</strong>ts.html?DCMP=OTC-rss&nsref=onl<strong>in</strong>e-news F<strong>in</strong>gerpr<strong>in</strong>t log<strong>in</strong>s will probably not be obsolesced bySaliva scann<strong>in</strong>g USB pads anytime soonCredit Card <strong>Biometrics</strong>Accord<strong>in</strong>g to CreditCards.com trends po<strong>in</strong>t for <strong>Biometrics</strong> tobe widely accepted <strong>in</strong> credit card payments A smartphone built by Fuj<strong>its</strong>u for NTT DoCoMo serves as amobile wallet <strong>and</strong> has a f<strong>in</strong>gerpr<strong>in</strong>t sensor to lock the phonefrom unauthorized accessIncreas<strong>in</strong>gly, consumers are ready to accept biometrics as ameans to convenience themselves*All images are copyrights of their respective owners


*All images are copyrights of their respective owners


Held on 7 th - 9 th Oct 2008 <strong>in</strong> Suntec InternationalConvention & Exhibition CentreMulti-Track conference & exhibition:- Law Enforcement Track (Closed DoorGovernment only) <strong>Biometrics</strong> Track (1 day) Enterprise Security Track eID <strong>and</strong> Personal Security Track Infrastructure Protection Track Mobile Security Track CxO Track (by <strong>in</strong>vitation only) CISO Track (by <strong>in</strong>vitation only)*For more details, please visit www.govware.sg*All images are copyrights of their respective owners


Conclusion <strong>Biometrics</strong> has transitioned from esoteric sci-fitech to everyday system Challenge has moved on From global security, to enterprise <strong>and</strong> endusersecurity Next phase for large scale <strong>applications</strong> E.g. Bank<strong>in</strong>g, personal security systems Nex Gen Document Security Where are the deployments? Technology refresh due for projectscommissioned 4-5 years ago New <strong>in</strong>frastructure (i.e. SOE <strong>in</strong> S<strong>in</strong>gapore) Invitation to Government Ware 2009 Website: www.govware.sg Usually <strong>in</strong> Sept or Oct of the year See you there!*All images are copyrights of their respective owners


End of presentationThank You*All images are copyrights of their respective owners

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!