BioSlimDiskpresentation v1.1
RiTech International LtdProduct (Signature)Website www.bioslimdisk.com
Marcus ChanDate: 14th August 2009
Overview
• Company Profile
• Biometric Technology
• Bioslimdisk Signature
© RiTech International Ltd, Confidential & Proprietary2
COMPANY PROFILE
RiTech International Ltd
© RiTech International Ltd, Confidential & Proprietary4
• Ritech was established in 1994 as Designer, developer, manufacturer and distributor of innovative products, services & systems in the area of biometrics security and portable data storage.
• Specializes in biometrics security technology with in-house R&D.
• Overseas operation network: Malaysia, Hong Kong, China, India and Europe.
Vision
First Choice Solution provider in the Biometric security industry
© RiTech International Ltd, Confidential & Proprietary5
Biometric
Process
Algorithms
Implementation knowledge
Customised Solutions
Ergonomics and desgin
Sensors
ObjectivesAdvanced Research and Development• Biometrics products for portable information
storage and transportation• Biometrics products for Intellectual Property
Protection• Biometrics products for secure identification
over networks• Biometrics products for as a secure
replacement over existing keys, cards, password which tend to be a burden
© RiTech International Ltd, Confidential & Proprietary6
BIOMETRIC TECHNOLOGY
What is Biometric?
The Science of measuring
and statistically analyzing
biological data
© RiTech International Ltd, Confidential & Proprietary8
What is Biometric?
Biometric Technology
Authentication can be divided into three different factors:
• something you know • something you have • something you are
© RiTech International Ltd, Confidential & Proprietary9
Something you know
Common• Pin Numbers/Code• Learn it , You have to remember the
Code Number• Forced to memorize passwords
Disadvantage:-Software hacking tools via internet, easy to steal by anyone. (e.g. Keylogger)
© RiTech International Ltd, Confidential & Proprietary10
Something you have
Example Smart cards • Cash Card• ATM Card• Visa/Master Card• Door/Building Access Card
Disadvantage:-If picked up by anyone, it can still be used. (e.g. Paying at a Petrol Station)
© RiTech International Ltd, Confidential & Proprietary11
Something you are
Biometrics is what you are!
What you have:1. Your Finger > Fingerprint 2. You cannot loose it3. You cannot give it away
You cannot tell a friend to use your prints.
© RiTech International Ltd, Confidential & Proprietary12
Types of Biometric
1. BEHAVIOURAL– Voice Patterns– Signature Verification– Key Stroke Patterns (Signatures)
2. PHYSIOLOGICAL– Fingerprints– Hand Geometry– Retinal & Iris Scanning– Facial Recognition– DNA Fingerprinting
© RiTech International Ltd, Confidential & Proprietary13
Biometric Comparison
Comparison of various biometric technologiesIt is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters:
• Universality => each person should have the characteristic• Uniqueness => is how well the biometric separates individually
from another.• Permanence => measures how well a biometric resists aging.• Collectability => ease of acquisition for measurement.• Performance => accuracy, speed, and robustness of
technology used.• Acceptability => degree of approval of a technology.• Circumvention => ease of use of a substitute.
© RiTech International Ltd, Confidential & Proprietary14
Biometric Comparison
Comparison of various biometric technologies, modified from Jain et al., 2004 (H=High, M=Medium, L=Low)
Biometrics: Universality Uniqueness Permanence Collectability Performance Acceptability Circumvention
Face H L M H L H LFingerprint M H H M H M HHand geometry M M M H M M MKeystrokes L L L M L M MHand veins M M M M M M HIris H H H M H L HRetinal scan H H M L H L HSignature L L L H L H LVoice M L L M L H LFacial thermograph
H H L H M H H
Odor H H H L L M LDNA H H H L H L LGait M L L H L H MEar Canal M M H M M H M
© RiTech International Ltd, Confidential & Proprietary15
Comparison of existing biometric systems
Fingerprint Identification
Minutiae Definition• Form of Fingerprint
• Number of Lines
• Distance Between Marks
© RiTech International Ltd, Confidential & Proprietary16
Processing & Identification
FingerprintHow many minutiae are needed for comparison?
–Generally, a complete fingerprint is made up of up to 100 minutiae
–Fingerprint recognition normally requires 20~30 minutiae for processing
© RiTech International Ltd, Confidential & Proprietary17
The Biometrics’ Dilemma
© RiTech International Ltd, Confidential & Proprietary18
Biometric Advantages
© RiTech International Ltd, Confidential & Proprietary19
Copy Theft Forgotten LostKey
Badge
PIN Code
BiometricFeature
Advantages of Biometricsfor Access Control
X X X XX X X
X X-
- - - -
- -
BIOSLIMDISK SIGNATURE
21
WHY?
• Threat of data theft is real and costly• Affects employees negatively• Affects company negatively• Loss of productivity and credibility• Loss of profits and sustainability
© RiTech International Ltd, Confidential & Proprietary
HOW?
• Physical theft and hackingActual device is stolen and tapped for data
• Social engineeringPasswords or access keys can be coaxed
• Virtual hacking and theftPopular method of data theft
• Man-in-the-Middle attacksSpying and snooping on communications
© RiTech International Ltd, Confidential & Proprietary22
Securing Data
Signature can meet security challenges withTamper-proof with self-destruct functionFingerprint recognition (biometric)Built-in AES-128 bit data encryptionFeatures to protect user identificationNo passwords during usage
© RiTech International Ltd, Confidential & Proprietary23
Safekeeping
Self Destruct FeatureActivated when tampering is detectedAll data drive is destroyedKeeps confidential data out of reach
No backdoor accessNo password or function to reset securityOnly valid fingerprints are allowed access
© RiTech International Ltd, Confidential & Proprietary24
Hardware Benefits
AES-128bit hardware encryptionKeys never leave SignatureAvoids tapping/snooping of keysAll data on drive is encryptedOn the fly encrypt and decrypt
Totally hardware-basedResistant to software-based attacksSecurity methods are encapsulated in hardware
© RiTech International Ltd, Confidential & Proprietary25
Protecting Fingerprints
Dual-finger authentication Reduces latent fingerprint
copy Intruder requires 2 unique
fingerprints
Limiting fingerprint retries Intruder has less time to guess correct
fingerprint Limits tries and time for correct fingerprint
© RiTech International Ltd, Confidential & Proprietary26
Convenience
• Anti-static rubberized casingHard to copy fingerprints on deviceLess dust attraction to protect sensor
• Cross platform compatibilityNo further software or software neededWorks in Windows, MAC, Linux, Solaris, etc.
© RiTech International Ltd, Confidential & Proprietary27
Unique Service
• Our technology is mature and battletestedOur company is the leader in this field
• Quick response to security breachesProduct is constantly updated
• Customization to end usersSecurity tokens, 3rd party software
© RiTech International Ltd, Confidential & Proprietary28
Summary of Features
1) Dual-Finger Authentication
2) Unique Self Destruct
3) Hardware Crypto AES-128bit
4) Worldwide Patents AwardedUnited Kingdom, Netherlands, Germany, France, China, Hong Kong, Singapore, Malaysia and many more.
© RiTech International Ltd, Confidential & Proprietary29
END