11 research outputs found

    Identity Management Technology

    Get PDF
    This offer comes from researchers and professors from a Spanish University. They offer solutions in Identity Management for human beings (from Identification Cards to Biometrics). They offer cooperation in R&D task, as well as Assisting in Management, Dissemination of results and Standardization. They have proved experience in both national and european projects (e.g. eEpoch, BioSec).Contrato Programa de Comercialización e Internacionalización. Sistema Regional de Investigación Científica e Innovación Tecnológica. (Comunidad de Madrid; Universidad Carlos III de Madrid

    Tamper-proof operating system

    Get PDF
    Due to the sensibility of biometric data, security in biometric devices has to be considered. One of the ways to protect privacy is to include a Tamper-proof operating system. This O.S. would not allow direct access to hardware resources of the device, neither to temporary nor permanent data. This O.S. has also to control the different life stages of the device. A set of requirements have been defined that have to be considered when developing such Tamper-proof O.S.Finally an example of the commands to be covered by some devices have been given. Including this kind of O.S. in all biometric devices will improve the security of the whole system. Unfortunately, when some parts of the biometric system has to be implemented in a general purpose computer with an open Operating System, applying these rules is not easy

    Tecnología de Gestión de la Identidad

    Get PDF
    Este núcleo de investigadores y profesores de la Universidad Carlos III de Madrid, ofrecen soluciones en Gestión de la Identidad de Personas (desde Tarjetas de Identificación, hasta Sistemas Biométricos). El grupo, con probada experiencia en proyectos tanto nacionales como Europeos (p. ej. eEpoch, BioSec), ofrece colaboración en tareas de I+D, Apoyo a la Gestión, Diseminación y Normalización

    Wrist vascular biometric recognition using a portable contactless system

    Get PDF
    Human wrist vein biometric recognition is one of the least used vascular biometric modalities. Nevertheless, it has similar usability and is as safe as the two most common vascular variants in the commercial and research worlds: hand palm vein and finger vein modalities. Besides, the wrist vein variant, with wider veins, provides a clearer and better visualization and definition of the unique vein patterns. In this paper, a novel vein wrist non-contact system has been designed, implemented, and tested. For this purpose, a new contactless database has been collected with the software algorithm TGS-CVBR®. The database, called UC3M-CV1, consists of 1200 near-infrared contactless images of 100 different users, collected in two separate sessions, from the wrists of 50 subjects (25 females and 25 males). Environmental light conditions for the different subjects and sessions have been not controlled: different daytimes and different places (outdoor/indoor). The software algorithm created for the recognition task is PIS-CVBR®. The results obtained by combining these three elements, TGS-CVBR®, PIS-CVBR®, and UC3M-CV1 dataset, are compared using two other different wrist contact databases, PUT and UC3M (best value of Equal Error Rate (EER) = 0.08%), taken into account and measured the computing time, demonstrating the viability of obtaining a contactless real-time-processing wrist system.Publicad

    Minimal template size for Iris-Recognition

    Get PDF
    A method to achieve improvement in template size for an iris-recognition system is reported. To achieve this result, the biological characteristics of the human iris have been studied. Processing has been performed by image processing techniques, isolating the iris and enhancing the area of study, after which multi resolution analysis is made. Reduction of the pattern obtained has been obtained via statistical study

    Evaluation methodology for fake samples detection in biometrics

    Get PDF
    Nowadays biometrics is being used in many applications where security is required. This fact causes that new threatens have appeared and that the number of attempts to break biometric systems has increased. From all potential attacks, those involving damage or thefts to users are the most worrying. Most of them could be avoided if acquisition sensors would have suitable approaches for aliveness detection at the capture process. Many providers claim that their products support these methods but unfortunately it has been discovered that some products do not detect fake samples. In this paper a methodology based on Common Criteria is given to evaluate, in an independent way, whether biometric capture devices implement methods for fake samples detection, and till which extent such methods are effective. This methodology has been tested with sensors from different modalities

    El Parque Científico UC3M, gestor de los derechos de propiedad industrial e intelectual

    Get PDF
    Audiovisulaes: Entrevista a Esther Arias, Oficina Española de Patentes y Marcas. Disponible en https://www.youtube.com/watch?v=K38IC0NDctE .La gestión interna de los derechos de propiedad industrial e intelectual procedentes de los resultados de la investigación desarrollada en la Universidad Carlos III de Madrid es competencia de su Parque Científico. Dependiente del vicerrectorado de Investigación, es el responsable de la transferencia de tecnología y conocimiento a las empresas.Un servicio de la UC3M es la plataforma ORIÓN-UC3M, en que la persona investigadora o gestora del grupo de investigación introduce, a medida que se producen, sus ofertas en la plataforma.Contiene: El Parque Científico UC3M, gestor de los derechos de propiedad industrial e intelectual (p. 22) .Los inventores opinan. La experiencia de proteger sus resultados con el Parque Científico UC3M / Valentín Miguel Moreno, Ana García–Armada (p. 23) .-- Más opiniones / Raúl Sánchez–Reíllo, Manuel Armenteros (p. 24)

    Environmental Testing Methodology in Biometrics

    Get PDF
    8 pages document + 5-slide presentation.-- Contributed to: 1st International Biometric Performance Conference (IBPC 2010, NIST, Gaithersburg, MD, US, Mar 1-5, 2010).Recently, biometrics is used in many security systems and these systems can be located in different environments. As many experts claim and previous works have demonstrated, environmental conditions influence biometric performance. Nevertheless, there is not a specific methodology for testing this influence at the moment. Due to it is essential to carry out this kind of evaluations, a new ISO standard was proposed for regularizing them. Such standard was accepted and it has to be specified now.In this work, authors have analyzed the first proposal of this project and other standards about environmental testing. According to this new ISO proposal and current ISO standards and considering aspects of these related standards focused in biometric evaluations, a detailed methodology has been defined. This methodology consists of two parts: on the one hand, the definition of the environmental factors to analyse, including how to generate, control and measure them, and on the other hand, the specification about how to perform the biometric evaluation.This work has been developed within the FPU fellowship program, funded by the Spanish Ministry of Science and Education.Publicad

    Mecanismos de autenticación biométrica mediante tarjeta inteligente

    Full text link
    El objetivo fundamental de esta Tesis es la creación de nuevos Mecanismos de Autenticación del titular de una Tarjeta Inteligente. La motivación de dicho trabajo ha sido la continua proliferación de nuevas aplicaciones donde es necesaria una autenticación del usuario que las utiliza y, por otro lado, las nuevas posibilidades que se abren dentro de la tecnología de dicho tipo de tarjetas de identificación. El nuevo Sistema de Autenticación, está basado en la Identificación Biométrica, realizando la comprobación de la identidad del titular dentro de la propia tarjeta. Para ello se han estudiado distintas técnicas biométricas de forma que se puedan extraer conclusiones que lleven a la definición de un modelo para el nuevo Sistema de Autenticación. Las técnicas escogidas para ser analizadas fueron: la de Reconocimiento de Locutores, es decir, basada en la voz; la Geometría del Contorno de la Mano; y el análisis del Patrón del Iris Ocular. Para cada una de las mencionadas técnicas, se han desarrollado al menos un prototipo, a partir de los cuales se han extraído los datos necesarios para analizar la viabilidad de ser incorporadas dentro de una Tarjeta Inteligente. Del mismo modo, se ha definido un modelo para el nuevo Sistema de Autenticación, desarrollándose prototipos basados en tarjetas con Sistema Operativo Abierto (en concreto, JavaCard), que han avalado el modelo definido
    corecore