SlideShare a Scribd company logo
Touchless 3D –
        A New Dimension in Fingerprint Technology

                  Technology, System Approach & Security Aspects




                        2012 Security Session, FIT VUT, Brno

                               Torsten Meister – CTO
             Touchless Biometric Systems AG, Pfäffikon (SZ), Switzerland


18.02.2012               Touchless 3D Fingerprinting – Technology & Security Aspects   Page 1
Overview


  • Introduction
        –    Biometrics Today – Expectations and Reality
        –    Fingerprint – What Else?
        –    Processes & Parameters
        –    Security Aspects

  • TBS Technology
        – Touchless Technology Basics
        – Advantages of Touchless 3D Technology
        – Technology Comparison

  • From Sensor to System
        – Markets & Applications
        – Sensors  Terminals  Solutions!
        – The New Device Line 2012




18.02.2012                Touchless 3D Fingerprinting – Technology & Security Aspects   Page 2
Part 1: Introduction




             Introduction to Biometrics




18.02.2012             Touchless 3D Fingerprinting – Technology & Security Aspects   Page 3
Expectations & Reality

      Biometrics is key to solve security challenges of the 21th century
       Reality or Fiction?

 • PRO:
        –    Makes secure identification possible, eliminates weak identification
        –    Unique, constant and always available
        –    Flexible, can be adapted to situation and user group
        –    Can be combined with other systems to increase security
        –    Convenient and User friendly


 • CONTRA:
        – Some technologies not mature yet
        – Market consolidation has just started
        – Not deterministic, identification based on probabilities


       Biometrics is just one aspect of a sophisticated security concept!



18.02.2012                 Touchless 3D Fingerprinting – Technology & Security Aspects   Page 4
Fingerprint – What Else?


 • Fingerprint
        – most adoped technology
        – Fingerprint is unique, constant and can be captured fast & easily
        – mature algorithms & broad range of sensors available
 • Face Recognition
        – Emerging technology, driven by security requirements in public areas
          ('Detecting the face in the crowd')
        – Limited accuracy und feature uniqeness
        – Medium to high price segment
 • Iris Recognition
        – Highest accuracy, but not user friendly and with acceptance problems
        – High price segment
 • Others
        – Hand/Finger Vein, Hand geometry etc.
           Limited accuracy and acceptance


  Fingerprint still takes more than 50%
      of market share!

18.02.2012               Touchless 3D Fingerprinting – Technology & Security Aspects   Page 5
Biometric Processes

 • Enrollment (User registration)
        – User data registration and capturing of biometric reference data
          ('Reference Template')
        – crucial importance for overall system performance


 • Matching (User identification or verification)
        – Comparison of live captured sample with reference data

        – Verification (1:1)
             • requires second token to preselect user list
             • comparison against preselected biometric data only
             • lower requirements regarding system accuracy and speed


        – Identification (1:N)
             • no preselection
             • comparison against reference data of all users
             • high requirements regarding system accuracy and speed




18.02.2012                  Touchless 3D Fingerprinting – Technology & Security Aspects   Page 6
Biometric Parameters


 •    Biometrics is based on probability of user recognition (not deterministic)
 •    Performance defined by system accuracy (sensor, algorithm) and speed
      (interface, platform, software)

 •    Accuracy can be measured using statistical parameters:
       – False Rejects  FRR
       – False Accepts  FAR
       – Equal Error Rate defines final parameter for comparison

 •    Speed can be measured directly:
       – Enrollment process time
       – Verification process time
       – Identification process time




18.02.2012              Touchless 3D Fingerprinting – Technology & Security Aspects   Page 7
Security Aspects

 A system is as secure as its weakest part!
        – Biometrics is part of a total security solution
        – Must not limit system security


 Risk factors:

 • Data Security
        –    Secure data storage
        –    Secure data transfer
        –    Can biometric data be interpreted and repeated?
        –    Can biometric data be revoked?


 • Process Security
        – Is biometric process stable?
        – Is biometric process safe against spoofing?




18.02.2012                Touchless 3D Fingerprinting – Technology & Security Aspects   Page 8
Part 2: TBS Technology




                      TBS Technology




18.02.2012         Touchless 3D Fingerprinting – Technology & Security Aspects   Page 9
Touchless Technology Basics

 •    founded in 2003, focusing on development of a new and unique
      fingerprint sensor
 •    Worldwide unique technology
 •    3 cameras surrounding the finger
       TBS Surround Imager
 •    Finger imaging instead of finger
      printing
 •    Complex illumination process




                                    •    Full-3D and Approx-3D variants,
                                         depending on application
                                    •    Full-3D to create rolled equivalent fingerprints
                                    •    Compliant to 2D technology (touch-based)
                                    •    Approx-3D to extend and optimize center image



18.02.2012             Touchless 3D Fingerprinting – Technology & Security Aspects   Page 10
Advantages of Touchless 3D Technology

 • Superior image quality
        – No Failure-To-Enroll
        – Able to handle critical fingers

 • Unparallel image stability
        – Non-intrusive capturing process
        – Almost not affected by finger condition

 • Larger capture area
        – Full-3D is able to provide almost nail-to-nail images
        – Approx-3D captures significantly bigger area than touch sensors
        – More indications available than just fingerprint

 • Build-in user guidance
        – Self-learning experience
        – Avoids sensor misuse

 • Mature Life Finger Detection

      Consequence:
      Better matching performance  Higher Process Security

18.02.2012               Touchless 3D Fingerprinting – Technology & Security Aspects   Page 11
Technology Comparison



 • Accuracy




 • Compatibility




18.02.2012         Touchless 3D Fingerprinting – Technology & Security Aspects   Page 12
Part 3: From Sensor to System Provider




              From Sensor to System




18.02.2012         Touchless 3D Fingerprinting – Technology & Security Aspects   Page 13
Markets and Applications


 • Access Control and Time & Attendance
        –    Early adopter of new technologies
        –    Small to medium sized applications
        –    Targets mainly on single factor identification
        –    Networked environment
            Biometric (sub)system required, rather than sensors
            Focus on Process Security


 • Civil, Governmental and Criminal ID
        –    Long term business
        –    Large sized applications
        –    Targets mainly on AFIS infrastructures
        –    PC based environment
            High-Quality biometric sensors required
            Focus on Data Security




18.02.2012                 Touchless 3D Fingerprinting – Technology & Security Aspects   Page 14
Sensors  Terminals  Solutions!


      Heterogenic markets require heterogenic solutions:

 • Full-3D sensor to create perfect 3D and rolled fingerprint



                    +                            =
     3D-Enroll LP       Demo SW / SDK                        Rolled Equivalent        3D (VRML)

 • Approx-3D based terminals plus web software to form a complete
   biometric subsystem with well defined interfaces



                    +                       +                                         =     Turnkey
                                                                                            Solution


       3D-Enroll         3D-Terminal                      Web Software


18.02.2012              Touchless 3D Fingerprinting – Technology & Security Aspects               Page 15
The New Product Line 2012


      Sensors & Solutions with 3D and 2D technology ...




18.02.2012           Touchless 3D Fingerprinting – Technology & Security Aspects   Page 16
The New Product Line 2012


 ... Consequently focusing on Data Security:

 • Template encryption                           • Channel encryption
 • Database encryption




 ... And Process Security:
 •    Superior image quality and stability
 •    Mature Life Finger Detection
 •    Better handling of critical fingers
 •    Etc.


18.02.2012            Touchless 3D Fingerprinting – Technology & Security Aspects   Page 17
Thank you!
             torsten.meister@tbs-biometrics.com
                   www.tbs-biometrics.com




18.02.2012       Touchless 3D Fingerprinting – Technology & Security Aspects   Page 18

More Related Content

PPTX
Iris recognition
PPTX
A Dynamic hand gesture recognition for human computer interaction
PPTX
Finger reader
PPTX
Iris scanner technology
PDF
Garbage Monitoring System using Arduino
PDF
Face recognition attendance system using Local Binary Pattern (LBP)
DOCX
Finger reader thesis and seminar report
PPTX
Slide-show on Biometrics
Iris recognition
A Dynamic hand gesture recognition for human computer interaction
Finger reader
Iris scanner technology
Garbage Monitoring System using Arduino
Face recognition attendance system using Local Binary Pattern (LBP)
Finger reader thesis and seminar report
Slide-show on Biometrics

What's hot (20)

DOC
I.t in space
DOCX
Image Recognition Expert System based on deep learning
PPTX
Clockless Chips - an Introduction
PPTX
A Framework For Dynamic Hand Gesture Recognition Using Key Frames Extraction
PDF
Comp4010 Lecture5 Interaction and Prototyping
PPTX
Virtual keyboard seminar ppt
DOCX
Abstract Smart Card Technology
PPTX
Atm with an eye
PPTX
Palm vein technology ppt
PPTX
Gesture Technology
PPTX
Biometric Authentication PPT
PPT
Sensor technology
PPT
An atm with an eye
PDF
COMP 4010: Lecture 5 - Interaction Design for Virtual Reality
PPTX
ATM with an EYE
PPTX
Mind-reading computer seminar ppt
PPT
50409621003 fingerprint recognition system-ppt
PPTX
Hand gesture recognition
PPTX
Artificial Neural Network for hand Gesture recognition
PPT
Bio atm with-microsoft_finger_print_sdk
I.t in space
Image Recognition Expert System based on deep learning
Clockless Chips - an Introduction
A Framework For Dynamic Hand Gesture Recognition Using Key Frames Extraction
Comp4010 Lecture5 Interaction and Prototyping
Virtual keyboard seminar ppt
Abstract Smart Card Technology
Atm with an eye
Palm vein technology ppt
Gesture Technology
Biometric Authentication PPT
Sensor technology
An atm with an eye
COMP 4010: Lecture 5 - Interaction Design for Virtual Reality
ATM with an EYE
Mind-reading computer seminar ppt
50409621003 fingerprint recognition system-ppt
Hand gesture recognition
Artificial Neural Network for hand Gesture recognition
Bio atm with-microsoft_finger_print_sdk
Ad

Viewers also liked (20)

PPT
Touch less-fingerprint-recognition-system (1)
PPTX
Touchless fingerprint
PPT
Fingerprint Recognition Technique(PPT)
PPTX
Fingerprint presentation
PDF
Touchless and less-constrained 3D fingerprint recognition
PDF
Leveraging Fingerprint Verification on Mobile Devices
PPTX
Fingerprint verification using matlab
PPTX
Fingerprint recognition system by sagar chand gupta
PPTX
Fingerprint Recognition System
PPTX
Paper multi-modal biometric system using fingerprint , face and speech
PPTX
Pretty good privacy
PPTX
Transport Layer Security
PPTX
Touchless Technology
PPTX
Pgp pretty good privacy
PPT
Fingerprint recognition
PPT
fingerprint technology
PPTX
Touchless Touchscreen
PPTX
Fingerprint
PPTX
Touch Screen Technology PRESENTATION
PPTX
Touchless technology Seminar Presentation
Touch less-fingerprint-recognition-system (1)
Touchless fingerprint
Fingerprint Recognition Technique(PPT)
Fingerprint presentation
Touchless and less-constrained 3D fingerprint recognition
Leveraging Fingerprint Verification on Mobile Devices
Fingerprint verification using matlab
Fingerprint recognition system by sagar chand gupta
Fingerprint Recognition System
Paper multi-modal biometric system using fingerprint , face and speech
Pretty good privacy
Transport Layer Security
Touchless Technology
Pgp pretty good privacy
Fingerprint recognition
fingerprint technology
Touchless Touchscreen
Fingerprint
Touch Screen Technology PRESENTATION
Touchless technology Seminar Presentation
Ad

Similar to Touchless Fingerprint Recognition (20)

PDF
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
DOC
Finger print based security system
PPT
M I Dentity 3 G 040111
PDF
sample assignment
PDF
assignment help experts
PPTX
finger print based door lock.pptx
PPTX
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
PDF
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
PDF
SmartCard Forum 2009 - New trends in smart-cards technology
PDF
How to Construct a Smarter Solution Using IoT Software Development-tommorow.pdf
PDF
The Evolution of IoT Software Development: Past, Present, and Future
PPTX
IoTs.pptx
PPTX
Computer science ppt
PDF
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
PDF
Cybersecurity In IoT Challenges And Effective Strategies.pdf
PDF
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
PPTX
3D password.pptx 3D passwordks which are
PDF
Io t security defense in depth charles li v1 20180425c
PDF
How To Evaluate the Strengths and Weaknesses of Security and Privacy in IoT D...
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
Finger print based security system
M I Dentity 3 G 040111
sample assignment
assignment help experts
finger print based door lock.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
SmartCard Forum 2009 - New trends in smart-cards technology
How to Construct a Smarter Solution Using IoT Software Development-tommorow.pdf
The Evolution of IoT Software Development: Past, Present, and Future
IoTs.pptx
Computer science ppt
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
3D password.pptx 3D passwordks which are
Io t security defense in depth charles li v1 20180425c
How To Evaluate the Strengths and Weaknesses of Security and Privacy in IoT D...

More from Security Session (20)

PDF
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
PDF
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
PDF
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
PDF
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
PDF
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
PDF
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
PDF
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
PPTX
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
PDF
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
PDF
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
ODP
Prezentace brno
PDF
OSINT and beyond
PDF
Exploitace – od minulosti po současnost - Jan Kopecký
PDF
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
PDF
Research in Liveness Detection - Martin Drahanský
PPT
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
ODP
Turris - Robert Šefr
PDF
Co se skrývá v datovém provozu? - Pavel Minařík
PPTX
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
PDF
Two Years with botnet Asprox - Michal Ambrož
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Prezentace brno
OSINT and beyond
Exploitace – od minulosti po současnost - Jan Kopecký
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Research in Liveness Detection - Martin Drahanský
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Turris - Robert Šefr
Co se skrývá v datovém provozu? - Pavel Minařík
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
Two Years with botnet Asprox - Michal Ambrož

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Big Data Technologies - Introduction.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
Teaching material agriculture food technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25-Week II
Big Data Technologies - Introduction.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Spectroscopy.pptx food analysis technology
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
SOPHOS-XG Firewall Administrator PPT.pptx
MYSQL Presentation for SQL database connectivity
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Programs and apps: productivity, graphics, security and other tools
Teaching material agriculture food technology
“AI and Expert System Decision Support & Business Intelligence Systems”

Touchless Fingerprint Recognition

  • 1. Touchless 3D – A New Dimension in Fingerprint Technology Technology, System Approach & Security Aspects 2012 Security Session, FIT VUT, Brno Torsten Meister – CTO Touchless Biometric Systems AG, Pfäffikon (SZ), Switzerland 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 1
  • 2. Overview • Introduction – Biometrics Today – Expectations and Reality – Fingerprint – What Else? – Processes & Parameters – Security Aspects • TBS Technology – Touchless Technology Basics – Advantages of Touchless 3D Technology – Technology Comparison • From Sensor to System – Markets & Applications – Sensors  Terminals  Solutions! – The New Device Line 2012 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 2
  • 3. Part 1: Introduction Introduction to Biometrics 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 3
  • 4. Expectations & Reality Biometrics is key to solve security challenges of the 21th century  Reality or Fiction? • PRO: – Makes secure identification possible, eliminates weak identification – Unique, constant and always available – Flexible, can be adapted to situation and user group – Can be combined with other systems to increase security – Convenient and User friendly • CONTRA: – Some technologies not mature yet – Market consolidation has just started – Not deterministic, identification based on probabilities  Biometrics is just one aspect of a sophisticated security concept! 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 4
  • 5. Fingerprint – What Else? • Fingerprint – most adoped technology – Fingerprint is unique, constant and can be captured fast & easily – mature algorithms & broad range of sensors available • Face Recognition – Emerging technology, driven by security requirements in public areas ('Detecting the face in the crowd') – Limited accuracy und feature uniqeness – Medium to high price segment • Iris Recognition – Highest accuracy, but not user friendly and with acceptance problems – High price segment • Others – Hand/Finger Vein, Hand geometry etc.  Limited accuracy and acceptance  Fingerprint still takes more than 50% of market share! 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 5
  • 6. Biometric Processes • Enrollment (User registration) – User data registration and capturing of biometric reference data ('Reference Template') – crucial importance for overall system performance • Matching (User identification or verification) – Comparison of live captured sample with reference data – Verification (1:1) • requires second token to preselect user list • comparison against preselected biometric data only • lower requirements regarding system accuracy and speed – Identification (1:N) • no preselection • comparison against reference data of all users • high requirements regarding system accuracy and speed 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 6
  • 7. Biometric Parameters • Biometrics is based on probability of user recognition (not deterministic) • Performance defined by system accuracy (sensor, algorithm) and speed (interface, platform, software) • Accuracy can be measured using statistical parameters: – False Rejects  FRR – False Accepts  FAR – Equal Error Rate defines final parameter for comparison • Speed can be measured directly: – Enrollment process time – Verification process time – Identification process time 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 7
  • 8. Security Aspects A system is as secure as its weakest part! – Biometrics is part of a total security solution – Must not limit system security Risk factors: • Data Security – Secure data storage – Secure data transfer – Can biometric data be interpreted and repeated? – Can biometric data be revoked? • Process Security – Is biometric process stable? – Is biometric process safe against spoofing? 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 8
  • 9. Part 2: TBS Technology TBS Technology 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 9
  • 10. Touchless Technology Basics • founded in 2003, focusing on development of a new and unique fingerprint sensor • Worldwide unique technology • 3 cameras surrounding the finger  TBS Surround Imager • Finger imaging instead of finger printing • Complex illumination process • Full-3D and Approx-3D variants, depending on application • Full-3D to create rolled equivalent fingerprints • Compliant to 2D technology (touch-based) • Approx-3D to extend and optimize center image 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 10
  • 11. Advantages of Touchless 3D Technology • Superior image quality – No Failure-To-Enroll – Able to handle critical fingers • Unparallel image stability – Non-intrusive capturing process – Almost not affected by finger condition • Larger capture area – Full-3D is able to provide almost nail-to-nail images – Approx-3D captures significantly bigger area than touch sensors – More indications available than just fingerprint • Build-in user guidance – Self-learning experience – Avoids sensor misuse • Mature Life Finger Detection Consequence: Better matching performance  Higher Process Security 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 11
  • 12. Technology Comparison • Accuracy • Compatibility 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 12
  • 13. Part 3: From Sensor to System Provider From Sensor to System 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 13
  • 14. Markets and Applications • Access Control and Time & Attendance – Early adopter of new technologies – Small to medium sized applications – Targets mainly on single factor identification – Networked environment  Biometric (sub)system required, rather than sensors  Focus on Process Security • Civil, Governmental and Criminal ID – Long term business – Large sized applications – Targets mainly on AFIS infrastructures – PC based environment  High-Quality biometric sensors required  Focus on Data Security 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 14
  • 15. Sensors  Terminals  Solutions! Heterogenic markets require heterogenic solutions: • Full-3D sensor to create perfect 3D and rolled fingerprint + = 3D-Enroll LP Demo SW / SDK Rolled Equivalent 3D (VRML) • Approx-3D based terminals plus web software to form a complete biometric subsystem with well defined interfaces + + = Turnkey Solution 3D-Enroll 3D-Terminal Web Software 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 15
  • 16. The New Product Line 2012 Sensors & Solutions with 3D and 2D technology ... 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 16
  • 17. The New Product Line 2012 ... Consequently focusing on Data Security: • Template encryption • Channel encryption • Database encryption ... And Process Security: • Superior image quality and stability • Mature Life Finger Detection • Better handling of critical fingers • Etc. 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 17
  • 18. Thank you! torsten.meister@tbs-biometrics.com www.tbs-biometrics.com 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 18