Biometric identification in the banking sphere. Time management and access control

Size: px
Start display at page:

Download "Biometric identification in the banking sphere. Time management and access control"

Transcription

1 Biometric identification in the banking sphere

2 Contents 1. Application areas of biometrics in the banking sphere 2. Advantages of biometrics against conventional identification methods 3. Biometrics for access control 4. Biometrics for time management 5. Biometrics for information security 6. Biometrics for interacting with the bank clients 7. Reasons to select BioLink

3 Why is identification in banks so important? Vital role of financial institutions in establishing the market economy Substantial diversification of financial services: -Crediting - Payment systems, etc. Dynamic integration of information technologies Appearance of new types of financial institutions (co-op share funds, etc.) Expansion of the customer base (legal entities and individuals) Growing competition in the financial services market Interest of criminals towards activity of financial institutions

4 Application areas for biometrics Protection of corporate information systems used in financial institutions Increase of productivity of servicing legal entities and individuals Secure application of Internet technologies Integration with other security systems (access control,, etc.)

5 Identification services for legal entities While servicing legal entities, biometric identification can be a helpful tool to solve a variety of tasks, such as: 1. Performing biometric identification of organization representatives visiting the bank 2. Creating a protected Internet account 3. Confirming sensitive banking transactions 4. Many other

6 Identification services for individuals Identification of owners of safety deposit boxes Authentication of holders of payment cards Identification of persons using cash dispensers Credit scoring for loan applicants

7 Biometrics: advantages for all Increased security Convenient and intuitive technology Speed of servicing Personalizing contacts with clients Minimizing clients requirement Simplified servicing

8 Why biometrics? Biometrics allows identifying the PERSON, not his/her password, token or card. Being an intuitive and easy to use technology, biometrics is able to provide reliably protected access to the sensitive information and/or objects. Sensitive operations or transactions confirmed by biometric identifiers cannot be repudiated, thus guaranteeing legal actions of users. Unlike conventional authentication means, biometric identifiers cannot be lost, forgotten, shared or counterfeited.

9 Why fingerprint biometrics? A fingerprint is unique, does not change with the time, is different even with twins Mature technology with the over 100-year history Widely accepted and supported A vast range of various applications Cannot be stolen, shared or forgotten Does not need to be remembered Is always at hand Is easily and quickly produced for identification Can be scanned an unlimited number of times All 10 fingers can be scanned and used for identification

10 Tasks resolved by biometrics Physical access control: managing access rights of personnel and clients to various buildings and areas of the bank. Time management: authentic information on the actually worked hours of the employees. Information security: access to personal computers and software programs by the fingerprints, confirmation of sensitive transactions. Interacting with clients: verifying the client s identity and performing banking transactions.

11 Fingerprint template We are preceding your question by saying the following: We do not store fingerprint images. We do store digital fingerprint templates. Restoration of the initial fingerprint image from the template is impossible!

12 Access control Access control starts with the entrance to the office. Your employees coming to the office are only required to apply their fingers to the scanning window of the biometric terminal, and They are already at work!

13 Access control Here is the biometric terminal* with an embedded fingerprint scanner allowing your employees to enter the office while keeping strangers away. Apart from access control issues, the biometric terminal can handle the time management procedures by registering the employees checkin/check-out events. * Available from September 2006

14 Access control But preventing unauthorized access to the office is not the only task. Controlling access is required for entrance to other bank premises, such as tops offices, depositaries, deposit boxes and many others. All these tasks can be easily tackled by BioLink s s access control solution.

15 Access control To change an employee s s access right to enter a particular area or add a new employee, only several seconds are necessary. All biometric terminals are managed by the server, while security people can manage it and grant the required access rights.

16 Time management It is clearly obvious that each top manager is eager to have answers to the following questions: How industrious are the company employees? Do they arrive in office on time? Do they leave office on time? How often do they have smoking breaks?

17 Time management Even with minor calculations, it is clearly seen that insignificant time losses result in considerable financial losses. Here is a simple example. Example: The number of employees in a company is 100 persons. Let s assume that each employee comes to office 3 minutes later and leaves office 7 minutes earlier than the expected time. In this case work time losses make up 10 minutes/day/person. With average salary of about USD, work time losses will make up 0.8 USD/day/person, or 80 USD/day/company. Provided a month comprises 24 work days, the losses constitute USD/month.

18 Time management To have fool-proof answers to the above questions and save a lot of work time, you can make use of the biometric time and attendance system BioLink BioTime

19 Time management BioTime can be used conjointly with the biometric access control system mentioned above. In this case employees entering the office or any other premise protected by BioLink s biometric terminal will be automatically registered in BioLink BioTime. All the parties concerned will be able to view the reports on the employees undertimes, overtimes, late coming and truancies.

20 Time management BioTime has a vast range of user settings allowing you to define how the system will function and what information you ll obtain, such as: The work schedule can be defined either for each employee or for the whole department. The policies of accounting work time violations can also be specified. For instance, coming to office 10 minutes later can be either considered a tardiness or not. Leaving office earlier than the expected time can also be treated in different ways. For example, an unregistered check-out event can result in this work day to be recorded as an absence.

21 Information security Same as you protect your office against strangers, your personal computer should be protected against unauthorized access. Surely, one can do so by selecting a password but the threat to lose sensitive data is strong enough for the following reasons: Easy to guess passwords are used Passwords are written down next to the workplace The same password is used for accessing all the protected applications Passwords are shared with colleagues Users hate passwords and are unwilling to keep them secret!

22 Information security Using passwords not only poses a number of threats. Passwords are inconvenient for users: There are many passwords for various systems Passwords are hard to remember Passwords are easily forgotten Typed passwords often contain errors

23 Information security Here comes BIOMETRICS to solve all these problems. With biometric identification, you do not have to remember millions of passwords. Just place your finger on the biometric scanner, and you ll be offered the following opportunities: VPN access Integration with Active Directory Internet access access Access to workplaces Access to shared resources Monitoring business activities Authorization in applications Logon to the corporate information system

24 Information security Fingerprint biometrics can be used to confirm sensitive banking transactions. For example, the system can be configured so that transactions involving i large amounts will require confirmation of the authorized person identity ity. The confirmation will be done by way of fingerprinting the person claiming his/her identity.

25 Information security To provide information security, BioLink offers to use the biometric scanner BioLink U-Match U Matchbook 3.5 Compact and ergonomic Cost effective and enduring Intended for office use Processes a fingerprint image in less than a second Captures bad fingerprints (dry and damaged fingers, fair, black and yellow skin, etc.)

26 Biometrics can as well be used when working with clients. Working with clients When performing the account transactions, it is required to confirm the client s identity and authority to conduct this operation. The produced documents such as passports cannot guarantee 100% identity verification. In this case, the client can just touch the biometric scanner to have his/her enrolled fingerprint matched and his/her identity verified.

27 Working with clients A fingerprint scanner can also be embedded into ATMs to verify identity of persons dispensing cash. For this application area, BioLink offers a mountable fingerprint scanner BioLink U-Match U BI USB and BioLink U-Match U BI Ethernet.

28 Working with clients Information support for the clients can be provided via a biometric information kiosk BioLink Ostech. In the waiting mode, it displays commercials to the visitors, but once the client touches the embedded biometric scanner, the system identifies the client and displays the appropriate information, such as his/her account balance.

29 About BioLink Founded in 1999 Leader in Fingerprint identification technology Multi-biometrics (finger, face, iris, etc.) Headquarters in Moscow Key branches in USA Western Europe Southeast Asia Africa

30 Activities Development and delivery of: Patented fingerprint identification and verification algorithms (1:N, 1:1) Hardware and software identification servers Branded biometric devices Provision of turnkey comprehensive solutions based on biometric identification Custom development

31 Why BioLink? Thorough understanding of needs and tasks of biometrics in all the key application areas Substantial experience and expertise in deploying large scale biometric projects Patented fingerprint matching technology providing fast and accurate identification

32 Why BioLink? Technologies and solutions implemented in nationwide identification projected Well-established relations with providers of smart cards, readers, chips Provision of technical and marketing support A distributed global partner network Support for multi-biometrics

33 Multi-biometric technologies MULTIMODAL (fusion of biometric instances) FACE algorithm FINGERPRINT algorithm Fusion MULTISAMPLE (fusion of samples) FUSION FACE algorithm MULTIALGORITHM (fusion of algorithms) FINGERPRINT algorithm 1 FINGERPRINT algorithm 2 Fusion

34 Multi-biometric technologies Identifier capture Identifier processing BioLink Image Processor Identifier template

35 Technical issue Multi-biometrics: integration issues Technical integration issues can be handled by way of standardization. In particular, an essential issue for system integrators is the development of the universal application program interface (API). At present, BioLink s s solutions are compliant with the following international standards: BioAPI ISO/IEC fingerprint images ISO/IEC templates, minutiae Methodological issue Integration is a complicated application task. It is required to achieve the required statistic criteria within the limited learning sample At present, BioLink offers: Collection of heuristic combined similarity measures and decision rules

36 Contacts BioLink Solutions PO Box Coral Springs, FL USA