SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
AutDSig
      ®
We live in the era of instant communication based on the
mobility. Consequently, more exposed.
In the Cyberspace the human being is represented through
its Digital Identity ...
THE DIGITAL IDENTITY




Covers a set of updated information,
organized and encoded (encrypted) by
electronic means concerning individuals
and corporations.
.. But ... it is still possible fraud. DIGITAL CRIME




                            1. Breaking the encryption key

                                      2. Password Theft
LAW AND TECHNOLOGY


Basically regards the survey, analysis and resolution of
legal issues raised by the application of Computer
Tchnology

• Computerization of legal acts, signature, proof,
payments, eletronic contracts;
Lagged level of security of
                           Digital Certificate




How to troubleshoot?
Presumption that the person signed. Relative or Absolute?


  In Brazil, the law MP 2200-2 states that any digital document is
  legally valid if certified by ICP-Brazil, Brazilian official's public key.

  The whole structure of the Legal Personality in this set
  passwords and encryption keys. There are no unique traits of
  the author. Thus, ICP-Brazil determining the presumption is
  relative, while the AutDsig the presumption is absolute.

                    No one can go through you
Biometrics: personality traits


"Single measurable characteristic or a trait of human
beings that automatically recognizes and verifies your
                      identity."
Three steps of biometric security

               High: something
                only YOU and
                 your DOING

           Average: something that you
                     KNOW
               Ex: password to access computer




           Low: something that you HAVE
                    Ex: ID card with photo
Development of biometric systems


 It takes physical and behavioral characteristics for recognition,
 namely:

Uniqueness: as unique as possible
Universality: there are many people as possible in
Measurability: can be measured with technical instruments simple
User friendly: they are easy and comfortable be
             measured
Signature: convergence between law and technology

   Provides the undeniable proof that a message came
   from the sender. It can be seen through the following
                         properties:
1. Authenticity
2. Integrity
3. Non-repudiation (Irreversible)
Biometric signature:
             Dynamic Signature Verification (DSV)

Some features can be extracted and measured by DSV:


                 1. The form
                 2. The time it takes to sign
                 3. The angle at which the pen is held
                 4. Speed ​and acceleration signature
                 5. The pressure is safe when the pen
                 6. The number of times that the pen is
                    raised paper
Basic process of the DSV



1. Capture: the data is captured through the signing of a
pen or sensitive surface, or both
Basic process of the DSV


2. Extraction: the unique characteristics of the signature is
extracted, encoded by a biometric device and stored as a
template
Basic process of the DSV


3. Comparison: biometry signature are
   verified.
Advantages of DSV:




1. Signature of the most accepted ways to identity validation.

2. Inability to transfer responsibility
AutDSig® as a solution


It is important to understand that there are products on the market
that use a digital signature or digital certificate, or both. In either case
the security is provided by a digital password.
We are different.
We offer the product that combines unique characteristics of the
individual to Certificates Public or Private, ensuring their safety in a
unique way. With asymmetric key itself, our software is ready to use
any biometric product on the market, adapting to the needs of each
client.


                                                   AutDSig®
AutDSig® as a solution


What we value:


1. Flexibility: we tailor the use of several biometrics;

2. Scalability: one or more people, everyone can use;

3. Operating platform independence: we are everywhere;
                              (Windows, Linux, Unix and MacOS)

4. Regardless of any graphical interface : always the best usability



                                                 AutDSig®
Contact
      Luiz Augusto Moráes
       luizm@autdsig.com

         55-081-9899.1817
         55-071-9172.7205

        www.autdsig.com

* Product registration with the INPI -
Institute of Intellectual and industrial
                Property


                                 AutDSig®

Más contenido relacionado

La actualidad más candente

Digital signature
Digital signatureDigital signature
Digital signaturePraseela R
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteitStichting ePortfolio Support
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesApurv Gourav
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12lfilliat
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarVeridium
 

La actualidad más candente (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product Update
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Esign or Electronic Signature
Esign or Electronic SignatureEsign or Electronic Signature
Esign or Electronic Signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 

Destacado

Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Phan Minh
 
PORTABLE CAMERA-BASED ASSISTIVE TEXT AND PRODUCT LABEL READING FROM HAND- H...
PORTABLE CAMERA-BASED  ASSISTIVE TEXT AND PRODUCT  LABEL READING FROM HAND- H...PORTABLE CAMERA-BASED  ASSISTIVE TEXT AND PRODUCT  LABEL READING FROM HAND- H...
PORTABLE CAMERA-BASED ASSISTIVE TEXT AND PRODUCT LABEL READING FROM HAND- H...Sathmica K
 
Optical Character Recognition( OCR )
Optical Character Recognition( OCR )Optical Character Recognition( OCR )
Optical Character Recognition( OCR )Karan Panjwani
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
DAMA Webinar - Big and Little Data Quality
DAMA Webinar - Big and Little Data QualityDAMA Webinar - Big and Little Data Quality
DAMA Webinar - Big and Little Data QualityDATAVERSITY
 

Destacado (7)

WonderNet
WonderNetWonderNet
WonderNet
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
 
PORTABLE CAMERA-BASED ASSISTIVE TEXT AND PRODUCT LABEL READING FROM HAND- H...
PORTABLE CAMERA-BASED  ASSISTIVE TEXT AND PRODUCT  LABEL READING FROM HAND- H...PORTABLE CAMERA-BASED  ASSISTIVE TEXT AND PRODUCT  LABEL READING FROM HAND- H...
PORTABLE CAMERA-BASED ASSISTIVE TEXT AND PRODUCT LABEL READING FROM HAND- H...
 
Optical Character Recognition( OCR )
Optical Character Recognition( OCR )Optical Character Recognition( OCR )
Optical Character Recognition( OCR )
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Enhanced privacy ID
Enhanced privacy IDEnhanced privacy ID
Enhanced privacy ID
 
DAMA Webinar - Big and Little Data Quality
DAMA Webinar - Big and Little Data QualityDAMA Webinar - Big and Little Data Quality
DAMA Webinar - Big and Little Data Quality
 

Similar a Digital identity security and biometrics

Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : IntroductionSemlex Europe
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationLarry Kluger
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
ISACA - The False Sense of Security
ISACA - The False Sense of SecurityISACA - The False Sense of Security
ISACA - The False Sense of SecurityFabian Borg
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 

Similar a Digital identity security and biometrics (20)

Loqr
LoqrLoqr
Loqr
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : Introduction
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital Transformation
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
120 i143
120 i143120 i143
120 i143
 
ISACA - The False Sense of Security
ISACA - The False Sense of SecurityISACA - The False Sense of Security
ISACA - The False Sense of Security
 
Ppt
PptPpt
Ppt
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Digital identity security and biometrics

  • 1. AutDSig ®
  • 2. We live in the era of instant communication based on the mobility. Consequently, more exposed.
  • 3. In the Cyberspace the human being is represented through its Digital Identity ...
  • 4. THE DIGITAL IDENTITY Covers a set of updated information, organized and encoded (encrypted) by electronic means concerning individuals and corporations.
  • 5. .. But ... it is still possible fraud. DIGITAL CRIME 1. Breaking the encryption key 2. Password Theft
  • 6. LAW AND TECHNOLOGY Basically regards the survey, analysis and resolution of legal issues raised by the application of Computer Tchnology • Computerization of legal acts, signature, proof, payments, eletronic contracts;
  • 7. Lagged level of security of Digital Certificate How to troubleshoot?
  • 8. Presumption that the person signed. Relative or Absolute? In Brazil, the law MP 2200-2 states that any digital document is legally valid if certified by ICP-Brazil, Brazilian official's public key. The whole structure of the Legal Personality in this set passwords and encryption keys. There are no unique traits of the author. Thus, ICP-Brazil determining the presumption is relative, while the AutDsig the presumption is absolute. No one can go through you
  • 9. Biometrics: personality traits "Single measurable characteristic or a trait of human beings that automatically recognizes and verifies your identity."
  • 10. Three steps of biometric security High: something only YOU and your DOING Average: something that you KNOW Ex: password to access computer Low: something that you HAVE Ex: ID card with photo
  • 11. Development of biometric systems It takes physical and behavioral characteristics for recognition, namely: Uniqueness: as unique as possible Universality: there are many people as possible in Measurability: can be measured with technical instruments simple User friendly: they are easy and comfortable be measured
  • 12. Signature: convergence between law and technology Provides the undeniable proof that a message came from the sender. It can be seen through the following properties: 1. Authenticity 2. Integrity 3. Non-repudiation (Irreversible)
  • 13. Biometric signature: Dynamic Signature Verification (DSV) Some features can be extracted and measured by DSV: 1. The form 2. The time it takes to sign 3. The angle at which the pen is held 4. Speed ​and acceleration signature 5. The pressure is safe when the pen 6. The number of times that the pen is raised paper
  • 14. Basic process of the DSV 1. Capture: the data is captured through the signing of a pen or sensitive surface, or both
  • 15. Basic process of the DSV 2. Extraction: the unique characteristics of the signature is extracted, encoded by a biometric device and stored as a template
  • 16. Basic process of the DSV 3. Comparison: biometry signature are verified.
  • 17. Advantages of DSV: 1. Signature of the most accepted ways to identity validation. 2. Inability to transfer responsibility
  • 18. AutDSig® as a solution It is important to understand that there are products on the market that use a digital signature or digital certificate, or both. In either case the security is provided by a digital password. We are different. We offer the product that combines unique characteristics of the individual to Certificates Public or Private, ensuring their safety in a unique way. With asymmetric key itself, our software is ready to use any biometric product on the market, adapting to the needs of each client. AutDSig®
  • 19. AutDSig® as a solution What we value: 1. Flexibility: we tailor the use of several biometrics; 2. Scalability: one or more people, everyone can use; 3. Operating platform independence: we are everywhere; (Windows, Linux, Unix and MacOS) 4. Regardless of any graphical interface : always the best usability AutDSig®
  • 20. Contact Luiz Augusto Moráes luizm@autdsig.com 55-081-9899.1817 55-071-9172.7205 www.autdsig.com * Product registration with the INPI - Institute of Intellectual and industrial Property AutDSig®