Subscribe by Email

Your email:

Browse By Date

Biometric Security and Control Blog

Current Articles | RSS Feed RSS Feed

The 7 Deadly Sins of “secure” fingerprint authentication systems

  
  
  
 

We have noticed that a majority of corporations experiencing data breach and workplace identity theft share similar weaknesses in their overall privacy fabric. Some are turning to fingerprint biometrics as a means of "tightening-up" access to secured data. However, many fingerprint authentication systems being sold in the commercial market are actually focused on being convenience-based vs. security-based, oftentimes leaving gaping security holes for new avenues of attack. Here we are exposing the "Seven Deadly Sins" of so-called "secure" fingerprint biometric systems and clarification of the desired features needed to assure the security and convenience of the fingerprint solution. Check to see which of the following features are provided in the biometric system you are evaluating or planning on implementing:

  1. Trusted Enrollment - does the biometric system allow for self enrollment? This may seem convenient, but how does the organization know whose fingers were actually enrolled? The solution should require attended enrollment by a trusted operator, who utilizes his own biometric identifier to authorize the enrollment for any given individual. Without this key feature, there can be no absolute trust or confidence as to "whom" the credential belongs to.
  2. Prevention of multiple identities - does the biometric system allow the same finger(s) to be enrolled under different UserID's? If so, any given biometric identifier could be associated with more than one UserID, which can lead to impersonation and potential fraudulent activity. Be sure the solution can prevent more than one enrollment of any given finger and that it provides a means of resolving any such attempts to do so in a way consistent with your corporate policies.
  3. Device Interoperability - does the biometric system allow for true or partial device interoperability? If not, you may be tied to a single hardware vendor, which can be dangerous when pricing and availability and eventual obsolescence become issues. Look for solutions that provide "true" device interoperability; meaning that enrollments can be performed on a device and authentications can be performed on the same or other devices from different manufacturers. This will future-proof your investment and enable a wider range of users to benefit from the technology.
  4. Elimination of Passwords - does the biometric system support a means of eliminating passwords for access to sensitive applications? Many systems simply release stored passwords with the biometric match, which often leaves the application vulnerable to circumvention of the biometric system. In some cases, elimination of the password may not be possible until the application is re-written to natively support the biometric system. In such cases, check to see if a potentially-corrupt administrator has the capability of changing the User's password without the User being aware of it. The User's awareness that his password is no longer working is a first-line of defense to knowing if the password was changed without the user's knowledge or consent. This could equate to impersonation and fraud. Look for solutions that provide an effective defense against such password manipulation.
  5. Exception alternative- does the biometric system provide an alternate means of strong authentication in the event an image capture devices is lost, stolen, out-of-order, or otherwise unavailable? Few providers of biometric solutions have even considered this or stepped to the plate to deal with this scenario. This has often stifled adoption. Look for innovative systems that can leverage the biometric system with alternate credentials in such cases. Some vendors classify this as an "Exception Mode".
  6. Duress handling - does the biometric system provide a means of identifying an authentication request being performed under duress? Because there are multiple fingerprints per user, certain ones can be designated for duress functionality if desired. This may not necessarily be a feature to be widely deployed, but rather for certain individuals who may have access to extremely sensitive data and are concerned about possible duress situations which may force them to access the data against their free will. Look for systems that can support a duress feature and provide limits to its use to certain Users so as to make Users accountable for any false alarms.
  7. Accurate matching - does the biometric system use advanced matching processes to ensure adequate accuracy? If the goal is to eliminate the need to specify a UserID during an authentication, then the system will need to support 1-to-many matching. There are only a few systems that have 1-to-many matching systems that exceed the accuracy of the standard FBI AFIS technology used by law enforcement and civil ID programs. Be sure to validate the vendor's claims against credible, independent 3rd-party reviews.

So, it comes down to this:  Look before you leap, and make sure that the biometric system you decide to use offers positive answers to the seven deadly sins listed above.  Otherwise, you may be deluding yourself into thinking that you have secured your most valuable assets.

Biometrics--A World Without Passwords

  
  
  
If you had to choose between the use of passwords and personal identification numbers and not using any, which would be your pick?  What if you could have extra security and added convenience by not using any passwords ever again?  Surprisingly, this no-password technology is here and is growing rapidly.  It is called biometrics, and you will travel this road in no time.

Biometrics involves the use of automated methods of recognizing an individual based on his physical or behavioral characteristics.  Some common commercial examples are fingerprint, face, iris, hand geometry, voice and dynamic signature biometric authentication.

Looking back, do you remember the day you decided to switch from dial-up to broadband technology?  Biometrics will have the same effect once adopted by the masses.  
The decision to switch to broadband had two common denominators: speed and convenience.

In the password world, the same analogy applies.  What if you could achieve higher security combined with added convenience and efficiency without ever using passwords?  Is this a good justification for another major revolution?  Perhaps not yet, because many react to implementing security only after experiencing a crisis.

The solution that could simplify password security issues is biometrics. Biometrics provides an additional layer of security, efficiency and convenience for both users and IT administrators alike.  

Here are a few facts you should know about most biometric solutions:

In general, a biometric solution is non-intrusive.  Using biometrics, the fingerprint image is extracted into a binary template, then converted into an encrypted template and either stored onto the hard drive or sent over the network to a matching server.  Reverse engineering to convert this data back into the fingerprint image is virtually impossible.  Recent advances in capture hardware, such as some of the newer fingerprint devices, are producing better images with a smaller mechanism at a lower price compared to just a few years ago while, at the same time some can detect "liveness" of the fingers to help prevent enrollment or authentication by a dead or fake finger.

An additional consideration should be the ability of a system to operate seamlessly in multiple application environments, and across multiple devices from different vendors.  This is known as interoperability.  To be truly interoperable, a biometric solution should be able to operate on many databases, web application servers and many biometric capture devices.  One might say the system should have the equivalent to open source architecture, much the same as Java became an interoperable platform that served as a catalyst to the widespread use of Application Servers.

All Posts