Subscribe by Email

Your email:

Browse By Date

Biometric Security and Control Blog

Current Articles | RSS Feed RSS Feed

Biometrics--A World Without Passwords

If you had to choose between the use of passwords and personal identification numbers and not using any, which would be your pick?  What if you could have extra security and added convenience by not using any passwords ever again?  Surprisingly, this no-password technology is here and is growing rapidly.  It is called biometrics, and you will travel this road in no time.

Biometrics involves the use of automated methods of recognizing an individual based on his physical or behavioral characteristics.  Some common commercial examples are fingerprint, face, iris, hand geometry, voice and dynamic signature biometric authentication.

Looking back, do you remember the day you decided to switch from dial-up to broadband technology?  Biometrics will have the same effect once adopted by the masses.  
The decision to switch to broadband had two common denominators: speed and convenience.

In the password world, the same analogy applies.  What if you could achieve higher security combined with added convenience and efficiency without ever using passwords?  Is this a good justification for another major revolution?  Perhaps not yet, because many react to implementing security only after experiencing a crisis.

The solution that could simplify password security issues is biometrics. Biometrics provides an additional layer of security, efficiency and convenience for both users and IT administrators alike.  

Here are a few facts you should know about most biometric solutions:

In general, a biometric solution is non-intrusive.  Using biometrics, the fingerprint image is extracted into a binary template, then converted into an encrypted template and either stored onto the hard drive or sent over the network to a matching server.  Reverse engineering to convert this data back into the fingerprint image is virtually impossible.  Recent advances in capture hardware, such as some of the newer fingerprint devices, are producing better images with a smaller mechanism at a lower price compared to just a few years ago while, at the same time some can detect "liveness" of the fingers to help prevent enrollment or authentication by a dead or fake finger.

An additional consideration should be the ability of a system to operate seamlessly in multiple application environments, and across multiple devices from different vendors.  This is known as interoperability.  To be truly interoperable, a biometric solution should be able to operate on many databases, web application servers and many biometric capture devices.  One might say the system should have the equivalent to open source architecture, much the same as Java became an interoperable platform that served as a catalyst to the widespread use of Application Servers.

All Posts