Authentication with a personal touch

 

Connecting state and local government leaders

Fingerprint scanners are accurate biometric identification tools'but they're not foolproof.

Young singles aren't the only people looking for a perfect match. Government IT managers, border guards, payroll clerks and homeland security officers are just as concerned with matching employees, visitors and others against personally identifiable information to authenticate them for building access, network privileges or entry into the United States.Today's strong authentication often requires people to present something they know (such as a password), something they have (such as a smart card or token) and/or something they are (a biometric identifier). In many cases, the something you are that's unique to you is a fingerprint.To improve identification procedures, Congress included biometric passport provisions in the Patriot Act as well as in the Enhanced Border Security and Visa Entry Reform Act of 2002. Last year, the federal government awarded Accenture Ltd. a $10 billion contract to provide program management services for the Homeland Security Department's U.S. Visit program, including the collecting of biometric data as part of visa applications.The U.S. is not alone in its move toward employing biometrics. In 2003, for example, the International Civil Aviation Organization adopted its own blueprint for integrating biometric information into passports and other machine-readable travel documents such as visas and identity cards. The ICAO blueprint calls for all 188 member countries, including the U.S., to implement a common face recognition system with the data stored on an integrated circuit, and members have the option of adding up to two other biometric forms of personal identification.Although ICAO calls for using facial recognition systems, the most common form of biometrics is still fingerprint identification.Fingerprint readers are the most mature and commonly used biometric technology. According to the International Biometric Group, a New York consultant, the worldwide market for biometric technology hit $1.2 billion in 2004, a 67 percent increase over the previous year. IBG predicts that spending will continue growing rapidly, quadrupling to $4.6 billion by 2008. If those rosy predictions sound overly optimistic, Deutsche Bank sees similar growth ahead'$5 billion in spending by 2010.Of these expenditures, fingerprint technology represents the biggest slice by far, accounting for 48 percent of the biometrics market, according to IBG. The next most popular biometric, facial recognition, commands just 12 percent of spending.Fingerprints have been used in criminal investigations for over a century and are widely recognized as an accurate method of identification. People develop their fingerprints in the womb and retain them long after death. There is an estimated one-in-ten-billion chance of two people having identical prints and, to date, no such matches have been found. Even identical twins don't have identical prints.As an authentication technology, fingerprint readers offer advantages of size and price. Standalone desktop devices for securing workstations are available starting at around $50. And because the scanners that detect fingerprints have evolved into very compact designs, vendors have begun building them into workstation keyboards and laptops.Many fingerprint readers capture data optically, using a light source to illuminate the finger and a charged couple device'the same light sensor system in digital cameras'to capture the image. Optical scanners are the most mature technology and, until recently, were the most widely deployed.Most newer fingerprint readers use silicon chips to acquire images. Silicon chips have become popular over the last several years because they are significantly smaller and can easily be incorporated into laptops, keyboards, USB key drives and other peripherals. In silicon-based scanners, a microchip measures the fingerprint to discover ridge patterns.Whatever type of scanning technology used, data is generally converted into a digital hash for storage and comparison. The overall system requires biometric software for matching the scanner fingerprint against a database.Of course, no security system is foolproof, and fingerprint readers are no exception. For example, according to the British Broadcasting Corp., last April a Malaysian businessman with a fingerprint identification system installed in his Mercedes found it wasn't enough to keep it from being stolen. Thieves cut off his fingertip so they could use it to start the car. Several years ago, Japanese cryptographer Tsutomu Matsumoto took a more civilized approach. He took some latent fingerprints left on glass, darkened them using fumes from superglue, took a digital photo, enhanced it with Adobe Photoshop, printed the image on a transparent sheet and etched it onto a photo-sensitive printed circuit board. He then poured gelatin onto the image etched on the PCB to create a fake finger. He tested the gelatin print on 11 different fingerprint readers. It fooled every one.The government is well aware of biometric spoofing and is sponsoring research into defeating it. The Air Force Research Laboratory Information Directorate has awarded Small Business Innovation Research awards to companies looking into new ways of guarding against fingerprint spoofing [GCN, Aug. 15, Page 15].To get around both types of problems, vendors have started including features in their high-end products that detect, for instance, whether the finger touching the sensor is alive. There are several techniques for fool-proofing fingerprint identification, none of them perfect. But look for them when you're setting up a biometric security system. If the temperature of the finger is not within the normal range of a human hand, it will not authenticate. There are two drawbacks to this technology. If a person's hand is cold, it will be out of range, and if a thin silicon fake fingerprint is placed over a real finger, it may be within range., including absorption, reflection and the scattering of different light frequencies. It's not perfect, because artificial gelatin fingerprints have optical characteristics similar to skin.Pulse and blood pressure detection. It's very high-tech but could be fooled by an actual finger hidden behind a fake fingerprint. This technique measures whether the resistance is in the normal range of skin. Unfortunately, skin resistance varies widely depending on moisture, and devices can be fooled by saliva on a fake fingerprint.Last year, Marie Sandstr'm, a student at Linkoping University in Sweden, tested nine fingerprint readers at Germany's CeBIT trade fair to see how well they did at discerning between live and fake fingers. She published her results in a thesis titled 'Liveness Detection in Fingerprint Recognition Systems,' which is available on the university's Web site [to read it, go to www.gcn.com and enter 478 in the GCN.com/box]. How well did they do?'All tested fingerprint readers were defeated with artificial fingerprints,' she wrote. 'Some systems were easier to fool than others, and some artificial fingerprints were more successful than others. Interesting to note is that a capacitive, an electric-field and a thermal sweeping sensor were all circumvented with artificial fingerprints.'Capacitive technology is used in many silicon chip-based sensors, including most of the models listed in this guide. Sandstr'm did note that more sophisticated liveness detection systems can do a better job at sorting the real from the fake. But that must be weighed against the cost.'Even though it is possible to circumvent a fingerprint scanner with help of an artificial fingerprint, the question can be asked how often this will happen and what the consequences will be,' she wrote.The major factor to consider when deploying fingerprint biometrics is how accurate the systems are at correctly matching fingerprints against stored images. The National Institute of Standards and Technology last year published the results of tests it conducted on 34 systems from 18 vendors. The tests were done on a set of 393,370 fingerprint images from 25,309 individuals. The most accurate system came from NEC Corp. When looking at a single print, it had a true acceptance rate of 99.4 percent and a false acceptance rate of 0.01 percent. When looking at a set of four fingerprints, its accuracy improved to a 99.9 percent true acceptance rate.Systems from Cogent Systems Inc. and Sagem Morpho Inc. were close behind. The worst systems came out at or near zero on some of the tests.Eric Ouellet, a vice president in Gartner Inc.'s security research group, says all biometrics, including fingerprint readers, are still in the early stages and should be adopted with caution. While they do offer some extra security, it is not worthwhile for most applications.'Unless you really need to have a high level of security, generally speaking, biometrics are probably not cost-effective for what most organizations are looking for,' he said.It is not just a matter of the readers themselves, but the back-end security structure to support them. If fingerprint readers are used, they supplement other measures rather than replace them.'A strong authentication system is what you want to focus on and biometrics can be part of it, but not the be-all and end-all,' Ouellet said. 'The user should still have to memorize something or have something like a token, and you still need to make sure the security policies and all the management infrastructure relating to that are in place.'In many cases, fingerprint readers can be a secure convenience'an easy way of logging onto a PC in the morning or authenticating at Web sites, for example. The fingerprint readers in this guide largely fall into that category. Large-scale, mission-critical deployments, such as physical access security applications, will want to look for high-end specialty scanners embedded in more advanced security systems.

The lowdown on fingerprint scanners


What is it? Hardware and software for verifying someone's identity based on their fingerprints.


Where is it needed? High-security installations to prevent unauthorized entrance or IT systems to prevent unauthorized access. It is also popular as part of time and attendance systems to keep employees from clocking in for someone who is not there yet.


What are its benefits? It provides an additional way for verifying someone's identity that doesn't require them to memorize anything.


What are its limitations? Fingerprints can be spoofed. Systems can also erroneously lock out valid users for a variety of reasons, such as a cut on a finger.


Must-know information? The fingerprint reader is only one part of the security system. Make sure it will work with the directory services, authentication systems and other security tools already in place.

ACCESS ON THE GO: Fingerprint scanners have evolved into very compact designs.










Chances are













Going to extremes





Foolproofing the system



Temperature detection.

Detection of optical properties


Electrical resistance detection.









The accuracy factor















Drew Robb of Glendale, Calif., writes about IT.



Fingerprint scanners




















CompanyProductTypeConnectionScannerTechnologyNotesPrice
American Power Conversion Corp
West Kingston, R.I.
(800)788-541
www.apcc.com
Personal Biometric USB PODStandalone readerUSBSilicon chipEnrolls up to 20 users; software supports file and folder encryption; works with Windows 98 and higher$50
Cherry Corp.
Pleasant Prairie, Wisc.
(262) 942-650

www.cherrycorp.com
FingerTIP ID Mouse M-4000 / FingerTIP ID Board G83
Mouse / Keyboard
USB / USBSilicon chip / Silicon chipCan be adjusted for one-to-one or one-to-many matching; comes with enrollment software / Also comes with a built-in smart-card reader and USB hub
$142 / $221
Cogent Systems Inc.
South Pasadena, Calif.
(626) 799-8090
www.cogentsystems.com
Search-GateAccess control terminal
Ethernet, RS-232, RS-485, WiegandSilicon chipStores 1,200 fingerprints for one-to-many identification; company also makes software solutions for government to handle and accelerate biometric matching
Contact Vendor
DigitalPersona Inc.
Redwood City, Calif.
(650) 474-4000
www.digitalpersona.com
DigitalPersona Pro 3.2
for Active Directory
Standalone readerUSBOptical
Includes U.are.U reader; one-touch log-on to Active Directory networks; can reject fake fingers$149
Fellowes Inc.
Itasca, Ill.
(800) 955-095
www.fellowes.com
Secure Touch MouseMouse
USBSilicon chipOptical mouse with fingerprint reader; re-sold by other vendors such as Saflink Corp.$90
Identix Inc.
Minnetonka, Minn.
(952) 932-0888
www.identix.com
BioTouch 200 USB / BioTouch PC CardStandalone reader / PC Card readerUSB / PC Card slot
Optical / OpticalCaptures minutiae point template instead of whole image so data can't be stolen and used; requires Windows 2000 or higher / Requires Type II PC Card slot; supports multiple fingers per user; requires Windows 2000 or higher$124 / $150
Index Security Inc.
Deal, N.J.
(866) 463-3989
www.index-security.com
BioStik / IzzyPortable flash drive / Standalone readerUSB / USBSilicon chip / Optical128 MB storage; requires USB cable but no drivers;
can enroll up to six fingerprints / Software comes with 256-bit AES encryption for protecting files
$140 / $110
Kanguru Solutions
Millis, Mass.
(508) 376-4245
www.kanguru.com
Bio DrivePortable flash drive
USBSilicon chip256MB to 1GB or storage; enrolls up to five fingers; software application runs on the drives$100-$220
Lenovo Group Ltd.
Purchase, N.Y.
(866) 428-4465
www.lenovo.com/us
ThinkPlus Preferred Pro
USB Fingerprint Keyboard
/ IBM USB Fingerprint Reader
Keyboard / Standalone readerUSB / USBSilicon chip / Silicon chipSwipe-style reader comes with ThinkVantage Client Security Software, which supports password management and file/folder encryption / Travel-size swipe-style reader comes with ThinkVantage Client Security Software
$99 / $69
Microsoft Corp.
Redmond, Wash.
(800) 642-7676
www.microsoft.com
Fingerprint Reader / Wireless Intellimouse Explorer with Fingerprint Reader / Optical Desktop with Fingerprint ReaderStandalone reader / Mouse / KeyboardUSB / USB or
wireless / USB
Optical / Optical / OpticalMade by DigitalPersona and comes with DigitalPersona software; requires Windows XP / Optical mouse with built-in reader works with Internet Explorer and requires Windows XP; comes with
DigitalPersona software / Users DigitalPersona scanner, comes with wireless mouse; integrates nicely with Internet Explorer for authenticating at Web sites; requires Windows XP
$40 / $60 / $85
Sagem Morpho Inc.
Tacoma, Wash.
(800) 346-2674
www.morpho.com
MorphoAccessAccess control terminal
Ethernet, RS-422, WiegandOpticalIntegrated smart-card reader; models for one-to-one or one-to-many identification; MA221 model includes fake-finger detectionContact vendor
Sony Corp. of America
New York
(800) 222-7669
www.sony.com/puppy
Puppy Fingerprint Identity Token FIU-810 / Puppy Fingerprint Identity Device FIU-600USB token / Standalone reader
USB / USBSilicon chip / Silicon chipComes with only 64MB of storage, so best used as a token; supports multiple fingers, encryption and digital certificates / Puppy software development kit (available separately) enables enterprise integration; standalone reader works with Windows or Macintosh $170 / $83


X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.