Personal touch

 

Connecting state and local government leaders

Last year, they were cool PC accessories. This year, they are serious security tools.

Last year, they were cool PC accessories. This year, they are serious security tools.Biometric authentication devices that measure finger, face, iris and voice characteristics are getting a fresh look at organizations where controlling access is a priority.Although they work on different parts of the body, all biometric devices function similarly. First, they collect information using a scanner for fingers or hands, a camera for the face or eyes, or a microphone for the voice. The devices work with software that converts the information into a mathematical template, a type of algorithm that is encrypted and usually stored on a host computer's hard drive. Taken together, the information can authenticate individuals' identity.Besides their security benefits, biometric tools are cost-effective. Plenty of devices are priced at around $200, and they're catching on in the computer marketplace. Virtually every new PC and laptop will incorporate one or more biometric devices by 2005, according to the International Biometrics Group, a New York test lab and consulting group. The market for biometric authentication products will grow to about $1.8 billion annually by 2004, according to IDC, a high-tech market research company in Framingham, Mass.Despite some concerns about privacy and how well the devices work in real-world settings, biometric devices are beginning to prove their mettle.Face recognition technology is being used at soccer games in Europe to identify known hooligans before they wreak havoc. Banks are beginning to use fingerprint recognition technology to prevent check fraud and provide quick and easy user identification at point-of-sale terminals and automated teller machines. Iris recognition technology can grant or deny access at mission-critical sites in federal office buildings.As a result of the recent terrorist attacks, airports worldwide will most certainly employ more biometric tools to help identify and intercept possible terrorists before they board.Biometric identification technologies aren't infallible, but they do have some advantages over the traditional passwords, personal identification numbers or smart cards.Hackers can guess passwords, or even find them written down near a PC. Users also aren't diligent about changing their passwords frequently. A personal identification number attached to a credit card or used to open a keyless lock gives no security in the wrong hands. And smart cards can be lost, stolen or left at home.But fingers, hands, eyes, faces and voices all bear unique and individual imprints. They can't be copied like passwords or misplaced like smart cards. That makes a compelling argument for the use of biometric access devices, at least in conjunction with other security measures.Here's a rundown of some of the most popular and affordable biometric technologies to date: Fingerprint readers are among the least expensive and most widely used biometric devices. They are designed around two basic sensor technologies: optical and silicon. Optical readers such as Digital Persona Inc.'s U.are.U Pro can take up to 100 scans of a fingerprint, run them through an algorithm, and store them as a mathematical template for matching a subject's fingerprints against those stored in a database.Optical readers use Universal Serial Bus or parallel-port connections, and can stand alone or be built into other peripherals such as keyboards or mice.Ethentica Inc.'s MS 3000 PC Card and MS 2500 are examples of fingerprint readers with built-in silicon chips that measure a finger's electrical impulses rather than its optical image for user authentication.Used correctly, fingerprint readers are difficult to defeat. But a misplaced finger, a movement, or factors such as perspiration or a finger injury can delay or defeat correct readings. Optical readers typically perform slightly better and are more durable than silicon-chip devices, which tend to be faster and more accurate. Their tiny size suits them for use with cell phones and personal digital assistants. Iris recognition is a highly accurate technology that measures the unique patterns of human irises. Systems such as Iridian Technologies Inc.'s $239 Authenticam with Private ID use video cameras to take pictures of a subject's iris, digitize the images and save them in a database record via bundled software. Iridian also makes high-end, network-based iris recognition software.Although iris recognition is equipment-intensive and requires users to sit still for a few seconds, it is potentially very effective in high-security settings. It's probably overkill, however, in offices where password authentication suffices for ordinary levels of security. Voice authentication ranks high among biometric technologies when you weigh accuracy, convenience and cost, according to IDC. Voice recognition isn't used much for personal PC and network log-on procedures to date, but that could change as more companies bring the technology to market.Veritel Corp.'s Talk Direct software, for instance, converts unique voice imprints into numerical algorithms that verify an individual user's identity. The company is working on software that will provide voice authentication over the Web.The downside to voice authentication is that authorized users could be denied access to facilities or equipment if their voice patterns change due to illness or injury. Cyber-Sign Inc.'s $99 Cyber-Sign for Acrobat Signature 4.0 is one of the few biometric products that authenticate users by analyzing both the shape of the signatures and their signing dynamics'speed, pressure, timing. But critics say that because everyone's signature varies significantly over time, the software could lock out an otherwise authorized user. Because each biometric technology has its flaws, a few companies have built multimodal systems that include one or more biometric technologies along with password or smart-card protection.Net Nanny Software Inc.'s BioPassword 4.5 is network software that measures users' keystroke dynamics in addition to traditional passwords for authentication. Keyware's $4,000 CAS SignOn for Windows 1.0 confirms users' identities by measuring a number of biometric variables, including face, voice or fingerprints, which are used in conjunction with text passwords.BioId America Inc.'s BioID Client/Server 2.11 is multimodal software that measures face, voice and lips using standard PC webcams and microphones. Password protection may or may not be used with the system.XXXSPLITXXX-Face recognition software is likely to become an important tool in the U.S. war on terrorism, as a means of identifying suspects.One such product, Viisage Inc.'s FaceNet, is a software engine that translates the characteristics of a human face into a set of numbers called an eigenface, which provides both identification and verification for real-time comparisons against a database of other faces.Viisage has built a suite of face recognition products to prevent identity fraud, improve security at sporting events and key public installations, and establish user verification for point-of-sale transactions and automated teller machines.It also makes keyless entry products for offices, dormitories and government facilities, such as FacePass. The company's FaceExplorer 3.0 is used by law enforcement agencies to match images and computer composites against large image databases of suspects and known criminals.Visionics Corp.'s FaceIT creates face prints by precisely measuring the distance between prominent features such as the nose and cheekbones.In early August, the Defense Advanced Research Projects Agency awarded the company $2 million to improve its technology for use by military and intelligence agencies. The company plans to design software for use in a movable camera system capable of scanning peoples' faces from as far as 300 feet away and comparing the images to those in databases of known terrorists.

The lowdown

  • What is it? A biometric device is a combination of hardware and software that measures human physical characteristics such as fingerprints, hands, faces, irises, voice patterns and signatures.

  • When do you need one? You need a biometric device to augment or replace traditional security measures for PCs, networks, buildings or entire areas such as airports.

  • When don't you need one? Even an inexpensive biometric device adds unnecessary expense to PCs and systems that don't contain sensitive information.

  • Must know info? Biometric devices are not single, silver-bullet solutions for security problems. Each is best used in combination with other biometric technologies or with traditional security methods such as passwords, personal identification numbers and smart cards.
  • SecuGen Corp.'s EyeD keyboard includes an optical fingerprint reader. It's priced at $129 to $139.

    Precise Biometrics' Precise 100 SC combines a smart-card reader and silicon fingerprint scanner. It's priced at $200.

    Iridian Technologies Inc. offers the Panasonic Authenticam, above, with Private ID software. It's priced at $239.

    The Cyber-Sign signature verification software from Cyber-Sign Inc. measures the shape, pressure and timing of signatures. It's priced at $99.

    Biometric devices take user authentication to new levels











    Already in use















    Fingerprint readers.









    Iris recognition.





    Voice authentication.







    Signature verification.



    Multimodal systems.







    J.B. Miles of Pahoa, Hawaii, writes about communications and computers. E-mail him at jbmiles@gte.net.











    X
    This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
    Accept Cookies
    X
    Cookie Preferences Cookie List

    Do Not Sell My Personal Information

    When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

    Allow All Cookies

    Manage Consent Preferences

    Strictly Necessary Cookies - Always Active

    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

    Sale of Personal Data, Targeting & Social Media Cookies

    Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

    If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

    Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

    Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

    If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

    Save Settings
    Cookie Preferences Cookie List

    Cookie List

    A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

    Strictly Necessary Cookies

    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

    Functional Cookies

    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

    Performance Cookies

    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

    Sale of Personal Data

    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

    Social Media Cookies

    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

    Targeting Cookies

    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.