8. Biometrics in the Public and Private Sector
•High Level Security and Access Control
•Traditional means are difficult to control
48%
3%
have shared passwords
left password written down
9.
10. Biometrics and Consumer Application
•Eliminate concerns with identity theft
•Nobody is immune
41,496
complaints of Identity Theft
11. Biometrics and Consumer Application
•Ensure personal security, including:
Home
Office
Car
Financial Transactions
Personal effects (laptop, safe, etc.)
12. Biometrics and Consumer Application
•iPhone 5S
•New technology is currently being developed:
•Eye Verify
•Accu-Time
•Bionym
13. Biometrics and Practical Application
•Biometric technology on election day
•Only eligible votes cast a ballot
14. Biometrics and Practical Application
• NEXUS
Program for pre-approved travelers
Iris recognition kiosks
15. Biometrics and Practical Application
• Faster movement through border security
• Cost reduction for Canada Border Services
• Instructions provided to avoid error
20. Sources
Time Systems. (n.d.). Body As Credential. Retrieved October 28, 2013 from: http://www.accutime.com/Body%20As%20Credential
Apple Support. (2013). About Touch ID security. Retrieved on October 23 rd 2013 from http://support.apple.com
Applied Biometrics. (n.d.) Implementing Biometrics. Retrieved on October 20th 2013 from http://www.appliedbiometrics.co.uk
Biometrics. (n.d.). Dictionary.com Unabridged. Retrieved October 26, 2013, from
http://dictionary.reference.com/browse/biometrics
Canada Border Services Agency (n.d.). General NEXUS Questions. Retrieved on October 20 th, 2013 from http://www.cbsaasfc.gc.ca/prog/nexus/faq-eng.html
Canadian Anti-Fraud Centre Annual Statistics Report (2012). Canadian Anti-Fraud Centre. Retrieved from
http://www.antifraudcentre-centreantifraude.ca
Garrett, M. (2013, September 9). Payroll Fraud - A Big Threat and How to Avoid It. Forbes. Retrieved from www.forbes.com
Griaule Biometrics (2008). Understanding Biometrics. Retrieved from http://www.griaulebiometrics.com/enus/book/understanding-biometrics
Iritech Inc. (n.d.) Frequently Asked Questions. Retrieved on October 23rd, 2013 from www.iritech.com.
Melton, M. (2013, September 19). Can’t Afford The Biometrically Enhanced iPhone 5? Try EyeVerify!. Retrieved October 28, 2013,
from: http://www.activistpost.com/2013/09/cant-afford-biometrically-enhanced.html
Moore, G. (2009, March). History of biometrics. Retrieved from http://onin.com/fp/fphistory.html
Rubens, P. (2012, August 17). Biometric Authentication: How It Works. eSecurity Planet. Retrieved from www.esecurityplanet.com
Ruz, C. (2013, July 17). Preventing fraud in African elections. International Science Grid This Week. Retrieved from
http://www.isgtw.org
Stinson, L. (2013, September 11). This Little Wristband Will Replace Your Passwords With Your Heartbeat. Retrieved October 28,
2013 from http://www.wired.com/design/2013/09/this-little-wristband-wants-to-replace-your-passwords-and-keys-with-yourheartbeat/
Van Allen, F. (2013, August 8). Google Reveals the 10 Worst Password Ideas. Time Tech. Retrieved from http://techland.time.com
Wilson, T. (2005, November 11). How Biometrics Works. How Stuff Works. Retrieved from
science.howstuffworks.com/biometrics.htm
Zalman, A. (n.d.). History of Biometrics. About.com. Retrieved from http://terrorism.about.com/od/issuestrends/tp/History-ofBiometrics.htm
Notas del editor
Biometrics is the process of identifying an individual using their unique physical attributes of their body. Using your fingerprints, or your iris, biometric readers can quickly, and easily, verify who you are and what access you should have to secure equipment, locations, and data.
Access control and security are vital parts of businesses around the world, and advances in technology have made biometrics readily available to help organizations manage their security risks. Other methods of identification can be stolen, copied, or otherwise fraudulently obtained. Using biometric authentication provides a more secure way to identify individuals. This report will examine different types of biometric authentication, the advantages and disadvantages of biometric technology, and how biometrics is used in business today.
The origin of biometrics can be traced back to 200 BC. Simple biometrics, like palm and footprint tracings, were used to distinguish different people, usually for crime related incidents. This lead to a 14th century Persian book on using fingerprints to identify people. In the 19th century, Alphonse Bertillon invented anthropometry, a way of using body measurements to identify offenders. This type of biometric was later then called Bertillonage. The largest step in biometrics was taken in the late 19th century when fingerprinting was introduced
Many people, including Bertillon and an Argentinian police official helped established fingerprinting, but the largest contributor was Sir Francis Galton. Galton made a classification system that revolutionized biometrics. He recognized that no two fingerprints were the same and published a book on the classification of fingerprinting. Now we use computers to automate and save fingerprints, and large databases across the world contain information on not only fingerprints but also voices, hands, irises and faces.
All biometric systems will have 3 similar steps and components. When you enroll, the system will record basic information about you, and a sensor will capture an image of the trait that it will use for identification (ex. fingerprint). A computer will then store this information and use software to compare it to the information provided when you try to access the system again.
Biometrics identifiers are classified as either physiological or behavioral. Physiological are related to characteristics of the body, while behavioral relates to patterns of behaviour. Listed are examples of common biometrics used in business today.
NEXUS is program for pre-approved travellers entering Canada or the United States at designated airports. It allows members to easily pass through border services using self-serve iris recognition kiosk. NEXUS cardholders stand in front of the kiosk and look into the adjustable camera so that their irises can be photographed and compared to the images they submitted with their applications.
Nexus users are able to move through border security quickly. Canada Border Services will see a benefit in labour cost reduction by having to employee less border guards and each location. Users must stand perfectly still and look into the camera from the correct height and distance. The system provides audio and visual direction if a user is not in the correct position.
Though biometric technology is becoming commonplace, some users still have questions about privacy. Systems do not store your biometric information; it converted it into a code. Stealing and decoding that data for fraudulent use would be far more difficult than stealing a swipe card, or accessing a password based system.
Like any technology, biometric systems have some disadvantages. Despite research and testing, biometric technology can still fail, and because it is relatively new in the marketplace users can have difficulty adjusted to the system. The start-up cost can also be prohibitive, and lead some companies to remain with the password or pin systems they already have in place.
There are also limitations on biometrics. A fingerprint scanner may not work if a finger is dirty, or cut. Voice recognition can be disturbed by background noise, or voice that is changed because of a temporary cold or throat infection. Continued research will help find the gaps in biometric authentication, and help enhance the systems.
Despite the disadvantages, biometric authentication offers a significant return on investment in terms of security and access control for individuals, organizations, and Governments. The initial start-up cost can be recouped in time and money saved later on. It will be important to continue biometrics research as technology changes, and those who wish to use it fraudulently find ways to overcome the system.
Despite the disadvantages, biometric authentication offers a significant return on investment in terms of security and access control for individuals, organizations, and Governments. The initial start-up cost can be recouped in time and money saved later on. It will be important to continue biometrics research as technology changes, and those who wish to use it fraudulently find ways to overcome the system.