advising on IT-business alignment
IT-business alignment about us blog our services articles & reports resources your profile exposure
blog
blog
Friday, September 01, 2006

Getting started with biometrics

The ever-growing need to mitigate the risks of identity theft, coupled with regulatory compliance and general concerns about the reliability of passwords, are such that multi-factor authentication is a hot issue in identity management circles. The factors in question are well understood: something you know; something you have; or something you are in various combinations.

The "something you are" factor - biometrics - has long been discussed as a means of addressing the limitations of the other factors. But it has largely remained just that - discussion. However, government identity cards, passports etc are increasing the volume and widespread implementation is becoming a serious (in more ways than one!) possibility.

With that in mind, I recommend you take a look at this recent post from Jerry Fishenden, Microsoft's National Technology Officer for the UK. Whilst Jerry discussions broader societal issues, there is some sage advice for organisations evaluating biometrics as part of a multi-factor authentication strategy, not least:

I use fingerprint readers at home both for access to my office and on one of my PCs - where they are a great convenience and work reasonably well (if occasionally taking a few times to succeed). However, I don't like the way in which they merge authentication and identification into a single process, unlocking the PC for example just with a fingerprint without any other form of credential. This would certainly not be a sustainable model in an environment where proper security was required.

and

One of the core principles of computer-based security is the separation of identification from authentication. After all, if you merge the two, what happens when your biometrics are compromised? By keeping these aspects separate, it remains possible to issue different credentials to be used alongside our biometrics. Stronger systems ideally adhere to the established 3 factor principle: something you know (such as a PIN), something you have (such as a smart card) and something you are (which is, of course, where biometrics typically come in).


Burn this feed
Burn this feed!

Creative Commons License
This work is licensed under a Creative Commons License.

Blog home

Previous posts

BEA ups the service infrastructure stakes... or wi...
Arithmetic 2.0
"Uncompany" research reports now published
Sun's open-sourcing of Java: avoid the red herring
IBM acquires FileNET - who really stands to gain?
Novell starts down the road of Sentinel integration
Bastard apps
IDS-Scheer: everyone's best friend
If it looks like an application, walks like an app...
Debunking the myth of ROI from IT

Blog archive

March 2005
April 2005
May 2005
June 2005
July 2005
August 2005
September 2005
October 2005
November 2005
December 2005
January 2006
February 2006
March 2006
April 2006
May 2006
June 2006
July 2006
August 2006
September 2006
October 2006
November 2006
December 2006
January 2007
February 2007
March 2007
April 2007
May 2007
June 2007
July 2007
August 2007
September 2007
October 2007
November 2007
December 2007
January 2008
February 2008
March 2008
April 2008
May 2008
June 2008
July 2008
August 2008
September 2008
October 2008
November 2008
December 2008
January 2009
February 2009
March 2009
April 2009
May 2009
June 2009
July 2009

Blogroll

Andrew McAfee
Andy Updegrove
Bob Sutor
Dare Obasanjo
Dave Orchard
Digital Identity
Don Box
Fred Chong's WebBlog
Inside Architecture
Irving Wladawsky-Berger
James Governor
Jon Udell
Kim Cameron
Nicholas Carr
Planet Identity
Radovan Janecek
Sandy Kemsley
Service Architecture - SOA
Todd Biske: Outside the Box

Powered by Blogger

Weblog Commenting and Trackback by HaloScan.com

Enter your email address to subscribe to updates:

Delivered by FeedBurner