Monday, December 3, 2012

Identifying people through behaviour patterns

Identifying people through behaviour patterns
Munish Johar

ILLUSTRATION BY RAJIV KAULAs organisations search for more and more secure authentication methods for user access systems, electronic commerce, and other security applications, biometric technology is gaining increasing attention in today’s rapidly changing technology scenario. Once the stuff that you saw in James Bond movies, biometric technology (such as devices that read your fingerprints, cameras that recognise your face, software that knows your voice) is being used globally by companies and is readily available. However the question that comes to mind immediately is — What is Biometric?
Before giving a formal definition to the term biometric, it is important to provide some background information. The security field uses three different types of authentication methods:
  • Something you know (lowest level of security) — a password, PIN (Personal Identification Numbers), or piece of personal information (such as your mother's maiden name);

  • Something you have (second level of security) — a card key, smart card, or token;

  • Something you do or something you are (highest level of security) – this is a biometric, it comprises of both physiological and/or behavioural biometrics, including fingerprints, voiceprints, signatures, etc.

 

The above diagram depicts the process pictorially and the accompanying points provide a more complete explanation.
A. An end user attempts to access a protected network.
B. The application/Web server passes a request to the authentication server to verify the end user’s identity.
C. The authentication server checks the database for the end user’s identity profile (such as biometric templates).
D. Based on the security requested and constraints, an authentication policy is dynamically generated.
E. The authentication server prompts the end user for his/her credentials.
F. The credentials provided by the end user are matched against the database.
G. The authentication sever sends a yes or no validation response.

 Whilst individual biometric devices and systems have their own operating methodology, there are some generalisations one can make as to what typically happens within a biometric systems implementation. The most ‘popular’ biometrics seems to gravitate at present around the following methodologies:
Fingerprints: This biometric involves looking at the patterns found on a fingertip. A greater variety of fingerprint devices are available than for any other biometric. These systems have a high accuracy rating, are quick to use, take up little space and are relatively low cost, so they’re useful for providing security for large numbers of users.
Hand geometry: Hand geometry involves analysing and measuring the shape of the hand. This biometric offers a very good balance of performance characteristics and is quite easy to use.
Retina: A retina-based biometric involves analysing the layer of blood vessels found at the back of the eye. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point. This is not particularly convenient for people who wear glasses. For this reason, retinal scanning is not in widespread use, even though the technology itself can work well.
Iris: An iris-based biometric, on the other hand, involves analysing features found in the coloured ring of tissue that surrounds the pupil. Iris scanning, on the other hand is definitely less intrusive of the eye-related biometrics, it uses a fairly conventional camera element and requires no close contact between the user and the reader. Iris biometrics work with glasses in place and is one of the few devices that can work well in identification mode.
Face: Face recognition analyses the facial characteristics of a user. It requires the use of a digital camera to develop a facial image of the user for authentication. Because facial scanning needs an extra device not generally included with basic personal computers, it is targeted towards more niche areas such as network authentication.
Signature: Signature verification analyses the manner in which a user signs his or her name. Common signing features such as speed, pressure, and velocity are as important as the finished signature's static shape. This biometric enjoys a synergy with existing processes that other biometrics do not. Signature verification devices are reasonably accurate in operation and obviously lend themselves to applications where a signature is an accepted identifier.
Voice: Voice authentication is not based on voice recognition (as most of us would think) but on voice-to-print authentication, where complex technology transforms voice into text. Voice biometrics has the most potential for growth; because it requires no new hardware, most personal computers already contain a microphone. However, poor quality and ambient noise can affect the verification process.
No single biometric technology has dominated the market. Different technologies are being used for the same applications. To gain widespread acceptance in businesses, multiple individual biometrics methods must coexist in a single system solution. Initially, these techniques were employed primarily in specialist high security applications, however we are now seeing their use and proposed use in a much broader range of public facing situations. Future use of biometric technologies may include:
  • ATM machine use.
  • Workstation and network access
  • Travel and tourism
  • Internet transactions
  • Telephone transactions
  • Public identity cards
In the past few years, biometric technology has rapidly pushed through barriers that had slowed its adoption in mainstream environments, performance, accuracy and reliability have steadily increased amongst all types of biometrics methods and the prices of the capture devices used by this technology have plunged, making biometrics an attractive addition to security systems. For many companies, biometric systems are the perfect answer to the expensive and time-consuming problems of fraud, theft, and access control. Technical and financial considerations aside, biometrics can pose a significant cultural challenge and introducing fingerprint scanners to every desktop or a facial recognition based entry system has to be done sensitively and carefully. Once the exclusive preserve of sci-fi books and movies, biometrics now has to be considered as one of the many challenges of modern day management.

0 comments:

Post a Comment