Skip to main content

Home/ CSIA 459/ Group items tagged biometrics

Rss Feed Group items tagged

Amy Harding

Biometrics and Cyber Security - 8 views

  •  
    Review the presentation.
  • ...3 more comments...
  •  
    This article does mention balancing some weaknesses of biometrics. The one weakness that is common right now among these systems is the use of usernames and passwords to form a secondary means of accessing the system once the biometrics no longer work. With the implementation of multi-modal systems, this could be resolved. The article also discusses international based systems, which could be difficult, personal information is a source of contention between many countries. Where is the information stored, and what laws become enforceable depending on the users point of presence?
  •  
    Interesting article thank you for posting it. As Phil and the article mentioned where is this information stored. The security of this information is deeply concenring. Not that I am a conspiracy theorist but I really do not want my biometric information to be stored on some database. I remember when my daughter was young there was a push to have your child's DNA sample taken and stored in case it was ever needed in the event the child was kidnapped or lost. After thinking about it back then I just did not see how the government having her DNA sample was a good thing. Of course if she ever comitted a crime I would like to think that I would want her punished for the crime but being a parent I also know that I would do anything to protect her, so why would I give the government a readily available DNA sample for them to identify her with. In the event a sample was needed because of some terrible event happening to her one could be provided through other methods. Just my thoughts.
  •  
    I just posted up an article on fooling biometric fingerprint scanners, Facial scanners can be fooled with photos http://thehackernews.com/2011/11/android-facial-recognition-based.html The Danger is that while one can get a new password or smart card if the old is compromised, You only have one face, two eyes and 10 fingers to use for ID and can't get new ones when someone figures out how to comprimise them.
  •  
    Thanks for the posting especially since my project deals with Ambient Intelligence wherein biometrics can be an integral part of its implementation. One of the most common and frequent incidents in Service Management is authentication. Whether it is with entering secure facilities or logging into computer systems both in the office and remotely, people tend to forget their credentials. Consequently, this causes a loss in productivity as someone tries to regain their access to systems or for system administrators to provide them with temporary access. Ambient intelligence and biometrics may seem as a viable solution since the physical characteristics is intrinsic in each individual. This presentation presents me with the cybersecurity flaws and weaknesses that should be mitigated.
  •  
    Biometrics is always something I have found to be fascinating. Because like this article stated no one knows who you are on the other end of that computer so being able to authenticate that in some sort of method is a great thing
scott thomas

Automated biometrics-based personal identification - 1 views

  •  
    Identification Technology Division, EER Systems Inc. McLean, VA 22102; and†National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences, Beijing 100080, China Why Use Biometrics-Based Personal Identification? Biometrics-based personal identification attempts to answer the questions "Who are you?" and "Are you who you claim to be?"
  •  
    Scott, this technology appears not to far away especially when it comes to biometrics/fingerprinting the last car dealership I worked at 4 years ago employed this for retrieving keys to test drive cars and the salespeople liked this a lot because we did not have to worry about keeping up with a key to unlock the key box before signing a car out to test drive. I mean you always got your finger with you and key log kept track of last known person with key so salespeople would not be charged for lost keys. Thanks.
  •  
    Identification Technology Division, EER Systems Inc. McLean, VA 22102; and†National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences, Beijing 100080, China Why Use Biometrics-Based Personal Identification? Biometrics-based personal identification attempts to answer the questions "Who are you?" and "Are you who you claim to be?"
scott thomas

A practical guide to biometric security technology - 1 views

  •  
    As organizations search for more secure authentication methods for user access, e-commerce. and other security applications, biometrics is gaining increasing attention. But should your company use biometrics? And, if so, which ones should you use and...
  •  
    I think biometrics are great, but really a buggy technology. The two biggest issues I see impeding the popularity of biometrics are consistency and getting people comfortable with the technology.
Justin Ohm

Cognitive biometrics: A very personal login - 2 views

  •  
    Retina and iris scans, fingerprint and palm logins rely on possession of unique anatomical characteristics that you cannot forget as you might a password. But, Kenneth Revett of the British University in Egypt, in El-Sherouk City, reviews the state of the art in an alternative approach to user authentication in the inaugural issue of the International Journal of Cognitive Biometrics.
  •  
    Very interesting article Justin. I like the idea of using biometrics as an authentication layer, vs. relying on a CA to issue digital certificates. In my opinion, biometrics should only use functions that can be read or measured when the person is alive.
  •  
    Biometrics is great for a multi factored authentication. It is a very expensive approach to authenticating as well. I doubt there will be a market for it until the price for implementation drops drastically. I would not use it as a stand alone authentication approach.
scott thomas

Fingerprint Biometrics Allow Hospitals to Securely Access e-Prescriptions, EHRs - 0 views

  •  
    By Brian T. Horowitz | Posted 2011-03-02 Email Print Biometrics firms Bio-key and Lumidigm aid Genesis HealthCare System in Ohio in implementing finger-based biometrics for e-prescriptions and electronic health records.
Phil Kemp

Cell Phone-Based Biometric Identification - 0 views

  •  
    Source 4 of 5 for my Annotated Bibliography on the implementation of biometrics to secure smart phone technologies
Phil Kemp

ENTERPRISES HAVE SMART-PHONE BIOMETRIC OPTIONS: Facial recognition, fingerprint identi... - 0 views

  •  
    Source 3 of 5 for my Annotated Bibliography on the implementation fo biometrics to secure smart phone technologies.
Phil Kemp

Exploring Touch-screen Biometrics for User Identification on Smart Phones - 0 views

  •  
    Source 2 of 5 for my Annotated Bibliography on the implementation of biometrics to secure smart phone technologies.
sarahterry

Shibboleth Authentication Request - 1 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source explains the history of biometrics and how biometrics have got to where they are now.
sarahterry

Perceptions of biometric experts on whether or not biometric modalities will combat ide... - 0 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source is from Capella University. It explains how identity fraud can be reduced with the use of fingerprinting.
scott thomas

Biometric Technologies: Security, Legal, and Policy Implications - 0 views

  •  
    Advanced technology is a competitive advantage for the United States, and it must be used if the country is to win its war on terrorism. Biometric technologies-such as iris recognition, handgeometry, finger recognition, facial recognition, and voicerecognition-have substantial potential to improve national securityby providing a means to identify and verify people in manycontexts.
Justin Ohm

Fingerprint biometrics - 2 views

Here are the sources for my annotated bibliography on fingerprint biometrics. http://appleinsider.com/articles/13/06/20/apples-fingerprint-sensor-encapsulation-tech-could-be-used-in-future-iphone...

started by Justin Ohm on 07 Jul 13 no follow-up yet
Amy Harding

Security Pitfalls in Cryptography - 30 views

  •  
    Does this article from 1998 still hold true today?
  •  
    I believe this article is still very relevant. After reading Bruce Schneier's article, one of the things I took away was his comment regarding the inherent lack of security created by implementers of tamper resistant methodologies, such as smart cards, and biometric technologies. If these systems fail, we want to make sure that we can still access the resource which is being protected, so we tend to build insecure systems in place to bypass the tamper resistant security. In the end, things like biometrics and smart cards seem to be built more for convenience, instead of security. A similar affect is pointed out in the article when users give their access tokens to others so they can do their work. As long as the human element has control in the implementation of security, the risk of failure will always be there, no matter how great the security method is.
Phil Kemp

BIOMETRIC AUTHENTICATION THROUGH A VIRTUAL KEYBOARD FOR SMARTPHONES - 0 views

  •  
    Link goes to UMUC Library Resources so you will need to provide last name and pass to access.
glenn_g

Thinking Putty defeats Fingerprint Scanners! - 1 views

  •  
    Just a heads up on why I don't like biometric Authentication. It gets worse when used for Identification. I'll try to find a link
  •  
    Glen, This did a little to damage fingerprint biometric technologies when it was first discussed in the public. I read the original article I think, when Matsumoto was using original gelatin to fake the scanners. There was also a documentary, or short news clip I had seen awhile back in which he demonstrated it. Newer technologies are starting to combine (multi-factor) authentication in order to gain access now, such as fingerprint and iris. This should help curb things like this, as well as stop the backdoor of username and password. phil
sarahterry

Biometric Fingerprinting for Visa Application: Device and Procedure Are Risk Factors fo... - 0 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source is an example in what companies, government entities as well as products are taking finger prints from people who are applying for credit card, crossing the boarder and how it has stream-lined their process.
scott thomas

Biometrics: Weighing convenience and national security against your privacy - 0 views

  •  
    Panelists, Professor William Marshall, Professor Richard Pildes, Professor Ciara Torres-Spelliscy, Professor Edward Foley, Professor Richard Hasen, Edwin Bender, Laughlin McDonald, Professor Michael Kang, Professor James Lopach, Former Montana Supreme Court Justice Jim Regnier, Former Montana Supreme Court Justice W.
1 - 20 of 29 Next ›
Showing 20 items per page