>main index < > biometrics index < > prev < > next <

Current uses of Biometric Authentication.

The most popular biometric authentication scheme employed for the last few years has been Iris Recognition. The main applications are entry control, ATMs and Government programs. Recently network companies have realized the advantages of biometric authentication for networks and offer products to achieve this scheme. Products offered include fingerprint analysis, iris recognition, voice recognition or combinations of these. However widespread use of biometrics as a means of authentication has not yet been fully realized.

Biometric Authentication ATMs, Law enforcement and Airports.

Iris recognition in Law enforcement
In 1996 the prison in USA became the first correctional facility to use iris scanning. Sometimes the facility would need to release a prisoner on short notice and could not wait for the fingerprint tests.

ATM iris recognition.
Using an iris recognition ATM, a customer simply walks up to the ATM and looks in a sensor camera to access their accounts. The camera instantly photographs the customerís iris. If the customers iris data matches the record stored a database access is granted. At the ATM, A positive authentication can be read through glasses, contact lenses and most sunglasses. Iris recognition proves highly accurate, easy to use and virtually fraud proof means to verify customerís identity.

The Nationwide Building Society in Britain introduced iris recognition within in its cash dispensing machines as a replacement fro the PIN in 1998.

In 1999 national Bank United in the USA installed biometric authentication in three ATM outlets in Houston, Dallas and ft. Worth. The scheme employed an iris recognition system created by DieBold Inc , a company specializing in iris recognition.

Standard Bank in South Africa was using fingerprint verification on DieBold Atms, but it was recently determined that it wasnít as reliable as it could be. The company is now researching other biometric solutions that donít have the same issues that fingerprint verification did.

DieBold Inc anticipates that widespread use of biometric ATM is still several years away. It hasnít been determined yet which type of biometric technology will take-off as the standard. For this reason they are researching the technology to determine the most appropriate form of this technology.

Atm iris recognition has is currently the most successful due to its high accuracy, virtually fraud proof means to verify customer identity. The products used are standard video cameras and state of the art real time image processing. The entire experience only takes a few seconds.

Iris recognition in Airports.
In July 2000 iris authentication entered a new area of use as two airports began scanning passengers irises as part of an effort to streamline boarding and security processes. The airports rollouts are among the first major applications for iris scanning. The system used a 30 frame/sec, black and white camera to take a picture of the eye from 6 to 36 inches away. Once passengers enroll, their codes will be stored for further use. Airline passengers will step up to a terminal kiosk and get scanned in one second. The iris is compared to a database of customers to authenticate. Then the passenger can be issued a boarding pass.

Current Biometric authentication in Networking.

A host of networking associated companies have recently added biometric authentication features to their products. Companies such as Novell, Baltimore Technologies are some of the first to take advantage of biometric scheme.

Keyware Technologies LBV (layered biometrics verification) Internet Toolkit will allow software providers to add biometric voice and fingerprint authentication to traditional security applications that protect Internet servers, the company said. Keyware is targeting companies who deal with e-commerce applications requiring high levels of security, Veronique Wittebolle, Keyware executive vice president, said in a telephone interview last week. "Everyone realizes there is not one baseline (technology) that is going to solve everything (needed for complete security)," Wittebolle said. "But biometrics can and does work."
Keyware's LBV software can integrate several biometric identification features into an application, and is compatible with Microsoft Internet Explorer 4.01 and higher and with Microsoft's Information Server, the company said. Pricing begins at $4,550 for the LVB Internet Toolkit with LVB Server. One analyst said the layered security levels can provide most value for companies needing high levels of security. "If you are selling $12 million of steel, maybe you want to be really, really secure," Frank Price, senior analyst with Forrester Research, said in a telephone interview. "That's where you may go the extra mile."

Internet Banking
One area where the tool kit could be used is for enhancing security for Internet banking. A bank, contracting with an ASP (application service provider), could require biometric verification for a high-value transaction over the Internet. A vendor seeking to wire money using the Internet would go to the bank's Web page, fill out the required information and submit the transaction. If the transaction is for a high value, the bank would decide it needs biometric verification and automatically send a message to the Keyware LBV server requesting that the vendor speak a passphrase and use the fingerprint scanner. The LBV server would then verify the passphrase and the fingerprint and notify the bank if the request is accepted or rejected. No biometric templates leave the Keyware server, keeping them away from possible public access, according to Keyware.

Baltimore Technologies offer biometric security.
April 9, 2001 - eTrue, the first biometric authentication service outsourced over the Internet, has announced its partnership with Baltimore Technologies (NASDAQ:BALT; LONDON:BLM), a global leader in e-security. eTrue will integrate its biometric authentication service with Baltimore SelectAccess(tm). The combined offering will provide comprehensive secure access control and authorization management using multiple biometrics, such as face and fingerprint identification.
By combining these two solutions, businesses can provide users with a higher level of trusted access to valuable data and applications on websites and networks. Users will be authenticated using multiple biometrics and then authorized to access data and applications and conduct business in a secure manner. Customers with highly sensitive information, such as those in the healthcare, financial services and government markets, can now have a higher level of security when allowing ...employees, partners and customers access to business-critical data and applications.
The eTrue Internet outsourcing service authenticates users for both Web and local network logon. Through the use of multiple biometrics, exception handling and a call center, eTrue provides 100% user authentication.

Conclusion
The use of biometrics in networks as an authentication feature is gaining momentum. However the widespread use and acceptance of biometrics is, at this current time, still in its infancy.

>main index < > biometrics index < > prev < > next <