BIOMETRICS
last updated 2011 March 06
this webpage is listed by the Canadian Internet Policy and Public Interest Clinic (CIPPIC) at the University of Ottawa, Faculty of Law
www.cippic.ca/biometrics
 
. This page used in the following courses taught by Prof. Richardson
.
MGT D06
BCS 555
MGD415 / MGT471
MRK 410
.
 
http://people.senecac.on.ca/tim.richardson/audio/audioBiometricsWTGRintro.wav Click on the witiger "audio" icon below to hear Prof. Richardson's
audio introduction to this unit.
http://people.senecac.on.ca/tim.richardson/audio/audioBiometricsWTGRintro.wav
 

 

.
http://www.youtube.com/watch?v=A7Xszacia0M A simple, but concise and useful video made by student Arie L. in MRK619 at Seneca College on March 9th 2010.

comments welcome

focus on business applications Essentially, we will be looking at the marketing consequences for people in business, e-commerce and international business who have to use this technology to identify relationships with people - people meaning employees, customers and suppliers. In order to operate securely in a world that has increasing security concerns post 9/11, it is more and more necessary for companies to use security technologies and secure processes since there are a number of circumstances that threaten the way a company can conduct its business.
.
LEARNING
OBJECTIVES
Generally, the technologies discussed in this unit come under the heading of Encryption And Authentication Tools because these technologies are applied to allow organizations to keep information secret, send information secretly, and to make sure only authorized people have access to places or information.

After reading this material, and listening to the lecture, students will be able to;

    o describe the range of technologies that biometrics encompasses
    o identify applications that effect the marketing of services and products
    o understand the basics of some future biometric trends

.
INTRODUCTION  www.biometrics.orga US Government organization concerned with automatically
recognizing a person using distinguishing traits.

"Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.  Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. "

.
Biometric
Fundamentals
Why are biometrics necessary, why can't we just carry a secure piece of plastic with our picture and a hologram?

Biometric systems are superior because they provide a nontransferable means of identifying people not just cards or badges. The key point about an identification method that is  "nontransferable" means it cannot be given or lent to another individual so nobody can get around the system - they personally have to go through the control point.

The fundamentals of biometrics is that they are things about a person that are:
    o measurable - things that can be counted, numbered or otherwise quantified
    o physiological characteristics - like height, eye colour, fingerprint, DNA etc.
    o behavioral characteristics - such as the way a person moves, walks, types

WTGR

..
Tutorial
The U.S. Government Dept. of Defense has an online tutorial that you can click through and provides an interesting and easy to understand introduction to the basic concepts of biometrics.

In Nov 2006 the link was working   www.biometrics.dod.mil/bio101/index.aspx
2008 the link is www.biometrics.dod.mil/

..
 
Components of Biometrics Components of Biometrics

Under the heading of "components" we have
Static Information

- which basically means information that is the same all the time, like your fingerprints

Sub-heading 
Close distances

- means biometrics working on the principle that the person to be identified is close enough to make contact, or be measured close-up

v
. U of T student Ruvani P in MGD415 in March 2008 found a YouTube clip which provides a good overview of several of the biometrics technologies being talked about in 2007 and 2008
MSNBC Dateline produced a documentary about biometrics which ended up being posted on YouTube
 
..
in March 2008 the YouTube link was
 http://youtube.com/watch?v=acU9-5kIB0w

on the NBC site the link is
 http://video.msn.com/?mkt=en-us&brand=
msnbc&fg=email&vid=fab2cd88-8c42
-4ce6-bd5c-3b6aca92ad7d&from=00

discusses fingerprints, facial recognition programs 
and implants

the clip is quite short

Fingerprints
Fingerprints

Why is fingerprint technology still used, aren't there other more advanced systems?

Yes, but many of the more advanced systems are also vulnerable to errors in harsh environments. 

Fingerprints may be old technology, but they can be practical, for example they can be used by construction workers outside in cold weather, and the key pad can be weatherproofed. This is not easily possible with delicate technologies like iris scans.

There are three different types of fingerprint capture technologies:

  o Optical technology
  o Silicon technology
  o Ultrasound technology

v
Handprints
Handprints
(properly termed Hand Geometry Recognition)

Why is Hand Geometry necessary if fingerprint technology works? Simple - maybe the person is in a health lab and wearing gloves. Or it is cold weather and they have gloves for warmth.
 

Some Hand Geometry recognition systems are based on optics - meaning electronically "seeing" the size of the hand, spacing of the fingers, length between joints etc. and matching this is data on file for a person

Some Hand Geometry recognition systems use ultrasound technology which allows penetration through gloves or mitts to measure the bone size, shape and spacing in a hand.
 
The pad can also be calibrated to record the body temperature so that you could not cut off someone's hand and use it.

A variation of this is the Fujitsu PalmSecure (palm vein recognition) and the Hitachi UB READER (finger vein recognition)

v
Iris vv
Iris Scan

Some people are still anxious about the long-term effects on their vision. Canadian airports started using this in 2005 to screen pilots and airport workers.

Pilots were intially worried about the possibility that repeated scans would negatively effect their vision but the technology has improved to the point where that is no longer an issue. Canada Customs uses an iris scan system called CANPASS-Air for low-risk travellers at Pearson airport.
v
Voice Recognition Voice recognition can be done by telephone or cellphone (landline or wireless). 
Facial recognition could be done from several metres away, or from video at an airport, border crossing or some other high risk access point

"Older voice recognition applications require each word to be separated by a distinct space. This allows the machine to determine where one word begins and the next stops. These kinds of voice recognition applications are still used to navigate the computer's system, and operate applications such as web browsers or spread sheets."

"Newer voice recognition applications allow a user to dictate text fluently into the computer. These new applications can recognize speech at up to 160 words per minute. Applications that allow continuous speech are generally designed to recognize text and format it, rather then controlling the computer system itself."

Problems:
"While the accuracy of voice recognition has improved over the past few years some users still experience problems with accuracy either because of the way they speak or the nature of their voice."

from http://www.findbiometrics.com/Pages/voice%20articles/voice_1.html

..
Facial Recognition
"Facial recognition analyzes the characteristics of a person's face images input through a digital video camera. It measures the overall facial structure, including distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used as a comparison when a user stands before the camera." 

Problems:
"This biometric has been widely, and perhaps wildly, touted as a fantastic system for recognizing potential threats (whether terrorist, scam artist, or known criminal) but so far has been unproven in high-level usage."

from http://ctl.ncsc.dni.us/biomet%20web/BMFacial.html
 

faking out the camera? To prevent a fake face or mold from faking out the system, biometricgroup.com says many systems now require the user to smile, blink, or otherwise move in a way that is human before verifying.
..
Keystroke Keystroke recognition and gait have their origins in intelligence applications in the 1970's and 1980's but have been modified by IT companies in the 1990's and early years of the millennium for a range of purposes.
 
Keystroke Recognition

"Individual typing behaviour is characterized by writing dynamics and by underlying psychometrical features such as left and/or right-handedness or key finger placing. These criteria can be measured using standard hardware and can be used for identity verification of the computer user."
University of Regensburg
 

Erik Ableson, posting on a blog on  www.schneier.com suggested there's one area where this Keystroke recognition breaks down and that's in the international arena where you run across different keyboard layouts. v
..
Keystroke
recognition
applications
student Miron L. of MGD415 at University of Toronto (UTM) in March 2006 found some information related to the subject of Keystroke recognition.

Miron said
"I found some very recent and interesting articles on Biometrics.  This  article talks about a password management product that remembers user  keystroke patterns for less user invasive authentication"
 

Miron wrote
"Biopassword is a product that provides user authentication by remembering  the finger-typing pattern of a specific user. The user types in their  password as they normally would and the system analyzes their typing  pattern as a second level of authentication. The idea behind the  technology dates back to Morse Code. During World War II, it was found  that people on the receiving end of telegraph messages often knew who was  sending the message simply based on the rhythm of their signals.  Similarly, it was found that the manner in which specific people interact  with a keyboard can be "captured" to form an identity. And it's that  concept that drives keyboard-driven biometric devices such as Bio-password."

John Adams wrote a story about how San Antonio city employees Credit Union has deployed a password management product that remembers user keystroke patterns for less user invasive authentication.
Miron's link www.banktechnews.com/article.html?id=20060301N36LCQ3U

..
Movement
based
Information
Gait - walking pattern recognition

some applications are based on "far distances", that is the ability to classify and identify humans at distances up to 500 feet away under day or night, all-weather conditions

Problems: gait is effected by load - what a person might be carrying; it could be heavy clothes in winter, or an object being carried. Gait is also effected by injuries that a person would sustain - which puts it in the category of non-static (or variable) recognition

Digital Character Animation by George Maestri

..
Biometrics

Basic
Applications

"Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security."

Often, when biometrics is applied in situations requiring a high level of security, there is more than one feature that is authenticated and it is also often done in combination with other technologies such as smart cards, encryption keys and digital signatures.

from  www.biometrics.org

..
Biometrics
Fingerprint Recognition

Applications
in
marketing
 

Considering that one of the 4Ps of marketing is "Place", which includes the shipping function, it is important to recognize that anything that can make shipping faster is a good thing in a competitive marketplace. One of the things that makes shipping faster is allowing trucks to move quickly without delays.

Problem - An easy to use, non-intrusive way of identifying transport truck drivers crossing the Canada-U.S. border

Solution - Allow truck drivers to pre-register their fingerprints and use this to quickly identify themselves at an accesspoint by reaching out the truck window and pressing a pad.
Can this work? Canadian truck drivers can have their fingerprints registered to cross borders smoothly in a system called FAST which stands for Free and Secure Trade. This is desirable for drivers who have to frequently cross the border with freight for U.S. destinations.
See www.cbsa-asfc.gc.ca/import/fast/menu-e.html
on the Canadian Border Services website

.
Biometrics
Fingerprint Recognition

Applications
in
marketing
 

UTM student Sean C (in MGD415 in 2008) sent an email to contribute some points about how fingerprint access control works

details
 www.itracentral.com/e-tap-01.htm

Sean said in an email 2008, Jan 10th
"There is a new product that was debuted at the  consumer electronics show in las vegas this week (Jan 2008) called  TAP-01  biometric doorbell

"The TAP-01 Fingerprint Access Control with Doorbell sports the obligatory fingerprint scanner, voice / name display, internet /  intranet management capabilities, arbitrary time zone and grouping  access control, and also a keypad password feature for an added level  of security."

Sean explains

"This is interesting because it shows how such small things are starting to use enhanced security features. These features have been used in many military compounds but I think it will be a continuing trend for residential home security systems. Biometrics will be used a lot more regularly as it becomes cheaper and mass produced by companies. Also if the ease of use becomes to a level that any average 'joe' can use the technology then that becomes a large selling point. We are seeing many wearable computers created today so it is a natural progression to be
using biometrics for security for these wearable computers. "

.
Biometrics
Fingerprint Recognition

Applications
in
Access
Control
for
facilities
and
events

Hsiao-Hsuam (Sharon) C. at UTM in MGD415 in March 2007 sent an email in which she discusses applications of fingerprint technology, which appears at first glance to be fairly simple, but in "real life" there were some problems. 
(Sharon sent a pic of her in front of the Magic Kingdom)

Sharon wrote
I was reading the biometrics topic, and I found an interesting article about fingerprint technology in Walt Disney World.

Article: Walt Disney World: The Government's Tomorrowland?
http://newsinitiative.org/story/2006/09/01/walt_disney_world_the_governments

Pic of the Disney finger print scanner showing position of the instructions

click to view larger

Sharon narrates The fingerprint scanner is used in Disney World since Sept. 2006. Before the fingerprint scanner, Disney recorded the geometry and shape of the visitor's fingers on the tickets to avoid fraud and resale.

Sharon explains The fingerprint scanner is used to reduce waiting time for the lineup at the entrance. However, privacy is a big issue. Some people have concerns that their personal identity might be stored and used for other purposes. Kim Prunty, spokewomen of Walt Disney World, explained that the machine will only spot a certain point of the finger, not the whole finger, and the data will only be stored for 30 days. However, if people are not comfortable with giving out their fingerprint, they can always show photo id to prove identity. Privacy is the major concern of using fingerprint scanner in public areas.
.
Biometrics
Fingerprint 
Recognition

Applications
in
Access
Control
for
facilities
and
events

Then, what makes this story interesting is Sharon adds her own experience with the fingerprint scanner

Sharon explains, 
I took a trip to Disney world in Dec, 2006. so I actually got to use the Fingerprint scanner. As mentioned in the article, the major purpose to use this technoology is to reduce waiting time at the front entrance. However, when I was there, it still took some time for the lineup. Most visitors (especially elders) are not familiar with this technology, and they got stuck in front of the gate for a long time. For example, the instruction indicates to put the index finger for scanning. Some people use thumb instead of index finger, and they couldn't enter the gate. Also, the instruction is to "PLACE" the index finger on the scanner, but lots of people "PRESS" on the scanner. They couldn't pass the scanner because the machine can not read the real shape of their finger.

WTGR adds, thanks Sharon, your perspective is interesting because it illustrates that new technological applications are not always so simple when you try to do it with the general population, especially when you have to make allowances for having to explain certain procedures and ask people to follow instructions.

.
Biometrics
Keystroke Recognition

Applications
in
marketing
a service

Problem - you give a password to someone to access some web based content. They pay for the access. You don't want them to pass on the password to other people who can access the content for free by simply typing in the password. What if there was a way of identifying a person not only by the actual letters and numbers of a password they type, but also by the way they type it?

Solution - when a person uses a password for the first time, the vendor records the password, and way the strokes are typed on a keyboard. This pattern is stored. When the customer logs in again, the password is matched to the file rendering the way the letters were typed to see if it is the same rhythm, and then authenticates the user.



CNET news.com carried a story about Musicrypt.com and Net Nanny Software.

These two companies are best known for Web filtering programs. ,The story said they are joining forces to create software that can identify individual music users. This information would be used to protect songs against unauthorized distribution and use.

John Borland, who wrote the article for CNET explains that the "companies want music labels or online retailers to insert the technology into downloaded music, so that only a person who buys a given song would be able to play it on a computer. Identifying the buyer by these keystroke patterns is far more secure than using passwords, which can be passed on to thousands of people..."

Can this work? Borland explained that "Analysts who follow the biometrics industry say the keystroke technology is less accurate than other technologies such as fingerprinting or retinal scans, but it makes up for that weakness in its relative ease of use."

...
Biometrics

Applications
in 
smart 
phones

student Gurpreet P. of MGD415 at UTM in early March 2011 emailed to discuss an example of  biometrics in smart phones
Gurpreet wrote
"I was just reading your section on biometrics and found it quite interesting. By doing some further research I discovered an article  relating the usage of biometrics to everyday smart phones.  The more  reliant people have become on their phones and apps, it makes for a  definite possibility of security breach and theft in which case  
biometrics can help negate the access of information to unauthorized personnel.  More or less, this is the opinion of the article. 
 
An example of this technology is exhibited in Samsung's LG eXpo that uses built in fingerprint recognition. The article also states that this technology could become standardized when using mobile banking and  person to person payments as a way of protecting against theft.
Gurpreet adds   
Several big firms have been working on this technology including BIO-key international, Oracle, CA, and IBM. On a side note I recently heard a rumour that the new Iphone 5 will utilize biometrics in the form of facial recognition which it thought would be pretty cool. Following is the link"
 http://www.enterprisemobiletoday.com/features/securi........................
.
Biometrics

Applications

student Saman H. of BCS 555 at Seneca College in November 2006 found an example in a current news story citing the need for biometrics.
Saman wrote
"Sir, Last night [2006 Nov 22] I watched a video on CNN about Fake ID's and homeland security. As you can see on the video link (below) cheaters are really professional and sometime it is really hard to recognize fake ID's. The only solution is using biometrics options to catch fake documents. I think this video is related to our last class subject; "Biometric"

Saman's video link pulled from CNN later

.


U.S. government images on this page used according to the D.O.D. policy outlined online at
 http://www.defenselink.mil/multimedia/web_graphics/
 
witiger.com
  CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE
.
  MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I
.
.
  Prof. W. Tim G. Richardson © www.witiger.com