Tracking biometrics into a brave new digital world

Access & Identity Management Handbook 2019 Editor's Choice, Access Control & Identity Management, Integrated Solutions

The concept of using of biometrics – measuring an individual’s unique physical and behavioural characteristics or traits – to confirm a person’s identity, was conceived thousands of years ago. For instance, since the dawn of time people relied on facial recognition to distinguish between people they did or did not know. The use of fingerprinting can also be dated as far back as 500 BC1, whereby these unique markers were recorded on tablets as part of verifying the identities of parties to a transaction.

Pine Pienaar.
Pine Pienaar.

Whilst society of that time didn’t recognise the full potential and value of biometrics, the solutions we use today are still embedded in the authenticity of these origins. Where the science behind biometrics really started to evolve during the 19th and 20th centuries (to read more on the chronological developments in the 19th and 20th centuries to modern biometrics, please see the ‘Detect and protect’ series of articles on my LinkedIn profile.) and some of the milestones that defined how we understand and use biometrics today include:

• 18232 – Dr J. E. Purkinje, a professor of anatomy at the University of Breslau was the first to publish an essay on the varied ridge patterns of fingerprints and classified them into pattern types.

• 18802 – Discussions first commenced on the use of fingerprints for accurately verifying personal identification. This followed an article by Dr Henry Faulds, a Scottish doctor in Tokyo, Japan, that was published in the scientific journal Nature, in which he observed the wide diversity in fingerprints between

individuals and that these markings remained unchanged throughout life.

• 18823 – The Bertillon System was introduced. Although use of the Bertillon System as a standalone method to verify an individual’s identity, saw a dramatic decline following the case of William West and Will West at a Federal Prison in Leavenworth, Kansas, in 1903, the methodology of the Bertillon System is still pursued in biometrics and forensic science today.

• 19364 – The concept of using iris patterns as a means of recognising and verifying an individual’s identity was first introduced.

• 19605 – Face recognition becomes semi-automated, and later the first model of acoustic speech for identification was proposed.

• 19803 – The first computer database of fingerprints was developed, which came to be known as the Automated Fingerprint Identification System, (AFIS).

° The AFIS was introduced in South Africa in the 1990s, though this system and other versions that came after it weren’t very successful and by 1995 this system was disbanded. However, efforts continued to create a system that was optimised and effective, and a new system was re-introduced in the country in 2002.

° Research6 indicates that the AFIS market will continue to experience solid growth and the market is expected to be worth US$ 8.49 billion by 2020.

It is interesting to note that most of these developments centred around physiological traits and unimodal biometric systems. In fact, much of the focus during the 20th century was on building devices, back-end databases and systems that could correctly capture and store fingerprints so that these records could later be used to make an accurate and automated comparison when a ‘one-to-one’ or a ‘one-to-many’ request was entered into the system.

For that time period, it was strongly believed that fingerprints alone would be the universal identifier that could be used for a number of applications for authenticating and verifying a person’s identity, but it was soon realised that other systems could be built on top of this, including verification for security, access control, or verifying personal and/or criminal records, for example.

For the most part, automated fingerprint identification systems still form the basis of most biometric solutions today. However, following the advent of the Internet and given the pervasiveness of fake documents – linked to fake identities or identity theft – as well as major world events such as 9/11, it was realised that a standalone biometric identifier is not suitable to meet all the security requirements of various applications. As a result, the industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verifications and to deliver faster results in real-time.

As an emerging trend, multimodal biometric solutions can take input from a single, or multiple devices, capturing two or more different physiological or behavioural traits for identity authentication and verification – depending on the application and security measures required. The combinations for a specific application can vary and may include any number of identifiers from fingerprints to iris, face or voice recognition, or a person’s signature – even a person’s gait signature (distinguishing someone by the way they walk, although less known). These biometric identifiers may be used in combination with any other unique traits to identify an individual.

For consumers, businesses, government services and even national and global security on a macro level, these solutions offer increased recognition rates and as a result improved accuracy in verifying the authenticity of an individual’s identity. Additionally, these solutions are able to take live measurements of more than one biometric identifier and check them against multiple systems based on approved integration which presents results in real-time – this process reduces the risk of the spoofing or hacking, which inherently also increases the level of security. (Spoofing refers to a person attempting to cheat or trick a biometric system by using a copy or imitation of the biometric identifier of the authentic subject. For example, someone trying to use a copy of another person’s fingerprint.)

While unimodal fingerprint systems will continue to have a place in the market, multimodal biometric solutions are certainly more robust and reliable. But, the real value of these solutions is in the diverse applications in which they can be used, across any sector or industry, to better protect personal information – and to detect and protect against fraud and/or other illicit or criminal acts.

As we leap forward to the current brave new digital age, due to the ongoing waves of digital transformation, biometric solutions are dubbed to go mainstream as the foundation to managing identity authentication and digital security. In fact, an IBM Security Report7 found that while 67% of respondents said they are comfortable using biometric authentication today, 87% say they’ll be comfortable with it in the future.

As the digital play in biometrics rapidly evolves, these solutions include fingerprints, facial recognition and even iris or retina scanners on mobile devices, at ATMs and self-­service check-in counters at airports. Devices and solutions will be designed and built specifically to address the need application and the fluidity of this modern world. In fact, there are already examples of such applications being implemented and tested globally. Going forward, we expect that mainstream adoption of biometrics will impact how employers, service providers and technology companies provide end-users with access to these devices, applications and services in the future.

However, the biggest challenge for the industry and for the public and private entities that want to adopt biometric solutions as part of their identity verification and security protocols, is to obtain user (consumer) buy-in. There are concerns over how and where biometric data will be captured and stored – and how secure the information will be. Though these concerns can be easily allayed as it is possible to securely capture, encrypt and store biometric data, and the research by IBM7 shows that consumers are ready and willing to make use of biometric solutions. The onus is now on the industry and organisations to make use of flexible identity platforms that provide users with accuracy, security, speed and convenience – which makes the identity verification process a positive user experience.

In today’s fast-paced lifestyles, knowing who you are dealing with is critical in order to manage personal, business and even ­societal risks on a macro level. The fundamental attribute of biometrics remains as the ability to verify an individual’s identity, which continues to become ever more prevalent in the digital age. Therefore, with the added benefits of agility and scalability offered by digital and mobile biometric solutions, mainstream adoption is only a matter of time.

For more information contact Afiswitch, +27 12 679 2900, [email protected], www.afiswitch.com

References

1. https://www.biometricupdate.com/201802/history-of-biometrics-2

2. https://www.google.co.za/search?tbo=p&tbm=bks&q=isbn:1563252635

3. http://www.crimescene-forensics.com/Crime_Scene_Forensics/History_of_Fingerprints.html

4. https://www.biometricupdate.com/201206/explainer-iris-recognition

5. https://www.biometricupdate.com/201601/explainer-facial-recognition

6. https://www.marketsandmarkets.com/PressReleases/automated-fingerprint-identification-system.asp

7. IBM, Future of Identity Study, 2018





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...