+ All Categories
Home > Documents > Biometrics 2013 – the practical application of biometric technology

Biometrics 2013 – the practical application of biometric technology

Date post: 31-Dec-2016
Category:
Upload: buithuan
View: 216 times
Download: 2 times
Share this document with a friend
3
9 September 2013 Biometric Technology Today FEATURE dering into a hospital or sitting behind a target on an airplane would be close enough. Radcliffe also found that it was possible to tamper with a second device he wears. He found that he could intercept signals sent wire- lessly from a sensor to a machine that displays blood-sugar levels. By broadcasting a signal that is stronger than the real-time, authentic readings, the monitor would be tricked into displaying old informa- tion over and over. As a result, a patient who did not notice would not adjust their insulin dosage properly. With a powerful enough antenna, Radcliffe said, an attacker could be up to half a mile away. This attack worked on two different blood sugar monitors, Radcliffe told his audience. “Everybody’s pushing the technology to do more and more and more, and like any technol- ogy tha’’s pushed like that, security is an after- thought,” he says, adding that the Government Accounting Office (GAO) in the US is now looking at how best to tackle the issue of medi- cal device security, and he has been talking to them as well as their colleagues in the European Union on this side of the Atlantic. Radcliffe explained that the recent GAO report published by the US Congress would hopefully prompt action by various regulatory bodies on the issue of security. The problem is, he says, that these government agencies are not geared up to evaluate the security of embed- ded medical computers, and without guidance, could cause more problems than they will solve. “This is because there is zero infrastructure to support any legislation – the agencies have no resources to send thousands of investiga- tors out into the field to test and review these devices,” he says. There are, he adds, four main methods of solving the problem of raising the security of in-body medical devices, and these include focusing on the review and testing process itself at the vendor’s operation; clearing up the pro- cesses and procedures vendors; identifying the software libraries and DLLs needed to enhance the software/firmware; and undertaking third party tests of the security technology – such as biometrically identifying yourself to the device – that is involved. “Vendors need to start this process now,” he advises, adding that there is a strong need for them to do this, as when the regulatory request comes, they will be far better placed to deal with it espe- cially if they can prove due diligence when some- thing has really gone wrong with their devices. Resources Ponemon Institute. ‘2012 Third Annual Benchmark Study on Patient Privacy & Data Security’. http://www.ponemon.org/library/ third-annual-patient-privacy-data-security- study. Accessed August 2013. About the author Steve Gold has been a business journalist and technology writer for 27 years. A qualified accountant and former auditor, he has specialised in IT security, business matters, the Internet and communications for most of that time. He lectures regularly on criminal psychology and cybercrime. Jay Radcliffe: biometrics can secure in-body medical devices. Biometrics 2013 – the practical application of biometric technology Elsevier, publisher of Biometric Technology Today, runs the show. It brings together end users, potential end users, suppliers, integrators, press, academia and govern- ment researchers, many of whom attend the event every year. Biometrics giants NEC and CrossMatch are sponsoring the 2013 Biometrics show. Set against the backdrop of Westminster Abbey and the Houses of Parliament in central London, the event expects to welcome 1500 attendees, visiting more than 45 companies on the exhibition floor showcasing a range of biometrics products and services. New for the 2013 event is the ‘Biometrics Privacy Debate’ led by Joseph Atick, Identity Counsel International director and IBIA cofounder and director emeritus, France. The debate will look beyond moral issues towards the frameworks needed to be in place to protect privacy but enable busi- ness and security. Government applications remain a major element of the biometrics industry and will be well represented at the event. A variety Biometrics 2013 will open its doors at the QEII conference centre in Westminster, London, on 15 October. In its sixteenth year, the show is renowned for the high quality of its conference and ability to bring together all the major players and some of the newer companies in the field to its exhibition floor. As biometric technology reaches maturity, the show will focus on biometrics in practice.
Transcript
Page 1: Biometrics 2013 – the practical application of biometric technology

9September 2013 Biometric Technology Today

FEATURE

dering into a hospital or sitting behind a target on an airplane would be close enough.

Radcliffe also found that it was possible to tamper with a second device he wears. He found that he could intercept signals sent wire-lessly from a sensor to a machine that displays blood-sugar levels.

By broadcasting a signal that is stronger than the real-time, authentic readings, the monitor would be tricked into displaying old informa-tion over and over. As a result, a patient who did not notice would not adjust their insulin dosage properly. With a powerful enough antenna, Radcliffe said, an attacker could be up to half a mile away. This attack worked on two different blood sugar monitors, Radcliffe told his audience.

“Everybody’s pushing the technology to do more and more and more, and like any technol-ogy tha’’s pushed like that, security is an after-thought,” he says, adding that the Government Accounting Office (GAO) in the US is now looking at how best to tackle the issue of medi-cal device security, and he has been talking to them as well as their colleagues in the European Union on this side of the Atlantic.

Radcliffe explained that the recent GAO report published by the US Congress would hopefully prompt action by various regulatory

bodies on the issue of security. The problem is, he says, that these government agencies are not geared up to evaluate the security of embed-ded medical computers, and without guidance, could cause more problems than they will solve.

“This is because there is zero infrastructure to support any legislation – the agencies have no resources to send thousands of investiga-tors out into the field to test and review these devices,” he says.

There are, he adds, four main methods of solving the problem of raising the security of in-body medical devices, and these include focusing on the review and testing process itself at the vendor’s operation; clearing up the pro-

cesses and procedures vendors; identifying the software libraries and DLLs needed to enhance the software/firmware; and undertaking third party tests of the security technology – such as biometrically identifying yourself to the device – that is involved.

“Vendors need to start this process now,” he advises, adding that there is a strong need for them to do this, as when the regulatory request comes, they will be far better placed to deal with it espe-cially if they can prove due diligence when some-thing has really gone wrong with their devices.

Resources

Ponemon Institute. ‘2012 Third Annual Benchmark Study on Patient Privacy & Data Security’. http://www.ponemon.org/library/third-annual-patient-privacy-data-security-study. Accessed August 2013.

About the author

Steve Gold has been a business journalist and technology writer for 27 years. A qualified accountant and former auditor, he has specialised in IT security, business matters, the Internet and communications for most of that time. He lectures regularly on criminal psychology and cybercrime.

Jay Radcliffe: biometrics can secure in-body medical devices.

Biometrics 2013 – the practical application of biometric technology

Elsevier, publisher of Biometric Technology Today, runs the show. It brings together end users, potential end users, suppliers, integrators, press, academia and govern-ment researchers, many of whom attend the event every year. Biometrics giants NEC

and CrossMatch are sponsoring the 2013 Biometrics show.

Set against the backdrop of Westminster Abbey and the Houses of Parliament in central London, the event expects to welcome 1500 attendees, visiting more than 45 companies

on the exhibition floor showcasing a range of biometrics products and services.

New for the 2013 event is the ‘Biometrics Privacy Debate’ led by Joseph Atick, Identity Counsel International director and IBIA cofounder and director emeritus, France. The debate will look beyond moral issues towards the frameworks needed to be in place to protect privacy but enable busi-ness and security.

Government applications remain a major element of the biometrics industry and will be well represented at the event. A variety

Biometrics 2013 will open its doors at the QEII conference centre in Westminster, London, on 15 October. In its sixteenth year, the show is renowned for the high quality of its conference and ability to bring together all the major players and some of the newer companies in the field to its exhibition floor. As biometric technology reaches maturity, the show will focus on biometrics in practice.

Page 2: Biometrics 2013 – the practical application of biometric technology

FEATURE

10Biometric Technology Today September 2013

of biometrics modalities, such as voice, are becoming more mainstream, and there will be a chance to catch up with developments in maturing and emerging technologies at the conference.

The event will focus on the practical applica-tion of biometrics in the field, including mili-tary applications in the battlefield.

Exhibition The BiometricsLive exhibition runs from 16–17 October. It will bring together all major biometric technologies under one roof and entry is free. More than 40 exhibitors will show the latest developments and there will be free seminars available.

Conference highlightsThe conference will run over three days from 15-17 October. Biometrics expert James Wayman, research administrator, San Jose University, US, chairs this year conference and there will be in the region of 50 expert speakers.

Topics will range from mobile biometrics, rapid DNA for forensic applications, voice veri-fication, automated border control, biometrics and social networking, standards and inter-operability, emerging biometrics, biometrics and payments, face, finger and iris biometrics, biometrics in the field – military applications, and government application of biometrics.

Keynote speakers are Rasa Karbauskaite, research officer, Frontex, Poland, who will discuss automated border controls and the future of border checks, and Andrew Hopkins, senior registration officer, UN High Commissioner for Refugees (UNHCR), Switzerland.

Speaker highlights include:Thomas Buss, business development executive and strategic advisor, Integrated Biometrics, USThe limitations of high quality certified fingerprint capture technology present barriers to addressing the constant need for smaller, lighter, faster, more robust and more affordable mobile devices.

Thomas Buss will discuss LES (light emit-ting sensor) technology from Integrated Biometrics and give examples of where it is being designed into emerging multimodal mobile and portable biometric platforms. He will explain how LES technology addresses barriers and set out applications for the use of LES technology based mobile platforms.

Hugh Carr-Archer, CEO, Aurora Computer Services Ltd, UK‘Biometric facial rec-ognition assisting with free flowing security checks’.

The International Air Transport Association (IATA)’s Global Passenger Survey, revealed that most travellers are receptive to the ideas of using biometrics during the border control process. By 2020 IATA envis-ages that a passenger will be able to flow through border checkpoints without inter-ruption unless advanced technology identifies a potential threat. Atkins and Aurora have been working with IATA in 2012–13 and are working together to improve the passenger process in Terminals 1 and 5 of Heathrow

airport. Since early 2012, the upgrade of Atkins Passenger Authentication Scanning System (PASS) to include Aurora’s Infrared Facial Recognition System has increased the certainty with which identification is made, improving security and the overall passenger experience at the airport.

In February 2013 Heathrow’s Terminal 1 passengers were invited to take part in a two-month self-boarding trial with South African Airways. This incorporated existing technology with an automated gate.

With the technology already at a level where it is accepted both at industry level and by the public, the next step is to incorporate biometric facial recognition into other scenarios where high security and/or regulated flow of large numbers of people is required; including but not restricted to border control.

Tim Godwin, managing diretor, Accenture Police Services, Accenture UK ‘From Old Bill to Biometrics Bill’.

Forever associated with the sleuthing genius and large magnify-ing glass of the fictional Sherlock Holmes, techniques such as fingerprinting captured from criminals or suspects have been used at scale since the 1980s. Now biometric solu-tions are reinventing policing—whether in investigations, or in custody, watchlisting, or surveillance matters.

Tim Godwin will discuss how maturing technologies are delivering the promises of the benefits of facial recognition and biometrics. He will look at where mobile, remote, and other biometric systems are aid-ing law enforcement agencies globally and present real world examples of biometrics in the management of prisoners in police custody and in the running of large events to ensure public safety.

Chuck Yort, VP and general manager, Identity Solutions, AOptix, USSmartphones provide an ideal platform to deploy biometrics sys-tems. Chuck Yort will address today’s wide-ranging needs for identity verification. Public safety and border management, national and civil identification programmes, humani-tarian aid and disaster relief, defence and healthcare all require some form of identity verification. These industries require highly portable, yet connected, computing capabil-

Page 3: Biometrics 2013 – the practical application of biometric technology

FEATURE

11September 2013 Biometric Technology Today

ity. They benefit from the familiarity of the smartphone, the vast array of available apps, and the ability to develop customised apps easily, to enhance and streamline the service to be delivered.

Following the recent introduction of AOptix Stratus, the first mobile identity solu-tion made for iPhone, Chuck Yort will share his perspective on how ‘smart mobile identity’ is poised to revolutionise biometric identity verification.

David Meehan, lecturer and researcher, College of Engineering & Built Environment, Dublin Institute of Technology, Ireland‘Safe and secure, here, there and everywhere’.

By 2015 it is predicted that there will be 25bn connected products and processes like smartphones and tablets using eGovernment systems, eHealth systems and law enforce-ment agencies. This is of grave concern when set against a projected world population of 7bn. It illustrates the need for a safe and secure Future Internet capable of allowing all to communicate without interference from cybercriminals and malicious intruders. David Meehan will present case studies of recent developments in the in the US where UCLA is collaborating with law enforcement agencies in Los Angeles using predictive ana-lytic techniques to forecast crime activity.

This presentation will also give the results of recent research and developments of biometric security systems in social welfare public servic-es to combat fraud, waste and duplication. It will discuss current research in the application of biometrics to securing the quality of food, one of Ireland’s and the EU’s greatest assets, as well as the distribution of food under the EU FEAD project to needy people.

Dr. James Cambier, VP and CTO, Iris Technology at Cross Match Technologies‘Mobile multi biometric solutions for military use’

Biometric capture and recognition devices have a number of military applications, including establishing the identity of enemy combatants, controlling access to facilities, and screening individuals seeking employment or other types of relationships with military units. Most if not all applications share a number of demanding requirements includ-ing portability; ability to operate in outdoor environments; resistance to moisture, dust, shock, and vibration; functionality to support on-board quality assessment, data storage and matching; and provision of very intuitive, eas-ily learned user interfaces. These devices must maintain high image quality in these demand-ing environments to ensure the best matching results.

In this presentation Dr. James Cambier will describe physical design features that impart ruggedness and environmental robust-ness to a device. He will cover technical top-ics pertinent to several of these requirements, in particular the capture of finger and iris images outdoors in direct sunlight, imple-mentation of iris quality metrics conformant to emerging quality standards, and design of a user interface that facilitates rapid iris image capture.

Other speakers include:

Joe Flyn, director, border and identity management services, Accenture, Ireland

‘To boldly go…where many travellers need to go’.

Simon Gordon, chairman and founder, FaceWatch Ltd, UK

‘Facewatch with Facematch: Coming to a store near you’.

Patrick Grother, computer scientist supervisor, National Institutes of Standards and Technology (NIST), US will present NIST’s latest results in face recognition.

Terry Hartmann, vice president security solutions & industry applications, Unisys, US.

‘Facial recognition – Where to now?’.

Laurence Lambert, product manager, Safran Morpho, France.

‘Biometrics on the fly: From dream to reality’.

James A Loudermilk II, senior level technologist, Federal Bureau of Investigation, US

‘FBI perspectives and initiatives: biometrics and Big Data analytics’.

Brian Lovell, research leader, Advanced Surveillance Group, University of Queensland, Australia

Tony Mercer, industry expert, UK‘Outsourcing government identity

services: An innovative, accessible and mobile solution’.

Mizan Rahman, founder and CEO, M2SYS Technology, US

‘How mobile biometrics is changing the landscape and the role of BYOD (bring your own device)’

Kris Ranganath, director, technology and solutions, NEC Corporation of America, US

‘Role of video analytics in Big Data solutions for public safety’.

Rames Sarwat Shaker, general manager, SmartAccess, Spain

‘Authenticating and signing documents with signature dynamics on smartphones and tablets’.

Daniel Thornhill, product manager, Validsoft UK

‘Voice verification finally coming of age?’.

Nick Whitehead, airports development manager, Atkins Ltd, UK

‘Biometric facial recognition assisting with free-flowing security check’.

Visit www.biometrics2013.com for further details of the event.


Recommended