Market report for cloud biometrics for financial authentication

Cloud Biometrics Use to Soar in Two Years: Report (Infosecurity Magazine)

“Over half a billion customers worldwide will be using cloud-based biometrics to securely authenticate with their banks within two years, according to a new analyst report.

London-based Goode Intelligence’s Biometrics for Banking report details what might happen to the market over the next five years.

It claims that by the end of 2020, 1.9 billion bank customers will be using biometrics to: withdraw cash from ATMs, prove their identity over the phone, access banking services through smart devices and more. Sometimes a combination of biometrics will be needed, for example to initiative a transfer of funds from a web-based interface.”

We’re also seeing a lot of activity on this front and adoption of our IdentiTrac Web API.

Eric Schmidt at HiMSS and comments from Craig Workinger

A final update from Craig at the HiMSS…

Eric Schmidt, the former executive chairman of Alphabet, delivered a bold vision of the future of health care and technology at HiMMS, urging participants to go immediately to the cloud.

The cloud, he notes, can take in—and provide security for—the large amounts of data being generated from the growing number of new mobile apps and sensors, then integrate and structure this data into an information flow to support the clinician sitting in front of a patient. Through an earbud or mobile phone, the clinician can access potentially life-saving guidance.

But Eric’s comments underscore the big challenge facing the next generation of EHR (Electronic Health Records). EHR has a growing, vast flow of potentially valuable data from broad array of devices and apps. What’s lacking is the means to store it and validate its sources.

Identity authentication across platforms and devices is thus crucial to the next generation of EHR. To be usable, all that data must be tied unequivocally to the individual in front of the clinician. In turn, that means having an integrated, holistic approach to managing identity across all the platforms, apps and sensors.

Biometrics + Cryptography

Keeping your passwords safely in the palm of your hand (electropages)

…[C]ontactless palm vein recognition technology is nothing new and was first demonstrated back in 2002 and is widely used. It works by extracting feature data from biometric data. With previous technologies, confidential data was encrypted with this feature data, but when decrypting, the feature data extracted from biometric data would usually be matched with the encrypted data. This does not present a problem when used in a personal device, such as a laptop or smartphone, but when used via an open network such as in the cloud, a more secure decryption technology is necessary to prevent leaks of biometric data.

The article discusses encryption within biometric templates using Fujitsu’s palm vein technology, but the idea would seem to be applicable across biometric modalities.

ID management in the cloud

Biometric Cloud-Based Offers Attractive Deployment (Engadget)

Cloud-based biometric technology offers attractive deployment possibilities, such as smart spaces, ambient intelligence environments, access control applications, mobile application, and alike. While traditional (locally deployed) technology has been around for some time now, cloud-based biometric recognition technology is relatively new. There are, however, a number of existing solutions already on the market…

Bigger, Faster, Cheaper

As databases get bigger, they take longer to search. For a while, and in many applications, nobody really cares. Does it really matter if a criminal database fingerprint search takes one second or 1.5 seconds? A city of 1.5 million people may arrest 40 people on a busy day. In cases like this, the limiting factor to how many times a process can be repeated isn’t in the technology.

But if the world is headed the way many expect, biometric searches of large databases will be moving from applications where fractions of a second don’t matter much, as in the case above, to something that looks a lot more like what banks or large web sites do: handle thousands of transactions per hour among thousands of users with both the quantity of transactions and users fluctuating wildly over the course of a day, and generally increasing over time. Now, how the search happens starts to matter a lot and technique starts to affect cost.

In the biometrics world, sensor and algorithm innovation get a lot of attention. Database architecture and search techniques don’t. This press release from BIO-key is a refreshing change highlighting one technique programmers can use to cope with ever-larger biometric databases.

Accelerated Biometric Indexing Search: New Fingerprint Matcher Design Yields Higher Accuracy at Higher Speeds per Dollar Invested (Press Release via pr-inside.com)

“Using Commercial-Off-The-Shelf (COTS) products, BIO-key is expanding the way a biometric search can be performed which dramatically improves speed over conventional approaches. This revolution comes from the use of a highly parallel search architecture, allowing our solutions to perform faster and look deeper while improving speed and accuracy,” stated Renat Zhdanov, PhD, Vice President, Chief Scientist, BIO-key International.

Initial tests of the new accelerated architecture show speed results of several millions matches per second, on a typical PC. This provides biometric search acceleration of several orders of magnitude on that PC alone. “These performance gains mean the required hardware and support costs for larger systems, or those heavily used in the Cloud from mobile devices or other sources, can now be greatly reduced, providing for thousands of times more throughput per dollar spent,” stated Mira LaCous, Senior VP of Technology and Development, BIO-key International.

The US Army’s big data cloud app suite

Army demonstrates disputed intelligence system (Army Times)

“It is globally deployed, this is not a system that is in the lab, this is a system that is supporting and has supported nine corps, 38 divisions, 138 brigades,” said Lt. Gen. Mary Legere, the the Army’s deputy chief of staff for intelligence. “It supports today our operations in Afghanistan and the greater Middle East, Africa, the Pacific, Korea and anywhere you have soldiers who are deployed.”

The Army’s cloud-based system — called the Distributed Common Ground System-Army — collects raw intelligence, surveillance and reconnaissance data from 600 sources, including battlefield reports, biometrics databases, unmanned aerial systems and manned reconnaissance aircraft, as well as joint, national and strategic sources. From there, analysts can connect the dots using a variety of software tools, putting actionable intelligence in the hands of battlefield commanders.

Forty apps using data from 600 sources.

Biometric authentication for cloud storage

Intel’s McAfee brings biometric authentication to cloud storage (Computer World UK)

Intel is introducing new ideas to secure the public cloud, offering a service in which online files can be accessed after users are verified by an authentication scheme including face and voice recognition.

McAfee, a unit of Intel, is adding a product called LiveSafe that will offer 1GB of online storage that can be accessed through biometric authentication. LiveSafe has a Web-based management dashboard, and users can be authenticated through face recognition, voice or by punching in a PIN. LiveSafe also includes antivirus and other security features.

In a Cloud-Connected IT World, are Biometrics the Answer?

For your eyes only: New twist on Digital ID could keep you from getting hacked (ZDNet)

With so many individuals with multiple accounts on so many linked cloud services, it is inevitable that this sort of cybercrime is going to become more commonplace unless new mechanisms are put into place to prevent this form of compromise that Honan experienced.

One way of dealing with this would be to employ biometrics on all computing devices. I wrote about this at length in February 2011, which eventually led to an appearance on CBC Radio alongside prominent independent security researcher Dr. Markus Jakobsson.