Biometrics
Robert P. Jackson, P.E.
Course Outline
This course will examine in detail the subject of Biometric Technology including each of the fourteen (14) modes used today. We will examine the history of biometrics from inception to technology existing at the present time. We will discuss the course in a logical fashion moving through each section as follows:
INTRODUCTION
BIOMETRIC APPLICATIONS
BIOMETRIC SUITE
ADVANTAGES OF BIOMETRIC TECHNOLOGY
DISADVANTAGES OF BIOMETRIC TECHNOLOGY
SOCIAL AND LEGAL IMPLICATIONS OF BIOMETRIC TECHNOLOGY
HISTORY
GLOBAL USAGE OF BIOMETRICS AND FUTURE MARKETS
KEY VENDORS PROVIDING EQUIPMENT AND SERVICES TO MARKET
MARKET SEGMENTS BY MODE
PHYSICAL EQUIPMENT AVAILABLE
BIOMETRIC METHODOLOGIES
- FINGERPRINT
- SIGNATURE
- FACIAL RECOGNITION
- IRIS SCAN
- RETINA SCAN
- HAND GEOMETRY
- VEIN GEOMETRY
- FINGER GEOMETRY
- EAR FORM
- VOICE RECOGNITION
- DNA
- ODOR
- KEYBOARD STROKES
STANDARDS
APPENDIX
- GLOSSARY OF TERMS
- REFERENCES
This course includes
a multiple choice quiz at the end,
Learning Objective
From this six (6) hour course, the attendees should understand and be able to recognize the following points:
- The need for biometric technology in our digital world. This includes an understanding of theft and fraud prevalent today and associated costs of that fraud;
- Benefits derived from the technology;
- Disadvantages associated with use of the technology;
- “Real-world” uses for each mode of technology;
- The difference between unimodal and multimodal methodology;
- Recognition errors and vulnerable points associated with the technology;
- The fourteen (14) modes of identification possible with descriptive information detailing how each mode works to benefit safety and security;
- The seven (7) main areas where attacks can occur in a biometric system;
- An idea as to the physical equipment necessary to capture data;
- Relative costs for each mode;
- The chronological history of biometrics;
- An understanding of global markets and forecasts relative to overall usage;
- Percentage of revenues by classification;
- A brief list of vendors supplying products and services into the market;
- A complete glossary of terms relating to the field of biometrics;
- Biometric applications in today’s demanding world;
- An understanding of the vocabulary used relative to the technology itself;
- The social and legal implications relative to Biometric Technology. What can be accomplished and what areas to stay away from;
- Physical hardware needed for each Biometric mode;
- Existing standards used to define and govern the technology; and
- Standards governing control and use.
Intended Audience
Like most technologies, Biometrics has evolved over the decades with significant refinements to software and hardware occurring each year. Each year seems to bring a new possibility for application to existing problems. With those applications comes the need for federal and international standards governing the suitability for use. With this in mind, the following professions would greatly benefit from this course.
- IT professionals wishing to incorporate Biometrics into daily operations
- Security personnel responsible for entry and exit of sensitive areas
- Personnel responsible for securing sensitive data bases
- Owners of retail and commercial establishments seeking “best practices” relative to payments and cash flow
- Individuals responsible for data bases controlling inventory
- Managers responsible for
- Laboratories
- Storage of pharmaceuticals
- Government facilities where classified or confidential information is stored
- Research facilities
- Equipment rooms with high-dollar items in storage
- Managers with P&L responsibility considering options relative to added security
- Engineers and scientists wishing to add to their understanding of Biometric technology
- Lawyers and legal team supporting clients using Biometrics
- Library personnel needing to classify the various modes of Biometric technology
Benefit to Attendees
This six (6) hour course is intended to provide necessary information so participants will gain an understanding of the technology and its use. We go considerably further than the basics, thereby making it possible to gain knowledge facilitating informed conversations with vendors, hardware specialists and IT personnel within the profession. Biometrics is a rapidly growing technology with developments each year that greatly improve software and hardware needed for accurate identification. Also, each year brings additional uses for Biometric technology with hopes of lessening or even eliminating theft and fraud. In addition to the text, a complete glossary of terms will be provided to facilitate understanding of the vocabulary used on a day-to-day basis. The references provided will serve as material for further reading and knowledge.
Course Introduction
Biometrics may be a fairly new term to some individuals so it is entirely appropriate at this time to define the technology. This will lay the groundwork for the discussion to follow. According to the International Biometric Society:
“Biometrics is used to refer to the emerging field of technology devoted to identification of individuals using biological traits, such as those based on retinal or iris scanning, fingerprints, or face recognition.”
The terms “Biometrics” and “Biometry” have been used since early in the 20th century to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. (Statistical and mathematical are the operative words here.)
From the Free Dictionary we see the following definition:
- The statistical study of biological phenomena.
- The measurement of physical characteristics, such as fingerprints, DNA, or retinal patterns for use in verifying the identity of individuals.
- Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins and odor/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.
More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information.
The oldest biometric identifier is facial recognition. The dimensions, proportions and physical attributes of a person's face are unique and occur very early in infants. A child will (obviously) recognize a parent, a brother or sister. It is only since the advent of computers and accompanying software that the ability to quantify facial features has become possible.
The FBI has long been a leader in biometrics and has used various forms of biometric identification since the very earliest day. This Federal institution assumed responsibility for managing the national fingerprint collection in 1924. As you know, fingerprints vary from person to person (even identical twins have different prints) and don’t change over time. As a result, they are an effective way of identifying fugitives and helping to prove both guilt and innocence.
We will discuss fingerprints, as well as other modes of identification, later on in this course.
Course Content
The course content is in a PDF file:
Please click on the above underlined hypertext to view, download or print the document for your study. Because of the large file size, we recommend that you first save the file to your computer by right clicking the mouse and choosing "Save Target As ...", and then open the file in Adobe Acrobat Reader. If you still experience any difficulty in downloading or opening this file, you may need to close some applications or reboot your computer to free up some memory.
Course Summary
As you well know, digital usage and digital access allows for identity theft, fraud, theft of intellectual property, and downright theft from bank accounts, credit cards, and debit cards, etc. This has become rampant in our society. We hear of “hack attacks” every day with millions of Social Security numbers being compromised. I fear that what we hear is only the “tip of the iceberg” and there are many more instances of identity theft. Biometric technology is one possible solution to this horrible problem.
Also, there are areas within certain establishments that must be and remain secure. Entry and exit of personnel must be accounted for if safety and security are to be maintained. Nuclear power plants, DoD installations, NATO facilities, CDC laboratories, areas where inventory of illegal drug are seized, healthcare pharmaceutical storage areas, storage of weapons, assembly areas where weapons are produced, etc. all need protection from unlawful entry. The “street value” of certain drugs is in the millions and the possibility of theft must be avoided. Biometric technology is one possible solution to these problems.
Companies and institutions are beginning to realize that simple PIN numbers are no longer adequate when high security is required. In the best of situations, PIN numbers and passwords need to be changed every three (3) months to avoid issues with security. Some companies demand eighteen digit PIN numbers for entry. This is time consuming and tremendously cumbersome for users. A better system is needed.
In this course, we will discuss fourteen (14) biometric modes and how those may be applied to gain access to areas of interest and access to sensitive information.
Quiz
Once you finish studying the above course content, you need to take a quiz to obtain the PDH credits.
DISCLAIMER: The materials contained in the online course are not intended as a representation or warranty on the part of PDH Center or any other person/organization named herein. The materials are for general information only. They are not a substitute for competent professional advice. Application of this information to a specific project should be reviewed by a registered architect and/or professional engineer/surveyor. Anyone making use of the information set forth herein does so at their own risk and assumes any and all resulting liability arising therefrom.
