Biometrics and future trends in one sitting

August 2012 Calendar of Events, Financial (Industry)

Hi-Tech Security Solutions held its first invitation-only Executive Breakfast Seminar in July at Fairlawns in Johannesburg. The event was sponsored by Ideco and ADI.

The topic was the role of biometrics in the future of business, with speakers from Ideco, Risk Consultancy Network and ADI. Starting off, Clem Sunter presented the morning’s keynote. Sunter is a great speaker, he engages the audience from the word go and offers revealing insights into the potential future of the world and South Africa.

Clem  Sunter
Clem Sunter

The accuracy in the science, or art of assigning probabilities to scenarios is something people differ on, but we need something to be able to make a judgement call when assessing probably outcomes. So while Sunter presented his scenarios as well as the probabilities of them occurring, he stressed that scenario probabilities are not an exact science, yet.

An additional caveat is that scenarios change, sometimes rapidly and the probabilities presented in July might be different as you read this.

On the global front Sunter offered a few future global scenarios with two holding the best probability of happening. The first of these Sunter called Hard Times, in which the world is looking at five to 10 years of low growth, in other words, a flat economy. This is bad news for everyone, but he noted that if you can offer value for money and innovation in this environment, your business can still thrive. Sunter says the Hard Times scenario has been assigned a probability of 40%.

The second option he called Ultra-Violet, or UV. In this world we will see a distinct difference between the old economies and the new. Old economies will grow slowly – the U-curve in economic performance. The new economies will grow at three-times the rate of the old and change the structure and power players of the world we have become used to. This scenario is a bonus for the emerging markets, assuming governance and drive to support entrepreneurs is present from governments. The possibility of Ultra-Violet happening is very dependent on whether China keeps growing and is assessed at a 30% probability.

Among other probabilities, the chance of a double-dip recession was set at 20%.

Local is nervous

On the South African front, Sunter offered three scenarios. The first sees the country remain in the top 59 nations of the world. The threat to this scenario is that policy uncertainty deters foreign investment, which would see the second scenario happen, in which South Africa joins the bulk of Third World countries, poor but peaceful, as foreign investment flees and tax revenue declines. In this reality, BRICS is likely to become BRINC, where Nigeria outplays South Africa and makes new friends.

If you add violence to the above, the third scenario of unpredictability and violence becomes a reality, something we do not want. Sadly this scenario’s probability has risen from 0% a year ago to 10%. The first scenario has fallen from a 70% to a 50% probability. The second scenario is ranked at 40%.

Among the issues that will make or break South Africa is that of land distribution in which land invasions and the confiscation of farms without recompense is a major factor, along with issues such as nationalisation and violence.

After a brief question and answer session, Sunter’s book on the fox trilogy quickly sold out. More information on Sunter, scenario planning, his take on future scenarios and his books is available at http://www.mindofafox.com.

Integrated identity management

The biometric-focused presentations followed breakfast. Below is a brief overview of some of the information delivered by the presenters. Marius Coetzee from Ideco kicked things off with a presentation on integrated identity management.

Marius Coetzee
Marius Coetzee

Coetzee highlighted the core problem in many of today’s fraud scenarios as that of identity. People can easily commit a crime by ‘borrowing’ a card, password or PIN (CPP), or even duplicating cards with ease – as many consumers have found to their dismay. Using systems like these that allow for fraud to be committed with ease results in losses running into billions globally.

The problem with CPP is that while the credentials offered are correct and mostly authorised to conduct transactions, there is an identity gap between validating the credentials and the actual identity of the individual using them. If you enter a password, you are simply verifying that you have entered the correct password, not the identity of the person who is supposed to be associated with that password.

Biometric technology overcomes this because the identity of the person is inextricably linked to the biometric. For example, using fingerprint biometrics will ensure that only the appropriate person gains access to the relevant places, data or applications. Coetzee admits that even as little as five years ago it was possible to fool a biometrics system, but the leaders on the field have advanced technology to the extent that are far more reliable than CPP solutions today.

The drive to biometrics is being led by governments around the world. In India, for example, the government has embarked on a process to biometrically identify all its 1 billion citizens.

Of the many biometric technologies available, fingerprint technology has gained over 60% of the market, with facial and iris recognition taking second and third spot. In South African courts, the only biometrics accepted are fingerprints, facial and signature.

Figure 1 shows the various biometric technologies available and their place on the technology maturity curve.

Figure 1
Figure 1

Coetzee went on to explain how fingerprint biometrics readers work and what part of the individual’s fingerprints make these prints unique. He also touched on the importance of proving your selected biometric technology effectively, as many products cannot live up to their promises.

Furthermore, Coetzee stressed that biometrics is not simply another security technology to add to your list. When correctly planned and implemented, it integrates with far more than time and attendance software and can deliver measurable business value. See Figure 2 (The evolution of identity control).

Figure 2: The evolution of identity control
Figure 2: The evolution of identity control

Coetzee also introduced Ideco’s GreenBox, which hogged the attention of attendees in the exhibition environment after the event. The GreenBox in a nutshell offers:

* Multifunction input device.

* Integrated FICA/RICA station.

* Enables paperless transaction.

* Document process automation.

* Fast system integration.

* Small desktop footprint.

* No storage of paper records.

* USB Powered.

Where to with biometrics

The next speaker was Dave Casey form Risk Consultancy Network. As a consultant, Casey looks at what was happening in the biometrics market from different angles. To start, he mentioned a few of the normal objections to using biometrics. These included:

* Security is a grudge purchase – biometrics is expensive.

* Acceptance of the technology has been slow based on ignorance, concerns about privacy and secure data storage.

* Biometrics is slow – cards are quicker.

* Cannot justify the cost verses the benefits.

* Biometrics can be compromised.

* Resistance from unions.

* Biometrics is not 100% accurate.

* Has not worked in the past.

Dave Casey
Dave Casey

While all these issues are valid, Casey adds that they have all been dealt with to certain extents over the past few years. Of course, if you opt for the cheapest piece of technology available, you are sure to run into trouble, but that applies to whether you are buying a biometric reader, a car or basically any product.

Discussing biometrics being used for authentication, Casey says it is the preferred option for accurate and reliable data and application access, especially in the financial industry. When used in conjunction with other measures it offers optimal security for high-risk facilities and dramatically reduces the risk of identity theft.

However, he warns that companies looking at biometrics cannot simply buy what sounds like a good deal. “Do not believe the specs written on the box,” he advises. Do your own proof of concept as it pertains to your environment. The technologies are evolving and improving all the time, what did not work in 2005 will almost certainly succeed now.

Casey also touched on the reason for the slow uptake of biometric solutions in business. Basically, the blame can be placed in the hands of everyone. For one, consultants that fail to advise clients on the right solutions because they do not have a solid understanding of the technology and its capabilities in the real world and fail to balance the key variables of accuracy, quality, reliability, speed of performance and cost.

Secondly, installers also get the blame because they are driven by a profit motive and push the wrong technology just to make a sale. Clients who do not take the time to educate themselves are also asking for problems as they can easily be swayed by these installers and consultants.

Vendors also get the blame because they claim their systems can deliver specific performance, not mentioning that the performance was tested in a lab in perfect conditions. When you add real-world conditions, imperfect lighting and dirty workers to the mix, the products fail. Again, Casey strongly advises companies to run their own proof of concept exercises in their specific environments.

Then there are social factors against biometrics as well as innumerable YouTube videos showing how badly biometrics perform – not mentioning that the technology in these videos is five or even 10 years old.

As a consultant, Casey is not beholden to biometrics companies and notes that Frost and Sullivan expects the biometrics market to grow from $4,5 billion in 2010 to $14,7 billion in 2019. “Biometrics is fantastic technology and is here to stay. It is improving every day and will form part of more and more applications as time goes by.”

And for those on the forefront of technology, Casey says the latest biometric to come out of the labs is based on the human tongue. It will be interesting to see what readers they develop for tongue prints.

Biometric trends within system integration

The final speaker was Gordon Moore from ADI Global Distribution. He looked at the impact of biometrics today and where it would be going in future, before delving into real-world case studies showing the value added by integrating biometrics into business applications.

Gordon Moore
Gordon Moore

Biometrics is gaining traction in our daily lives (if somewhat slower than in business and government) in numerous ways. We can see the technology appearing in the form of biometric locks for homes, biometric safes and even in luxury cars. Moreover, medical aids are looking at using biometrics to curb the massive fraud they face, as are hospitals focused on improved patient care and preventing the theft of babies. Some smartcards have biometric details embedded in them, as the new South African identity card will have, should it ever see the light of day.

An important new entrant into the identity market is near-field communications (NFC) which will allow people to use their smartphones as a means to identify themselves and transact. Of course, people will need to verify that the cellphones they are using are theirs and they have the authority to conduct transactions. This will initially be handled via PINs, but we have already seen some phones with biometric fingerprint and even facial recognition attached.

In the business world, and specifically in the industrial and mining sectors, the focus on the Hi-Tech Security Solutions Executive Breakfast, biometrics is growing rapidly in areas such as access control and time and attendance. However, Moore says we are also starting to see it in areas such as visitor management, employee verification and outsourced labour management.

Furthermore, Moore says that in the health and safety field, biometrics is proving its worth in areas such as restricting access to specific areas that require specific skills, such as heavy machinery and vehicle operations. Using biometrics ensures that only people with the correct training can access and use certain equipment.

An example Moore presented of integrating biometrics into current business processes in the logistics environment grabbed people’s attention. In this simplified version of the case study, biometrics was used for:

* The validation of orders,

* Use of a forklift via a biometric starter,

* Picking the stock via a biometric-enabled wireless hand held scanner,

* The validation of delivery/receipt, and

* The generation of an audit trail of the process, which can be linked to a time-synchronised video trail using security cameras.

Moore also gave an example of the savings a company would attain by using biometrics merely as a time and attendance technology. A spreadsheet of the example can be seen in Figure 3.

Moore then offered a brief introduction to the use of biometrics in the convergence of physical and logical security operations. He demonstrated how integrating biometrics into your current processes will not only improve security, but also reduce the administration of what are currently independent silos of identity control within an organisation. In terms of finances, this integration will also prevent fraud as people will not be able to claim that someone used their passwords or stole their cards, or in this case, stole their fingerprints.

The day ended with a demonstration of a few biometric technologies, including Ideco’s GreenBox, which kept many attendees occupied long after the event’s close.

Hi-Tech Security Solutions would like to thank all our speakers and those people who made the time to attend.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What to do in the face of growing ransomware attacks
Technews Publishing Cyber Security Security Services & Risk Management
Ransomware attacks are proliferating, with attackers becoming more sophisticated and aggressive, and often hitting the same victims more than once, in more than one way.

Read more...
Texecom launches the Midnight Black Collection
Technews Publishing Perimeter Security, Alarms & Intruder Detection Products
Working in harmony with darker environments, the Midnight Black Collection has been created for businesses and sites that require or prefer a security solution which offers discreet protection that compliments their surroundings.

Read more...
SAN market set for growth
Technews Publishing News IT infrastructure
Storage-area network (SAN) market to hit US$ 26,86 billion in revenue by the end of 2029 due to factors like widespread adoption of Hybrid SAN-NAS solutions.

Read more...
Optimising remote technical support
Technews Publishing Asset Management, EAS, RFID Products
Sanden Intercool Kenya improves efficiency, removes manual processes with FIELDForce from MACmobile, making its technical backup and support staff more productive, while also optimising record keeping.

Read more...
Free-to-use solar score for South African homes
Technews Publishing Editor's Choice
The LookSee Solar Score is one of the first of its kind to provide insight into the potential of solar power for South Africa’s residential properties.

Read more...
CA Southern Africa unmasks container security
Technews Publishing IT infrastructure Cyber Security
Adoption of software containers has risen dramatically as more organisations realise the benefits of this virtualised technology.

Read more...
Gallagher to showcase new Controller 7000 single door
Technews Publishing Access Control & Identity Management Products
Gallagher will be showcasing its latest access control innovation, the Controller 7000 Single Door on its stand at Intersec Dubai from 17-19 January 2023.

Read more...
Fast, reliable and secure cloud services
Technews Publishing Editor's Choice Cyber Security IT infrastructure
Security and speed are critical components of today’s cloud-based services infrastructure. Cloudflare offers a range of services supporting these goals beyond what most people think it does.

Read more...
Healthcare and the edge
Technews Publishing Healthcare (Industry)
With the proliferation of IoT devices in healthcare, more data is generated which drives the need to distribute it efficiently and keep it closer to the user.

Read more...
Sasol ensures Zero Trust for SAP financials with bioLock
Technews Publishing Editor's Choice Cyber Security Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.

Read more...