{"id":1407,"date":"2010-10-14T22:47:07","date_gmt":"2010-10-14T11:47:07","guid":{"rendered":"http:\/\/mingersoft.com\/blog\/?p=1407"},"modified":"2010-10-14T22:47:07","modified_gmt":"2010-10-14T11:47:07","slug":"biometrics-and-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/mingersoft.com\/blog\/2010\/10\/biometrics-and-multi-factor-authentication\/","title":{"rendered":"Biometrics and Multi-Factor Authentication"},"content":{"rendered":"<p>As computing power increases and bad guys are looking for ways to steal things like usernames and passwords, it&#8217;s natural that the technology industry has been looking for new ways to make it more difficult for unwanted parties to gain access to information and resources (such as personal finances).<\/p>\n<p>Today, <a title=\"Citibank to roll out voice biometrics | ZDNet\" href=\"http:\/\/www.zdnet.com.au\/citibank-to-roll-out-voice-biometrics-339306609.htm\" target=\"_blank\">Citibank made an announcement<\/a> that it will roll out voice biometrics over the next few months to a select group of customers for its telephone-based services. For the non-technical, this means that Citibank will capture a voiceprint for each customer that can uniquely and reliably identify one person from another (even identical twins in most cases).<\/p>\n<p>So why is biometrics a great solution in multi-factor authentication?<\/p>\n<p>Authentication that relies on &#8220;something you have&#8221; (like a username or password) can be considered weak as people can either guess or steal it without providing some sort of proof that they are genuinely you. Whilst stronger passwords may go some way to prevent casual or brute force guesses, authentication methods that rely solely on usernames and passwords are susceptible to these sorts of attacks.<\/p>\n<p>Multi-factor authentication introduces an additional means by which to prove your identity such as &#8220;something you own&#8221; and you may already be using something along these lines. For instance, many corporate VPNs provide a security token to its staff to use in conjunction with a username and a password. Unless an attacker has physical access to the token the chances of being able to break in are greatly diminished but not completely eliminated (as the chance for guessing the hash on the token correctly as well as the username and password still exists &#8211; albeit slim).<\/p>\n<p>This is where authentication against &#8220;something you are&#8221; or biometrics comes in.<\/p>\n<p>Things like a voiceprint and fingerprints go some way to prevent impersonation as an attacker can&#8217;t &#8220;guess them&#8221;. Either a person has exactly what is being sought for successful authentication or they don&#8217;t possess the \u00a0correct input. For all but the most determined hackers and criminals, this significantly increases your security.<\/p>\n<p>However, whilst guessing is out of the picture, emulation is another issue altogether. \u00a0For example, a voiceprint could be provided by means of a high quality audio recording of the targeted individual covertly captured at a prior time. In terms of fingerprints, play dough and cadaver fingers have been proven to work with a success rate of up to 90% on basic readers that don&#8217;t pay attention to other qualities of the provided input (such as moisture patterns, temperature, etc).<\/p>\n<p>By no means is biometric security a silver bullet but when used in conjunction with other means of authentication, such as a username or password or more modern methods such as security tokens, it does up the ante against traditional attacks that aren&#8217;t expecting anything more than the basics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As computing power increases and bad guys are looking for ways to steal things like usernames and passwords, it&#8217;s natural that the technology industry has been looking for new ways to make it more difficult for unwanted parties to gain access to information and resources (such as personal finances). Today, Citibank made an announcement that &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/mingersoft.com\/blog\/2010\/10\/biometrics-and-multi-factor-authentication\/\">Continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[979,78,248,205,18,980,249],"tags":[981,131,982,985,115,983,984,986,125],"class_list":["post-1407","post","type-post","status-publish","format-standard","hentry","category-biometrics","category-connectivity","category-secure","category-security-technology","category-technology","category-tokens","category-vpn-secure-connectivity-technology","tag-biometrics-2","tag-fingerprint","tag-multi-factor-authentication","tag-password","tag-security","tag-token","tag-username","tag-voiceprint","tag-vpn","item-wrap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/posts\/1407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/comments?post=1407"}],"version-history":[{"count":0,"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/posts\/1407\/revisions"}],"wp:attachment":[{"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/media?parent=1407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/categories?post=1407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/tags?post=1407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}