Point/Counterpoint - Biometrics and the future of Advanced Authentication

Point/Counterpoint - Biometrics and the future of Advanced Authentication

Recently, I had the opportunity to sit down with Morey Haber, VP of Technology, BeyondTrust to discuss the future of biometrics and the role it played in advanced authentication techniques. While the general theme of the discussion is the role biometrics plays in an enterprise, we also touch on separating authentication from authorization, considerations of deploying a biometric solution, and new types of biometric-related authentication.

Part 1: Point/Counterpoint: The Current State and Future of Biometrics - Part One

Part 2: Point/Counterpoint: The Current State and Future of Biometrics - Part Two

Throughout Part 1, the term authorization is used in multiple places and on first glance, appears to be a misuse of the term. I fundamentally don't understand how biometrics could ever be considered authorization unless you are intermixing security and financial services terms. For example, authorization of a transaction is still and authentication process whereby I provide my identity for the purposes of non-repudiation/acknowledgement of the action. Further proof of identity through increased interaction (e.g. password and then biometrics) is still authentication. As the separation of authn and authz is integral to the article, could you please define the terms as you use them through? They seem to run counter to traditional definitions.

回复
Jerry Perullo

Cybersecurity Founder, Advisor, and Professor

9 年

Thanks John - as always. My daydream prediction is that we will have a huge breakthrough if and when we can find a "biometric trap door algorithm". In other words something biometric that can be shared like a public key and used to encrypt things in a way that only the "donor" can decrypt using a different biological attribute. Right now, everything is symmetric and just silly from a cryptographic perspective. Securing things with your retina or fingerprint means you have to expose that "symmetric key" directly to every new fly-by-night vendor you want to work with. If, on the other hand, you could speak a sentence and have your vocal pattern used to encrypt something that could only be decrypted by your unique sense of hearing, we would be onto something big.

回复

要查看或添加评论,请登录

John J. Masserini的更多文章

  • AT&T users - Don't Panic... yet

    AT&T users - Don't Panic... yet

    If you’re an AT&T user, you have no doubt heard today's news regarding the new data breach. Lots of scary potentials of…

    3 条评论
  • Evaluating the SentinelOne Acquisition of Attivo Networks

    Evaluating the SentinelOne Acquisition of Attivo Networks

    On Tuesday, we learned about what could be one of the most interesting mergers in quite some time. The announcement…

    7 条评论
  • Fahrenheit 451 – Security Research Edition

    Fahrenheit 451 – Security Research Edition

    In 1998, the US passed The Digital Millennium Copyright Act (DMCA) in an effort to enact several of the requirements of…

  • The Identity Catechism: Fifteen questions every CISO should ask about their Identity program

    The Identity Catechism: Fifteen questions every CISO should ask about their Identity program

    The evolution is underway. Our infrastructures are borderless, our critical data is cloud based, and our users work…

    2 条评论
  • A Contrarian View of the NIST Digital ID Standards

    A Contrarian View of the NIST Digital ID Standards

    Recently, while attending a conference in DC, I was part of a discussion around the new NIST Digital Identity…

    9 条评论
  • Why diversity matters

    Why diversity matters

    As I write this, it is the celebration of Alan Turing’s 106th birthday. As someone who wears their Geek Badge proudly…

    4 条评论
  • The Army Of Things

    The Army Of Things

    By now, you’re probably well aware of the fate recently befallen on the Brian Krebs site KrebsOnSecurity.com.

    2 条评论
  • The Little Green Devil - GODLESS has arrived

    The Little Green Devil - GODLESS has arrived

    Consider this if you will, that at the end of 2015, Google estimated there were 1.4 billion Android devices in use…

    1 条评论
  • The Best Security Control You Never Use

    The Best Security Control You Never Use

    Consider for a moment the business lines that drive your company's revenue. If the president of that business unit had…

  • A Perspective From The Outside

    A Perspective From The Outside

    Being someone who's spent the better part of his career in the greater NYC area, one tends to become acutely aware of…

    6 条评论

社区洞察

其他会员也浏览了