The next generation of Identity

September 1, 2006

Authentication methods

Filed under: Media, Events — Dick @ 9:44 am

Phil Becker wrote a post on Identity substitutes, tokens and proxies over at ZD Net. Here is the opening paragraph:

We frequently use proxies for identity when the real thing is difficult, inconvenient, or unnecessary to validate. This applies especially in the realm of authentication, as the only true identity based authentication technologies available are biometric. Everything else is an approximation of identity validation to some acceptable degree of risk or certainty. So we often authenticate the identity of one or more things and use the result as an identity proxy or substitute.

The rest of the post provides a day in the life of Adrian has he authenticates himself.

I take issue with Phil’s distinction that biometrics are the only true authentication technology. Biometrics are just harder to copy, and harder to lose. Someone can lift my fingerprint from the case of my laptop, create a facsimile and use that with the fingerprint reader. A fingerprint can actually less secure in some ways then a password. No authentication technology is 100%, just like nothing can be 100% secure. Adding multiple factors to authentication is how we increase certainty.

In Phil’s article he describes how Adrian has a car key that allows him seamless access to his auto. The car is not authenticating Adrian though, it is detecting someone with the key is nearby, and configures the car to the preferences the key holder has. That is why Adrian can give his key to a valet, and the valet can drive . The car does not care if it is Adrian or not.

Tags:
biometrics, identity management
  • Wed Sep 6, 2006 at 1:45 PM

    of identity validation to some acceptable degree of risk or certainty.” Dick Hardt takes issue with this:Someone can lift my fingerprint from the case of my laptop, create a facsimile and
    http://www.seanconvery.com/weblog/2006/09/06/...
  •  
    Wed Sep 6, 2006 at 1:49 PM
    Sean Convery
    • Sean Convery

    Couldn't find your traceback link, but here's a link to my post which relates to this discussion:

    http://www.seanconvery.com/weblog/2006/09/06/stirring-the-biometric-pot/

  •  
    Wed Oct 18, 2006 at 5:20 PM
    allan milgate
    • allan milgate

    Biometrics are better where you need non-repudiation (eg legal).
    But never use them on their own - they must be a two-factor solution (eg fingerprint and a password).
    You are on the rigth path when you mention risk, but the real answer is the assurtance framewor. See this:
    http://identityaccessman3.blogspot.com/

  •  
    Sat Oct 28, 2006 at 12:47 PM
    Michael
    • Michael

    There is actually a biometric which is unambiguously linked to someone's identity. There aren't yet scanners which are capable of identifying someone based on this, but my own view is that there will be within the next ten years.

    What is it? DNA.

    It is still possible to fake it - think Gattaca - but much much harder.

  •  
    Dick
    • Dick

    I consider biometrics to be something you have and not a catogry different such as something you are. When (and if) biometrics are heavily used, the market demand for faking biometrics will drive forgery technology.

Leave a comment

Powered by WordPress