Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS

The evolution of biometrics on campus

Focus shifting from high security to convenience, speed

Zack Martin   ||   Mar 12, 2014  ||   , ,

There are also the high-security areas, where biometrics has long been used. Some campuses have labs that may store nuclear materials and the Department of Energy requires three-factor authentication for those facilities, says CBORD’s Lemley.

Also bolstering adoption is the increased reliability and accuracy of biometrics. “Biometrics is mature enough and you can get the speed you need with the reliability and low false rejection rates,” Pawlak says.

The algorithms that run the system are also faster, says Lemley. The systems can perform checks on larger databases quicker so students aren’t waiting for the system to respond.


Privacy and biometrics

Not storing an image but a template

It is a common refrain that biometrics are well received on campus because students are comfortable with new technology.

It also helps, however, to explain that systems aren’t storing images of a fingerprint, iris or other body part. Rather mathematical representations, or templates, are created and the actual image is never stored in the system. When an individual is enrolled into a biometric system–no matter the modality–the algorithm picks out a select number of points and then translates that into a mathematical template.

That information is typically encrypted and rechecked when a user attempts to authenticate to the system at the time of service delivery.

There are several advantages to using a biometric template instead of an image. For one, they are smaller in size and make it easier to store biometric information on a smart card or other memory-restricted system. Additionally, it ensures that an actual image could not be reverse-engineered from a compromised or stolen template.


Combating biometric spoofing

Spoofing is an attempt to defeat a biometric system through the introduction of fake biometric samples. Common spoofs include photos of face or iris, latent fingerprints, artificial fingers, and voice recordings. There are several categories of anti-spoofing approaches commonly used in biometric deployments.

Attended, supervised sample collection
By placing a human watcher at the point of biometric sample collection–such as a border control agent at an entry point–spoofing attempts can be made more complicated. In most cases, however, this is an unpractical and cost prohibitive approach.

Challenge and response procedures
With certain modalities, the specifics of the sample can be customized and changed at the collection point. Facial recognition systems can randomly ask for changes in face characteristics, for example smile and alter gaze or direction.

Liveness detection
Making sure a biometric sample is from a living, breathing human being is a key tool in the prevention of spoofing. Techniques for liveness detection vary from modality to modality and vendor to vendor. Iris and face vendors look for subtle, often involuntary movements that occur in human samples.

There are a number of different approaches fingerprint vendors take to ensure that the biometric is not coming from a plastic mold or other spoof. Some look below the surface of the skin to detect the presence of tissue, veins or other features. Others look for the naturally occurring pulsation, electric conductivity, radio waves, perspiration, heat or other byproducts of live tissue.


Iris biometrics: A primer

Iris biometric systems have typically been deployed in high-security environments, such as airports, data centers and border control areas. Early iris systems required the user to be just inches from the camera in order to authenticate.

The technology has since improved, enabling users to authenticate from as much as six feet away. These systems are deployed at airports across the Middle East to spot individuals who may not be welcome in certain countries. The technology is also catching on in the U.S. and other Western countries where military bases, corporate centers and government offices are utilizing iris for secure, convenient authentication.

One issue with iris has been it’s high cost, especially compared to fingerprint scanners. When comparing iris systems, with the greater distance comes increased cost. Typically, devices with shorter reach are less costly and thus more likely to be the choice of universities and convenience-focused applications.

Related Posts

Subscribe to our weekly newsletter

RECENT ARTICLES

AppleWatch presented to door access reader

Revolutionizing campus life: The future of higher education mobile credentials

By Willem Ryan, Alert Enterprise Campus activity may be dwindling down this time of year, but security threats aren’t going anywhere. There have been long-existing security gaps in the educational systems, allowing hackers and criminals to exploit them with ease. According to the U.S. Department of Education, there were 38,059 criminal offenses reported on more […]
Xavier University video screen with CampusIDNews Chat series
Apr 12, 24 /

Xavier University shows off card program and aux services during NACCU tour

In this episode of the CampusIDNews Chat series, we talk with Jennifer Paiotti, Associate Director, Business Operations, Auxiliary services, at Xavier University. At the 2024 NACCU Annual Conference, she will share her campus ID program, its ties to other auxiliary enterprises, and how they are moving to mobile-only with their campus credentials. Whether you are […]
dorm room door lock with key
Apr 10, 24 / ,

Allegion helps campuses eliminate brass keys with electronic access control

But What About the Keys?…An Interview with Allegion In a recent NACCU video interview, Allegion’s Jeff Koziol shared his vision for migrating campuses from brass keys to electronic locks. This will be the subject of his conference presentation at the upcoming NACCU Annual Conference. “Many students have never held a physical key,” says Koziol. “Yet […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Feb. 1 webinar explores how mobile ordering enhanced campus life, increased sales at UVA and Central Washington @Grubhub @CBORD

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2024 CampusIDNews. All rights reserved.