Home
BYTE Newsletter
Keep up with all the BYTE News and Reviews

Subscribe
Boonsri Dickinson

Boonsri Dickinson

Associate Editor of BYTE

Mobile Device Biometrics: The Eyes Have It

Comments | Boonsri Dickinson, BYTE | December 10, 2012 08:00 AM

Category: Smartphones, Social Networking

With so much of our banking and interactions taking place on our mobile phones, we still live with a false sense of security because it doesn't take much for someone to hack our phones. By using more unique identifiers — biometrics such as eyes, rather than passwords — corporations and banks may have a more secure way to authenticate our identity.

EyeVerify makes biometric technology which uses eye vein patterns. CEO Toby Rush says "no one can pretend to be you with an eye print. Most eye verification technologies lack 'liveness' detection. With EyeVerify, you can't fake it with photos or videos. You have to stand in front of your camera on any smartphone."

EyeVerify implements a vein biometrics system that only requires software and the device's camera. It allows mobile users to authorize transactions and access secure information. Using the camera on the phone, the software can determine 4 ROIs (regions of interest) in your eye, sending a pass/fail and a confidence interval. If it passes, you are granted access to the application. If it fails, access is denied.

EyeVerify segments images to find regions of interest (ROI). There are 4 ROIs to segment (left and right side of each eye).

The technology came out of academic labs in 2005, after Dr. Reza Derakhshani, University of Missouri-Kansas City (UMKC), and Dr. Arun Ross, West Virginia University (WVU) had developed the technology to identify people by their eyes. Rush saw an opportunity to commercialize it and decided to license the researchers' patent that uses the blood vessels in the back of the eye. As Rush sees it, it's a way for companies to build services that allow their phones to be secure without adding any hardware requirements.

Even in a BYOD scenario people can use personal phones and have biometric access to access corporate documents, Rush said. He also sees applications in healthcare, where doctors and nurses or patients can access their records. Or in online education, it can let teachers know who is taking the test. Even in logging into social networks such as Facebook, it can authenticate who is online. With EyeVerify, banking applications and others can use the 'liveness' factor for authentication. By using the camera, the software can detect if there's a person there depending on the focus and exposure and white balance.

Banking in particular could benefit from a more secure system. Most people don't like to use mobile banking because they have security concerns, Rush said, and EyeVerify can give them the confidence they need.

As we live our lives more online, protecting our digital identify becomes that much more important. Rush said that in emerging markets such as Nigeria and Indonesia, identity is the biggest issue in combating fraud. Biometrics are not expensive, but have had false starts in the past. For instance, biometric technology that used the retina as verification never really took off. Airports are using the iris and the color of the eye, but that requires an expensive hardware component.

"We are looking at the whites of the eye. For corporate applications for authentication, the user would hold the camera away from the face, look left or right and EyeVerify would process it in a few seconds. The software would respond to calling application and either confirm or deny who you say you are. The entire process takes about 4 seconds.

Security researcher Dan Kaminsky said, "Biometrics have long been seen as a possible solution to the authentication crisis, as we're all enrolled merely by virtue of having bodies. The field has struggled, however, due to problems of deployment (you have to have readers everywhere), accuracy (it's surprising how little uniqueness there is in voices and faces), and security (you leak your biometrics everywhere you go). EyeVerify is interesting in that they're leveraging the ubiquity of cell phones with high resolution cameras to solve the problem of deploying readers, and that they're using one of the few biometrics that is in fact highly unique, and thus effectively discriminates between many users. That being said, like all biometrics, you expose your eyes frequently and in public."

Another eye verification company called Iris Guard allows customers to conduct banking or buy and pay with their eye, claiming to eliminate identity theft and fraud. Iris Guard uses an iris biometric camera, rather than the whites of the eyes. Even 24 Hour Fitness is using fingerprints to identify people to cut down fraud and to save money on printing plastic cards. While there's no such thing as absolute security, using more unique ways of identifying that you are who you say you are will get us that much closer to fail-safe security. And with the popularity of mobile phones and good cameras in them, EyeVerify may be a step in the right direction. In general, people don't like having to go through inconvenience to lock down their phones, so they will have to make sure the process of verifying your eye is quick and easy to use. EyeVerify says that their iPhone version is done, and is in beta. The Android application will be completed this month.

Kaminsky casts some doubt on Rush's claim that eye prints can't be faked: "Their pattern can be captured surreptitiously, and replayed forever with no possibility of revocation. But if the only people who have to worry about hacking you are those who can get within a very short distance away -- realistically, that's something of a win. Liveness checking never really works. But it doesn't matter -- if their accuracy is reasonable, they're useful. (It can't work because the pattern is static and effectively 2D. But seriously, they just need to try.) Interestingly, they're slightly worse off than fingerprints, as high resolution photos of your fingers are rarely published while eyes may very well be."

Boonsri Dickinson is the Associate Editor of BYTE



Related Reading


More Insights




Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

BYTE encourages readers to engage in spirited, healthy debate, including taking us to task. However, BYTE moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. BYTE further reserves the right to disable the profile of any commenter participating in said activities.

COMMENTS

Tune In to BYTE
Facebook Twitter LinkedIn Newsletter RSS
Whitepapers
whitepaper
In this paper you will learn the five trends shaping the future of enterprise mobility. Learn how the rise of social media as a business application, the lurring between work and home, the emergence of new mobile devices, the demand for tech savvy employees and changing expectations of corporate IT will fundamentally change the workplace.
whitepaper
In a survey of more than 1,700 information workers (iWorkers) in North America, notebooks, desktops, and smartphones were found to be “must-have” devices, while tablets, slates, and netbooks were relegated to “nice-to-have” status, according to a commissioned study conducted by Forrester Consulting on behalf of Dell and Intel.
Sponsored by: Dell
Upcoming Events


Oct 20: Becoming a Security Detective - Gathering and Analyzing Security Intelligence in the Enterprise

In this all-day virtual event, experts will offer detailed insight in how to collect security intelligence in the enterprise, and how to analyze and study it in order to efficiently identify new threats as well as low-and-slow attacks such as advanced persistent threats. Register today!

Platinum Sponsors: ArcSight, NetIQ, Proofpoint, Thawte
Gold Sponsor: Q1 Labs



October 6: InformationWeek 500 Virtual Event: The Need for Speed

At the 2011 InformationWeek 500 Virtual Conference, C-level executives from leading global companies will gather to discuss how their organizations are turbo-charging business execution and growth.

Platinum Sponsor: ArcSight, Workday
Gold Sponsor: IBM


Aug 25: InformationWeek & Dark Reading present: How Security Breaches Happen and What Your Organization Can Do About Them

Attendees will get insights on how to prevent breaches from happening, how to research and identify the source of a breach, and how to remediate a compromise as quickly and efficiently as possible.

Platinum Sponsor: ArcSight, NetIQ, Thawte
Gold Sponsors: Lumension, NetGear, GFI
Silver Sponsor: Motorola


July 28: InformationWeek & Symantec present: Infrastructure at Risk -- Taking Decisive Action to Secure Your Critical Data Assets

Join the editors of InformationWeek and leading security experts from Symantec for an in-depth look at the current threats faced by large and small organizations, and the implications for your business, your customers, and even your country. You'll hear how today's threat landscape is changing drastically, and learn the latest countermeasures and best practices to keep your company's precious data assets out of the hands of determined cybercriminals.


July 27: Electronic Health Records -- Moving from Concept to Reality

At this InformationWeek Healthcare Virtual Event, we will talk with healthcare practitioners, IT professionals and other industry experts about issues surrounding EHR selection, deployment and use.

Platinum Sponsor: HP, Intel, GBS, Geotrust, NextGen
Silver Sponsor: Proofpoint


On-Demand: InformationWeek & Interop present: Business Mobility Unleashed

In this virtual event, the leaders behind InformationWeek Business Technology Network and Interop zero in on the top mobile technologies and techniques you'll need to understand and master to ensure your organization thrives in the wireless world.
Platinum Sponsors: Alcatel-Lucent, APC
Gold Sponsor: HP
Silver Sponsor: Emerson Network Power
Bronze Sponsor: Skybot


On-Demand: Cybersecurity Best Practices

In this half-day virtual event, experts assess the state of cybersecurity in government and present the latest strategies for creating a more secure, attack-proof IT infrastructure. This event will help CISOs and other information assurance professionals in federal, state, and local government stay on top of the latest developments in the field.
Platinum Sponsor: GeoTrust
Gold Sponsor: Bit9


On-Demand: Data Center Transformation

Data centers are undergoing incredible transformations that create both opportunities and challenges for IT professionals. Server virtualization enables rapid provisioning, more efficient use of resources, and improved disaster recovery. That trend will continue with storage and network virtualization, allowing IT pros to further abstract -- and optimize -- data center resources.In this virtual event, you will learn how prepare your organization for a data center transformation.
Platinum Sponsors: AMD, APC, Cisco, Eaton, SunGard
Gold Sponsor: Emerson Network Power


On-Demand: Cloud Computing Roadmap: Controlling the Cloud - Managing, Optimizing and Integrating Cloud Services with Your Existing IT Infrastructure

In this virtual event, you'll learn how to craft your own strategy for successfully embracing and integrating new cloud computing capabilities without derailing or destroying your current IT roadmap.
Platinum Sponsors: ArcSight, GoToAssist, SunGard, thawte
Gold Sponsor: Symform
Silver Sponsor: Skybot


On-Demand: Plugging the Leaks -- Finding and Fixing the IT Security Holes in your Enterprise

In this virtual event presented by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.
Platinum Sponsors: NetIQ, Novell, thawte, Webroot
Gold Sponsors: ArcSight, Bit9, OpenText
Silver Sponsor: Application Security, Core Security, Lumension

 



The 2011 Informationweek 500 Conference will be held at the beautiful St. Regis Monarch Beach Resort, Dana Point, CA. Mark your calendars for September 11-13, 2011.



InformationWeek Healthcare IT Leadership Forum




Bank Systems & Technology Executive Summit 2011