recommended reading

Get Ready for a New Wave of Biometrics

ktsdesign/Shutterstock.com

By now, it's common knowledge that passwords are flawed. In April, the Heartbleed bug forced users to reset passwords across hundreds of thousands of websites. The celebrity photos stolen in September were, according to Apple, accessed through a "targeted attack on user names, passwords and security questions." And just this week, a thread on Reddit revealed hundreds of passwords for Dropbox accounts had been compromised.

Some of these hacks were more consequential than others—Dropbox released a statement Tuesday saying most of the passwords posted were expired anyway—but if anything can benefit from this year's seemingly never-ending security breaches, it's the field of biometrics.

Digital biometrics—using people's fingerprints, voices, and faces to unlock devices instead of using memorized passcodes—aren't anything new. They've been around since the first iris recognition algorithm was patented in 1994, and they gained significant traction post 9/11. What is new is the timing: The rapid demise of the conventional password in this year alone means digital biometrics can be "cool" again.

After all, when the use of biometrics first became widespread, the field had "a faint whiff of the future about it," Tim De Chant wrote in a report for PBSlast year. But instead, as devices entered smartphones and tablets and even immigration checkpoints, the technology grew "sufficiently advanced to be almost unremarkable."

That perception can change, thanks to a renewed, more optimistic consumer base.

Just look at the results of Google's Mobile Voice Study, published Tuesday. In it, the 1000 adults and 400 teens surveyed about their use of hands-free voice functions like Google Now, Apple's Siri, and Microsoft's Cortana, were asked why they spoke to their smartphones when they did. In response, the overwhelming majority checked off answers for "It's cool," "It's the Future," and—most important—"It's safer."


Why People Use Voice Search

Teens' responses are in yellow; adults' are in blue. (Google/Northstar Research)

"Safer" could mean a slew of things—"It's hard to say exactly how respondents interpret the questions in surveys like these," a spokesperson for Google tells me—but for instance, users could find it easier to talk to their phones instead of inputting tactile commands while driving. The more people struggle to type on their phones, the more likely they'll hit the wrong buttons. That idea can be applied to hands-free identification: Instead of entering passcodes others can glimpse on screen, people could use their unique voices to unlock phones.

No, the voice study didn't take into account voice-activated passwords—that's a "separate area," the spokesperson says—but the responses show a clear interest in both age groups toward using biometrics for its "cool" factor, even if that interest isn't specifically for security purposes. In fact, 56 percent of the adults surveyed said using the tool made them "feel tech savvy," and most respondents—85 percent of adults, 89 percent of teens—agreed that voice search would become "very common" in the future.

It's clear biometrics doesn't have to get any flashier than it is—the current mood is already in favor of it.

That doesn't mean major tech companies don't have to fix technical problems. Siri, for example, had failed to recognize certain accents when it launched, and even in the iOS 7, had encountered a password security flaw where users could pull the software up to access information stored in the phone without entering a passcode. And Apple's foray into biometrics, the Touch ID sensor that first came with the iPhone 5S, still doesn't quite work the way it should.

But it is the right time for the next wave of biometrics to come into play, a wave that's already begun, with devices available that use iris identification, for example, and with the onslaught of smartwatches from Apple and Google. Making biometrics cool again would attract users, which would in turn attract research into improved biometrics—possibly making it the first step to ultimately killing the vulnerable password. And that would be ice cold.

(Image via ktsdesign/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.