{"id":49713,"date":"2017-08-14T00:00:00","date_gmt":"2017-08-14T00:00:00","guid":{"rendered":"https:\/\/www.techopedia.com\/how-passive-biometrics-can-help-in-it-data-security\/"},"modified":"2023-08-29T13:57:42","modified_gmt":"2023-08-29T13:57:42","slug":"how-passive-biometrics-can-help-in-it-data-security","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/how-passive-biometrics-can-help-in-it-data-security\/2\/32557","title":{"rendered":"How Passive Biometrics Can Help in IT Data Security"},"content":{"rendered":"
At a time when conventional data security<\/a> measures are constrained by limitations like too much dependence on user discretion and user acceptance, passive biometrics can potentially offer a balance of security and user acceptance. Conventional security mechanisms like passwords<\/a> and SMS codes are only as strong as the user makes them. It has been found that many users tend to set weak passwords because it is easy to remember them.<\/p>\n That defeats the main purpose of password- or security-code-based mechanisms. Passive biometrics does not require the user to actively provide credentials<\/a>, passively collecting user data in forms such as of face, voice, and iris recognition techniques. Although passive biometrics as an IT security mechanism is still finding its niche, it is safe to say that it offers a nice balance of user convenience and data security.<\/p>\n To define biometrics<\/a>, the marketing director of the biometrics firm EyeVerify, Tinna Hung, explains, \u201cBiometrics rely on something you are, rather than something you know.\u201d<\/p>\n In the case of passive biometrics, one needs not actively take part in the verification or identification process, and sometimes the process does not even require notification of the user; the authentication<\/a> simply takes place during the course of normal user activities. In these cases, the subject isn\u2019t required to act directly or physically. When the system runs without even the knowledge of the user, it provides the highest level of authentication.<\/p>\n The technologically automated system basically measures the behavioral or physiological characteristics of a human being, with or without the user’s knowledge. To get a better idea of what passive biometrics entails, we can look at some comparative examples of this system to contrast with active biometric systems.<\/p>\n For example, any fingerprint or hand geometry technology would be considered active biometrics, as well as signature recognition and retina scanning. This is because the user must put their hand on or look into a scanning device for recognition. However, passive biometrics includes voice, facial, or iris recognition systems. (To learn more about biometrics, see New Advances in Biometrics: A More Secure Password<\/a>.)<\/p>\n An excellent explanation of how passive biometrics work is given by Ryan Wilk, the customer success director of NuData. In his words, \u201cWe\u2019re looking at how the user is actually interacting: how they\u2019re typing, how they\u2019re moving their mouse or phone, where they are using their phone, their accelerometer<\/a> readings. \u2026 As single data points unto themselves, they\u2019re not terribly useful, but when you start to bring them together and merge them into a profile of who that user is, you start to build out something that\u2019s really profound and really unique and something that\u2019s extremely difficult to spoof.\u201d<\/p>\n Passive biometrics provides the opportunity for organizations to verify the identity of their customers depending on their natural behaviors in technological interactions. The continuous process of this non-intrusive solution remains invisible to the users since it doesn\u2019t require any enrollment or permission to work in the background; it doesn’t ask the customers to perform any additional actions during their normal operations.<\/p>\n Real-time analysis of behavioral data provides accurate assessments to the companies for separating intruders from authentic clients. Since personally identifiable information<\/a> (PII) is not recorded, hackers<\/a> never get a hand on confidential data to interfere with user identification. Passive biometrics is a revolutionary advancement in the journey of identity verification, which has the ability to wipe out any chance of fraudulence from the core of the organization\u2019s authentication framework and can add a new level of confidence in the entire life cycle of the account.<\/p>\n Technology always gives birth to new systems and security barriers to protect the entire network from malicious activities. But can it prevent brilliant hackers and fraudsters from finding loopholes in the system forever? No. However, when they don\u2019t have any knowledge about an ongoing process, how will they be able to pass the verification test?<\/p>\n If they don\u2019t know about a background system, they won\u2019t take any precautions in the first place. This is where passive biometrics differs from other verification methodologies. And so the importance lies here too. No fraudulence can take place when the reason for using fraud is uprooted at the beginning.<\/p>\n The requirement for more sophisticated and satisfactory security systems has been rising in the air for a long time. The demand is now impelling security networks toward biometrics, especially passive technology, where the users don\u2019t need to be informed about the process of identification, depending on behavioral characteristics. (For more on the data used in passive biometrics, see How Big Data Can Secure User Authentication<\/a>.)<\/p>\n Hung explained, \u201cA well-implemented biometric solution will fit naturally into the regular flow of user behavior.\u201d Passive biometrics holds the key advantage of creating a profile of how the person is using the machine and not just a profile of the machine itself. As Wilk explains, the passive approach opens the book for understanding the user at \u201calmost a subconscious level.\u201d<\/p>\n Another passive approach, created by the company BioCatch, works by recording and analyzing the activities of the users that they don\u2019t even realize they\u2019re doing. Physical traits such as fingerprint measurement over a touch screen<\/a>, the active hand (left or right) using the mouse, or the tremor frequency of the user\u2019s hand holding the device provide an exact combination of data for acute identification of a unique customer.<\/p>\n Additionally, cognitive traits like the method of someone\u2019s web scrolling behavior (arrow keys, mouse wheel, page up and down, etc.) or the technique of holding the device (horizontal or vertical, the tilt angle of the device, etc.) also help to strengthen the authentication of the system.<\/p>\n According to Oren Kedem, the vice president of product management at BioCatch, they also use \u201cinvisible challenges\u201d for the users, where the operation shows a barely noticeable change in the normal behavior of the user. For example, the application might alter a few pixels of the cursor in a different direction or slightly change the speed of the page scroll to test the unique response of the users. Their responses to these incidents are incredibly unique which is impossible to replicate.<\/p>\n As Kedem says, \u201cWe don\u2019t just track what you do, we also influence what you do… We ask you a question without you being asked, and you give us an answer [without] you knowing. It\u2019s a secret that can\u2019t be stolen like a password or a token.\u201d<\/p>\n The system is programmed in such a way as to automatically detect and prevent keylogging<\/a> botnets that record and replay the movements of the target. This is because the imitation of a user response is next to impossible in the case of invisible challenges, which keep changing within the app.<\/p>\n Financial and banking services all over the world have started to rely on this new system. Biometric security providers like EyeVerify and Daon are collaborating with financial organizations. EyeVerify is working with Digital Insight to authenticate biometric security systems in mobile banking facilities, and they are about to launch their Eyeprint ID as a mobile app<\/a>.<\/p>\n In 2014, the biometric technology implemented by Daon secured 10.7 million users of USAA Federal Savings Bank in the process of a seamless mobile banking experience. In this case, USAA\u2019s lead security adviser Richard Davey commented, \u201cThe concerns arising from the ever-present threat of phishing<\/a>, malware<\/a>, and information exposure from outside [data] breaches<\/a> means that authentication and access controls<\/a> will always be threatened. Technologies like biometrics mitigate those threats while facilitating beautiful end-user experiences.\u201d<\/p>\n Passive voice biometric identity verification records a user’s enrollment by submitting a unique voiceprint through conversation during initial registration. This initial conversation requires being continued for 45 seconds to harness the recognized data. Then the recorded voiceprint identifies the user by comparing the next voiceprint obtained in the next conversation they make to the contact center.<\/p>\n This bank implemented the new security technology for their employees, and after that, in their market in San Antonio, Texas, followed by California, and eventually they launched it full scale in January 2015. The resulting response was outstanding. Three weeks after implementation, around 100,000 customers enrolled for biometric authentication, and within ten months, the number of responding customers increased to over one million.<\/p>\n A 90-day survey analysis performed by Nudata Security<\/a> in 2015 revealed a 112% growth in web attacks to get passwords and usernames, up from 2014. What is the cause behind the hackers gaining advancement over traditional security systems? Let\u2019s think about it a bit more thoroughly.<\/p>\n What we all do is compromise the strength of our passwords in order to remember them easily. Yes, here lies the culprit. There was a time when one person managed only two or three accounts online, and it was not too hard to remember critical passwords for a small number of cases. So the process was relevant to protect the person\u2019s identity at that time.<\/p>\n But now, the picture has significantly changed. We all hold a lot of accounts, so many that sometimes we can’t even keep track of them all. Now, is it possible to remember a password made up of random numbers, symbols, and letters for each and every account? Definitely not. So what we do is compromise the security precautions by keeping a pattern for all of our passwords with some known information, or we keep forgetting the random choices of strong passwords and then have to recover them all the time. This is why password managers<\/a> are gaining major traction in the field of password security.<\/p>\n Now, the indirect way of keeping a person\u2019s identity safe is providing a solution for both user satisfaction and security since we don\u2019t need to make any choice to keep our system safe and remember it. Hackers are also having trouble learning how to determine where the security system is implemented. Therefore, their previous ways of gaining access to others’ accounts are not working well anymore.<\/p>\n According to Grissen and Hung, biometric systems will not remain in the optional stage but will reign over the entire network of security systems on the issues of \u201csecurity versus convenience\u201d in the near future.<\/p>\n The technology is growing more accurate and is becoming easier to install into homegrown web and mobile applications. New algorithms<\/a> are in the works to implement additional telemetry for the augmentation of behavioral profiles like device orientation over a wide range of devices.<\/p>\n Consolidation between the SIEM<\/a> (security information and event management) and the UEBA<\/a> (user and entity behavior analytics) market segments is the future for growth in every aspect of businesses, as we can see in the case of the SIEM vendors, Splunk\u2019s acquisition of Caspida. They are planning for further avenues to provide a more effective experience to their customers in their SIEM implementations, adding the long history of existing data with that. The different forms of behavior analysis<\/a> are proving to be a mandatory addition to mitigate the security problem and win the long-term cold war against fraudsters.<\/p>\n In the end, we can say that the future is bringing a lot of hard times for fraudsters since they are going to be knocked down by the combined attack of knowledge verification and behavioral analysis in security procedures. In 2016, Deputy Treasury Secretary Sarah Bloom Raskin stated, \u201cSystem design is evolving to deal with the authentication challenge presented by stolen or easily compromised passwords: the next generation of online identity verification looks to combine what customers know and have, with what they do, or behavioral biometrics.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":" At a time when conventional data security measures are constrained by limitations like too much dependence on user discretion and user acceptance, passive biometrics can potentially offer a balance of security and user acceptance. Conventional security mechanisms like passwords and SMS codes are only as strong as the user makes them. It has been found […]<\/p>\n","protected":false},"author":7870,"featured_media":49714,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[548,600,586],"tags":[],"category_partsoff":[],"class_list":["post-49713","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-data-science","category-emerging-technology"],"acf":[],"yoast_head":"\nWhat Is Passive Biometrics?<\/span><\/h2>\n
How Passive Biometrics Work<\/span><\/h2>\n
Why Is It Important?<\/span><\/h2>\n
How Passive Biometrics Help Data Security<\/span><\/h2>\n
What’s Its Impact on Real-World Security Issues?<\/span><\/h2>\n
Are Traditional Methods Useful Anymore?<\/span><\/h2>\n
What Is the Future?<\/span><\/h2>\n
Conclusion<\/span><\/h2>\n