Security & Hygiene

The history of biometrics

The history of biometrics

Early origins Biometric technology has become entwined with our everyday lives, from facial and fingerprint recognition on our mobile phones, to passing through airport security when we travel. But did you know that the biometric technology used across the globe today can be traced back thousands of years? In this blog, we’ll explore the history of biometrics from its early developments, to now. While the term ‘biometrics’ doesn’t appear until the 1880’s, there is evidence that early humans used physical characteristics to verify a person\’s identity as early as 6000 B.C. This first known reference was a prehistoric hand with ridge patterns discovered in Nova Scotia.  Fast-forward to 500 B.C, where we find evidence that humans used biometrics for identification, signing legal documents and business transactions. This has been apparent in civilisations across the earth, including the ancient Assyrians, Japanese, Babylonians and Chinese. Explorer Joao de Barros recorded that an early form of fingerprinting was being used by merchants in China. There were stamping children’s hand and foot prints on paper with ink to identify them. In Babylon, clay tablets with fingerprints were discovered that had been used in business transactions. So, how did we develop from using biometrics as a rough method of classification, to an advanced technology with wide-ranging applications that we recognise today? Early developments: 1800 – 1900 By the time we reach the 1800’s, human population growth had exploded following the industrial revolution and as cities expanded, the need to better identify people was a pressing issue. Local knowledge was no longer sufficient to keep criminal activity under control and this drove innovation during this period. 1823: The first ever system for classification of fingerprints is proposed by Czech physiologist and Professor of Anatomy,  Johannes Evangelista. 1858: British officer Sir William Herschel began using handprints for those signing documents at the Indian Magistrate\’s Office in Jangipur. He then moved from hand prints to prints of the right index and middle fingers. This was to identify who were real employees on payday. 1881: Parisian policeman, Alphonse Bertillion developed techniques to measure individual features in an attempt to identify repeat offenders who would use different aliases each time they were arrested. He recorded eye colour, shape and angle of the ears, brow and nose as well as identifying any tattoos. By 1884 he had successfully identified 241 repeat offenders using this system which became known as ‘Bertillonage.’ 1892: Argentinian police official, Juan Vucetich created his own fingerprint identification system, pioneering the first use of fingerprint evidence in a murder case. 1892: Sir Francis Galton wrote a detailed study where he presented a new fingerprint classification system that included prints from all ten fingers. This system is still in use today, often referred to as Galton’s details. 20th century breakthroughs:  1900 – 1999 The 1990’s saw the use of biometrics boom, with major breakthroughs including the use of iris pattern identification as well as the birth of facial recognition. 1903: The New York Civil Service Commission started fingerprinting applicants to prevent fraud. The New York state prison adopted the practice to identify criminals. 1936: Frank Burch proposed the idea of using iris patterns as a method of identification. 1964-1966: Woodrow W. Bledsoe researched programming computers to detect human faces. He then developed the first semi-automatic facial recognition system. 1969: The FBI starts funding research into the development of automated fingerprint and facial recognition. This funding helped develop much more sophisticated sensors for biometric capture. 1974: The first commercial hand geometry recognition systems became available to manage things like time and attendance, to identify employees and for physical access control. 1996: In Atlanta, USA, the Olympic Games used hand geometry systems for secure access to the Olympic Village with 65,000 people enrolled. By the early 2000’s, biometric technology had become more efficient, more socially accepted and the solutions were no longer used exclusively by government and large corporations. The biometric boom: 2000 – 2022 2001: The Super Bowl in Tampa, Florida had a facial recognition system installed in an attempt to identify ‘wanted’ individuals in the stadium. 2003: The US Government’s National Science & Technology Council initiated a Subcommittee on Biometrics responsible for research, development, policy and international collaboration of biometric systems. 2008: Google enabled voice search in BlackBerry mobile version of Google Maps. 2010: US National Security used biometrics to identify a terrorist who took part in the planning of 9/11. 2011: Biometric facial  identification is used by the CIA to identify the body of Osama bin Laden. 2013: Apple launched ‘touch id’  fingerprint scanners on Iphones 2018: The first MasterCard biometric card was released combining chip technology and fingerprints to verify purchases. The future of biometrics From looking back at the history of biometrics, we can see that the technology has come a long way since the first humans left their prints on cave walls. Biometric identification technology has made rapid advances in the last few years alone.  A 2020 study found that facial recognition technology is as accurate as 99.97%. Governments across the world are adopting new biometric solutions for law enforcement, border patrol and developing countries are starting to close the identity gap with new identification technology in place. With the global biometrics market projected to reach $45 billion by 2027, innovation of these technologies is only likely to continue to skyrocket and where we stand now will also become a small step in the history of biometrics. At Arana Security, we always make sure we stay up to date with the latest developments in biometrics. Find out more about our products, from CCTV solutions, Biometric ID and Access Control to ANPR and Payment Card Solutions. 

The history of biometrics Read More »

biometric access control in venues

How We Can Help UK Hospitality Venues Re-open Safely

With the UK on track to lift lockdown restrictions from this month, it’s still essential to maintain processes and procedures that will keep both staff and customers safe as venues reopen, and people begin to venture out. Using a contactless system is the obvious way to go forward as it will reduce the contact required between staff and consumers and reduce the common touchpoint areas that may facilitate the spreading of the virus. The hospitality sector has suffered heavily over the past year with the restrictions placed on them. Hence, it’s essential to put into place systems that will give consumers a higher level of assurance to encourage them to come back as soon as possible. With biometric solutions, venues can also increase their organisational efficiency. Contactless biometric payment solution Our Morphowave Contactless solution is ideal for providing venues with easy payment methods that have several mutual benefits for both consumers and venues. Using IDEMIA’s MorphoWave™ device (integrated with our own customisable application that enrolls and offers payment verification) allows for an easy and quick adoption of a biometric payment solutions. The MorphoWave™ Compact implements a patented, truly contactless 3D fingerprint technology in a stylish and compact device, suitable for any location. The MorphoWave™ Compact acquires extremely accurate fingerprint data and overcomes the challenges of wet/dry fingers, and latent prints pose to the conventional scanning systems. There are significant benefits for the use of biometric contactless payment solutions compared to other payment methods for hospitality venues includes; Smoother and easier transaction process Cuts queuing time Minimising contact with staff Provide customers with added assurances with regard to hygiene, as this is likely to be an issue for many following the pandemic. Contactless biometric access control Biometric access control solution that will benefit hospitality to quickly grant access to customers and enable venues to know the identity of every person entering. With an added marketing benefit of knowing their details and consumer behaviour traits which will provide a more personalised loyalty service to customers. Having a more targeted marketing and more customised special offers will lead to a higher return rate. The  MorphoWave™ Compact allows for quick and smooth customer enrollment. With no added complexity for the user. Biometrics access control offers a higher state of certainty along with greater security and convenience. This results in the provision of secure digital credentials on either a card, mobile or other smart devices through biometric identification. With our biometric access control, further security to your organisation can be ensured, allowing you to have duel verification before gaining access into buildings or restricted areas. Benefits of biometric access control include; Reducing queuing time Access to venues without requiring members of staff to verify and admit Cost-cutting as venues will no longer need to produce the tickets, key cards. Control access to various areas within the venue, so having restricted access areas. Can provide access to further services within the venue, including contactless payment once the customer is enrolled in the system; it’s a seamless process. Reducing risks of fraud significantly, as access isn’t granted under any false pretenses. With biometric solutions being one of the fastest trends in the hospitality industry, it will likely become established. Our solution allows you to have both Access control and Biometric payment using the same system! So get started today and be ahead of the crowd; contact us at Arana Security for more information on how we can help you.

How We Can Help UK Hospitality Venues Re-open Safely Read More »

Do Complicated Passwords Help Us Be More Secure?

We use passwords everywhere these days, not just on our computers but the various electronic devices and the endless accounts we seem to accumulate. With increased security measures on many websites and accounts to try to protect our sensitive data, we are being asked increasingly to create complex passwords, but are we benefiting? Where did passwords come from? Passwords have been around in one form or another for centuries. Its thought that the Roman military used passwords to distinguish friend from foe and there are documented uses of cyphers throughout history.  However, the first use of passwords for computers happened in 1960at MIT. Fernando Corbato developed the password as a way to protect individual files from being accessed by other people on a compatible Time-Sharing System (CTSS) that several researchers had access to. Until the 90’s when the World Wide Web boom happened the need for computer passwords was not a significant issue. Suddenly there needed to be a way to protect the increasing volume of sensitive data that was being collected about people. When did passwords become complex? In 2003 the US National Institute of standards and Technology (NIST) released an official guidance that was written by an engineer named Bill Burr. This guidance is the basis on which password requirements are dictated. In his 8 page document Burr outlined the need for passwords to have mix of lower and uppercase, use of numbers and special characters and even that passwords should be of minimum length. He also advised that passwords should be changed regularly. Did it improve security? Well there is no doubt that longer more complex passwords are better choice than short easy to guess passwords. There are draw backs to using long passwords. Due to limitations of human memory the ability to recall a long string of letters and numbers can be difficult, which leads most people to either write them down, creating a security issue itself, or they often use the same password to access all their accounts. The problem is that if a hacker guesses the password then they have access to every account. Yet this is still a very common problem. Due to the large number of accounts a person holds they would struggle to create and remember a unique strong complex password for each they create an easy to remember password, which would be fine except that so many people think similarly and use the same password. Research has shown that globally the most popular password is ‘123456’. So the concept was promising but the problem was that most people didn’t understand the reasoning and so just didn’t follow guidance when creating the password and instead opted for convenience. What is the advice now? In 2017 NIST overhauled their advice document completely and now actually recommend the use of passphrases that are much harder to guess than a string of non-sense characters that can be more easily decoded by a computer. So using a string of unrelated words will give you better security on your accounts. Although the current trend is moving to using 2-step authentication by way of password and biometric which will see security improved while maintaining the convenience. NIST also no longer recommend||| that passwords should be changed regularly and instead advise that only done so should there be a need e.g. a breach occurs.

Do Complicated Passwords Help Us Be More Secure? Read More »

What is a Data Breach and How to Prevent It

Many people are unaware of how vulnerable they are to data breaches. Anyone is at risk of experiencing a data breach from a single individual to corporations and governments. It is the person or organisation’s responsibility to protect their data. Since the introduction of GDPR, it is a legal liability for companies that carry fines up to €20 million or 4% of turnover. What is a Data Breach, and how do they occur? A data breach can be defined as a security violation in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual unauthorised to do so. The compromisation of data can have adverse effects for both the party that has had their data breached but also the people or organisations who have had their data stolen/exposed. Breaches will happen due to weakness in either the technology or user behaviour. Data breaches are not always from the outside of an organisation; it can come from inside. An accidental data breach can occur when an unauthorised person views sensitive data. Even if the data is not shared, it would still be considered a breach of data because a person saw it with no authority to do so, and this could have many repercussions. A malicious insider data breach is when sensitive data is purposely accessed by an unauthorised individual and shared/exposed with intent to cause harm to the company/organisation. Another form of a data breach is when an unencrypted and unlocked device containing sensitive data is lost/stolen. Most data breaches will come externally to the organisation and commonly by a cyberattack, which can happen by way of different methods; Phishing Brute force attack Malware How to prevent data breaches? Companies and organisations need to take the necessary steps to protect the data they hold. Protecting data of customers/clients is crucial for building trust between the company/ organisation and the customer/client. There are several practices to consider when looking to protect a company’s data from breach; Patching & updating software to help ensure any known vulnerabilities are repaired and secured. High-grade encryption on all devices to protect the sensitive data it contains should it be stolen or lost. Ensure all devices connected to the network/servers have adequate antivirus protection and business-grade VPN, including any “bring your own devices” employees have been allowed to use in any way to access company data. Use strong credentials and multi-factor authentication to protect data from being accessed by password guessing. Educating employees on the importance of data protection and potential vulnerabilities. Increasing awareness will help reduce the possibility of mistakes that can lead to data breaches. Also giving them the tools to recognise possible malicious behaviour in others. Using intruder detection on any systems that are accessible to the internet such a servers and email systems, to protect the data contained within them. Backing up to the cloud will eliminate the risk of sensitive data being stolen from backup drives and data backup tapes. Systems should be very regularly scanned and checked for vulnerabilities. Security can only be as strong as the weakest point in the system. So a regular risk assessment will minimise the risks of data breaches. Implement automated safeguards such as password checking and assess firewall configuration. Automated safeguards will aim to reduce human error, which accounts for most cases of data breaches. By following these practices, organisations and individuals can significantly reduce the chance of a data breach and in turn protect your company and personal data.

What is a Data Breach and How to Prevent It Read More »

Does your Security System Need a Refresh?

An up-to-date security system is a huge benefit to businesses. Not only will it be a deterrent to intruders but also help protect a business from potential disputes and lawsuits. However, security solutions will at some point require an upgrade, for it to remain an effective and efficient tool. Some of the reasons that you would consider an upgrade to security systems are;   Outdated technology   The development of technology systems has evolved at tremendous speed over recent times. The efficiency and performance of security equipment have improved to provide more accurate data and better data storage solutions. Poor quality images and unreliable CCTV systems no longer need to be an issue for businesses. Another problem with outdated systems is that repair and replacement parts become more costly and harder to do. Modern systems are smart and integratable, they can offer remote surveillance but also allow for smart access control for employees. Using keyless entry and restricted areas within buildings, and detailed access records is possible to install without any major modification to the building structure or fittings.   Alterations to premise Any changes to the structure of the building will render the previous security solution inadequate for the new space. The position of CCTV cameras and or any access control system will need to be adapted to the new layout to ensure that the function of the system will meet the business requirement.   Being more Eco Not necessarily the aspect that is usually linked to security systems but with the increasing global awareness of everyone doing their part and making changes to be more eco-friendly. Modern technology tends to be much more energy-efficient and so contributing towards reducing the carbon footprint. The other benefit of modern technology is the availability of a wireless solution that will reduce the amount of plastic required between devices.   If you want to get advice on your security system or are thinking of getting one installed contact Arana Security for a no-obligation chat.

Does your Security System Need a Refresh? Read More »

Maintaining the Security of your Organisation during the COVID-19 Outbreak

The current global outbreak of the COVID-19 virus has left the world reeling, with severe ramifications on both an economical and personal level. Unfortunately, in a world of diverse organisations from public to private sectors, the ripple effect is and will continue to be felt for some time to come. Before this outbreak many organisations were in the process of adapting their security to that of touchless devices but were faced with data collection privacy impacts. Now, as it happens, touchless is the best and only option to combat the issues of hygiene and avoid contamination. In fact, the decision to stop using shared biometric readers, has been in line with the advice supplied by the health organisations and witnessed in other countries, where many government establishments have opted to abandon fingerprint authentication in an effort to stop the spread of the virus. The limiting or removal of the biometric system which requires contact, due to this pandemic, has increased the exposure of organisations and introduced further potential security breaches for individuals falsifying identification to pass through restricted areas. The use of touchless biometric devices is the way of the future but now it is a necessity to not only keep organisations and personnel secure, but to also maintain the highest level of hygiene and eliminate any concerns from individuals using the device. Traditional biometrics require an individual to make physical contact with the device, increasing the risks of contamination and aiding in the distribution of potentially harmful germs. As we have been witnessing in the past few months, simple gestures like a hand shake or holding the same door handle as someone else can lead to catastrophic consequences when allowed to occur. Contactless biometrics are not only less intrusive than the traditional devices but, they also sustain the ability to gather biometric samples without jeopardising the individual or the security standard required. Introducing a touchless device enables the peace of mind some may have regarding the cleanliness of the device and ensures the sterile space for such contact to be made without any actual physical interaction. The use of the contactless fingerprint device, Iris devices and facial recognition at a distance provides a more pleasant experience for the end user. The current situation the entire world finds itself in with Covid-19,  has also brought to light the very need for a large-scale technology transition into more hygienic and sterile security systems and encouraged more organisations to adopt contactless biometrics not only for the safety and security of themselves but also for the health and wellbeing of all involved. Furthermore, removing the physical contact with devices also reduces the amount of maintenance required. Perhaps the biggest impact is seen with contactless fingerprint. Glass platens as found on traditional devices, can take a beating over time. As a result, they require ongoing cleaning and replacement of protective silicon pads or possibly even the entire device. Contactless technology allows longer run times with less cleaning and fewer consumables necessary to support ongoing system availability. Arana security offer a number of contactless access control, payment, time attendance and enrolment and verification systems. 

Maintaining the Security of your Organisation during the COVID-19 Outbreak Read More »