management (ID management) is a broad administrative area
that deals with identifying individuals in a system (such
as a country, a network, or an enterprise) and controlling
their access to resources within that system by associating
user rights and restrictions with the established identity.
In an IT network, identity management software is used
to automate administrative tasks, such as resetting user
passwords and facilitating user authentication. A simple
password may not be sufficient to maintain the integrity
of the security system. The system often requires stronger
authentication, such as a one-time pass code, biometrics,
or a smart card.
What is Biometrics?
Biometrics can be defined as automated methods of identifying
or authenticating the identity of a living person on the
basis of a fingerprint, hand, iris, face, signature, voice,
biometric system started out as an identification system
that authenticated a person’s identity on the basis
of fingerprints. Its application was primarily in law
enforcement. During the last number of years, biometrics
has also been used to verify a person’s identity
and secure his or her access in an identity management
system while maintaining system flexibility and effectiveness.
More recently, biometrics is used in passports, national
ID cards, and government applications. The next wave of
biometrics is upon us; our smartphone and mobile device
are also equipped with biometric technologies. Biometrics
is becoming part of our daily life!
is a Smart Card?
A smart card is a credit card-sized plastic card with
an embedded secure and powerful computer chip. The smart
card’s chip communication connection is available
as a direct physical contact—for example, between
a computer, a point of sale terminal, or a mobile telephone—or
as a remote contactless electromagnetic interface.
of smart card implementation include SIM cards (for mobile
phones), credit cards, loyalty cards (reward cards), smart
ID cards, and e-passports.
What is OTP?
A one-time password (OTP) reduces the potential for compromised
user credentials. Every session initiated by a user generates
a unique user credential that is only valid for that session
or for a very short time period.
OTP tokens come in three primary varieties:
1) Tokens that display a time-based password that is updated
once a minute.
2) Tokens that accept a challenge code as input and display
the response code.
3) Tokens that generate a password based on some internally
Current Business Positions
of the Board of Directors
- International Biometric Industry Association,
of the Board of Directors
– EAB Advisory Council (EABAC) for the European
Association for Biometrics