Risk
7/16/2013
12:20 PM
Connect Directly
RSS
E-Mail
50%
50%

Eye Scans Meet Federal ID Cards

National Institute for Standards and Technology ruling gives government agencies the option to use use iris scans instead of fingerprints to identify card holder.

10 Space Technologies That Help On Earth
10 Space Technologies That Help On Earth
(click image for slideshow)
The National Institute for Standards and Technology (NIST) has released new guidelines that broaden the options for verifying individuals using biometric identification methods. By adding iris images and on-card fingerprint comparison to Personal Identity Verification (PIV) cards, federal agencies could achieve "stronger security and greater operational flexibility," NIST said.

The guidelines, published on Friday, say that agencies may add iris images as an alternate to fingerprints. According to NIST, collecting fingerprints can be difficult in instances where fingers are too dry to produce a good image, lotions are used, or skin is wounded. Images of one or both irises -- compact at no more than 3 kilobytes each -- can be loaded on the PIV card for faster reading times. The document includes specifications for iris biometrics and iris cameras to ensure interoperability across agencies using iris recognition technology.

The guidelines also explain how to place one or two compact fingerprint templates and a recognition algorithm on the card. This identification method can be used when an employee is signing a document digitally or opening a secure file.

[ These mobile apps from the government are must haves. Read 10 Helpful Apps From Uncle Sam. ]

NIST provided an example of a person placing his finger on a reader attached to a keyboard for confirmation of identity, versus typing in a personal identification number (PIN). During an authentication attempt, the templates can be compared on the reader device. The cardholder must enter a PIN number to release the templates, thereby meeting Federal Information Processing Standards (FIPS) for the multi-factor authentication.

The new provision expands the options for agencies issuing PIV cards, which are used by federal employees and contractors to access government facilities and computer networks. A PIV card typically includes a photo, fingerprint information, personal identification number (PIN) and a cryptographic credential, which is computer-generated data recognized only by the PIV system.

The new guidelines are the latest in a move to PIV mandated by Homeland Security Presidential Directive 12 (HSPD 12), a federal cybersecurity initiative the government created to increase security and efficiency and reduce identity fraud. NIST drafted specifications for biometric ID cards in April 2011 to include a clause that would require the use of iris scanning if fingerprinting was problematic.

NIST has come under fire for taking too long to create a standard for the use of iris images in federal identity cards. During a June 19 hearing of the House Oversight and Government Reform subcommittee on government operations, Charles Romine, director of NIST's Information Technology Lab, was questioned by subcommittee chairman John Mica (R-Fla.) about the absence of technical guidance for federal agencies. Mica cited testimony from Romine’s predecessor, Cita Furlani, who promised in 2011 that the standard would be ready within months. She retired shortly after without delivering on the promise.

In a related effort, NIST and the Department of Homeland Security's (DHS) Science and Technology Directorate are working on a publication that will define both optical imaging specifications and test methods for iris cameras.

"The iris standard can support PIV authentication and other uses, such as e-passports," NIST's biometric testing project leader Patrick Grother said in a written statement. "More importantly, the iris standard ensures that the iris data is interoperable, that is, it can be exchanged easily between cameras and readers from different makers and across the world."

In May, the DHS issued a request for proposals in an effort to upgrade to a new smart-card system that incorporates advanced technology. The 10-year, $99.5 million plan seeks to replace 61,924 PIV cards in 2013 and 116,172 cards in 2014. The winning contractor will be responsible for issuing and managing approximately 300,000 cards. The DHS included iris recognition as one of the implementation requirements, particularly iris capture, storage and matching.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4725
Published: 2014-07-27
The MailPoet Newsletters (wysija-newsletters) plugin before 2.6.7 for WordPress allows remote attackers to bypass authentication and execute arbitrary PHP code by uploading a crafted theme using wp-admin/admin-post.php and accessing the theme in wp-content/uploads/wysija/themes/mailp/.

CVE-2014-4726
Published: 2014-07-27
Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors.

CVE-2014-2363
Published: 2014-07-26
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.

CVE-2014-2625
Published: 2014-07-26
Directory traversal vulnerability in the storedNtxFile function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to read arbitrary files via crafted input, aka ZDI-CAN-2023.

CVE-2014-2626
Published: 2014-07-26
Directory traversal vulnerability in the toServerObject function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to create files, and consequently execute arbitrary code, via crafted input, aka ZDI-CAN-2024.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.