Risk
4/19/2011
12:19 PM
Connect Directly
RSS
E-Mail
50%
50%

Federal Biometric ID Cards Get Iris Scan Option

National Institute for Standards and Technology has revised specifications for the proposed federal employee and contractor authentication system, including a new option to fingerprinting.

Government Innovators
Slideshow: Government Innovators
(click image for larger view and for full slideshow)
Biometric ID cards being developed for federal employees and contractors may include iris scanning in addition to fingerprinting, according to updated specifications released by the federal organization for IT standards.

A new draft of Special Publication 800-76-2 by the National Institute of Standards and Technology (NIST) includes a clause that would require the use of iris scanning as biometric identification if a person doesn't have fingerprints or if fingerprinting is problematic, according to the document.

The document includes specifications for iris images stored both on and off the personal identity verification (PIV) cards people will use to confirm their identity; for iris capture devices; for the semantic properties of an iris image; for an iris image capture interface; and for an iris recognition interface.

The new draft also includes specifications for an option agencies have to add an algorithm that would provide on-card comparison of fingerprints rather than requiring a personal identification number (PIN) when checking someone's credentials.

The original set-up for the system required a cardholder to enter a PIN number to check card credentials against a card reader. The new draft allows for agencies to choose to include an algorithm on the card that would eliminate the need for PIN entry to check credentials, according to the new draft.

Specifications for the on-card option support an earlier draft outlining the specifics of the federal PIV system, FIPS 201-2, which was released March 8.

That document "does not require PIN entry ahead of a fingerprint minutiae on-card comparison transaction" and "extends on-card comparison as an alternative to PIN entry in altering the state of the PIV card," according to Special Publication 800-76-2.

The federal government is developing biometric ID cards as mandated by Homeland Security Presidential Directive 12. The directive is aimed at increasing security and efficiency, reducing identity fraud, cutting costs, and protecting personal privacy by requiring biometric identification for all federal employees and contractors when entering federal facilities or IT networks and systems.

Cybersecurity is a chief concern of the federal government, and the biometric identity system is one of many steps it's taking to provide more security both internally and externally.

The new draft is open for public comment until May 22. People can submit comments to NIST by emailing patrick.grother@nist.gov.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3594
Published: 2014-08-22
Cross-site scripting (XSS) vulnerability in the Host Aggregates interface in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-3 allows remote administrators to inject arbitrary web script or HTML via a new host aggregate name.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.