Risk
1/7/2014
02:32 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Hoyos Labs Issues Biometric Open Protocol Standard For Safer Authentication

BOPS comprises a set of rules that govern secure communications among a variety of client devices

LAS VEGAS, Jan. 7, 2014 /PRNewswire/ -- from ShowStoppers @ CES 2014 -- While biometrics are becoming a ubiquitous component of securing consumer data on mobile and other digital devices, there is no industry standard in place to protect that data once it leaves the device and enters the cloud. Today, Hoyos Labs, a leading digital infrastructure company, announced the formalization of its Biometric Open Standards Protocols (BOPS).

BOPS comprises a set of rules that govern secure communications among a variety of client devices including mobile phones, desktop computers and ATMs, among others, and a trusted server managing the acquisition and manipulation of biometric data captured by those devices. The BOPS guidelines make use of The U.S. Department of Defense's Trusted Computer Systems Evaluation Criteria (TCSEC) and are biometric agnostic.

"Nearly every smartphone, digital device or computer system that has a financial component to it will have a biometric component built into it in the very near future. The concerns about fraud, hacking and personal privacy have created a tidal wave of momentum on this front," said Hector Hoyos, founder and Chief Executive Officer of Hoyos Labs. "Now, securing all of the biometric data that's being generated is of the utmost importance. As with every major technological breakthrough, a series of accepted standards and protocols must be widely adopted from the manufacturer and database management end before consumers can fully be comfortable. BOPS are those standards and protocols."

Hoyos continued, "We have created a rule-based system by building upon The U.S. Department of Defense's core infrastructures. What Hoyos Labs has done is made our system work across all biometric types - from iris and periocular to fingerprint and beyond - and is available to any company that wants to implement it."

The BOPS system addresses the five most widely recognized key security consideration components:

-- Identity Assertion - The BOPS identity assertion platform provides a guarantee that named users are who they claim to be. The identity assertion implies reliance on human biometrics; however, the BOPS is an interoperable standard and can incorporate any identity asserter, or a number of asserters, that provides this guarantee. The application of the Intrusion Detection System (IDS) provides active monitoring to prevent spoofing of the credentials set and blacklisting of a subject or device that makes malicious attempts. -- Role Gathering - Role gathering is focused on the data confidentiality and privileged access based on the rules enforced by a known system. To determine whether a specific access mode is allowed, the privilege of a role is compared to the classification of the group to determine if the subject is authorized for a confidential access. The objects structure is defined by the access control. Role gathering occurs on the system's level or through the client/server call. The BOPS server stores role-gathering information to associate a unique user with a unique device. -- Access Control - The BOPS supports access control between the named users and the named objects (e.g., files and programs). The adjudication mechanism is role-based and allows users and administrators to specify and control the sharing of those objects by named individuals, or defined groups of individuals, or by both. -- Auditing - The BOPS supports all auditing requests at the subject/object level or at the group level. The BOPS uses Aspect Oriented Programming (AOP) to ensure that all calls are safely written to an audit trail. A RESTFul web services and JSON interface provides a mechanism to read the audit trail. Auditing may occur at the subject per action, the object per action or the group per action. For example, a group of users called "Accounting" may audit all writes to General Ledger. Or the "Chief Financial Officer" may have audits for reads of the Income Statement. -- Assurance - The auditing of all BOPS specifications and proof of the security model to prevent a system from unknowingly being compromised. The entire BOPS document is available upon request from Hoyos Labs at no cost, with a properly executed non-disclosure agreement between the party who is requesting it and Hoyos Labs. Please contact: hoyos@kcsa.com.

About Hoyos Labs Hoyos Labs is a digital infrastructure security company with security, computer vision and biometrics and big data experts. The goal of Hoyos Labs is to develop and deploy enterprise and consumer identity assertion technology platforms that will conveniently and securely address the identity assertion challenges of today. Hoyos Labs currently has offices in New York, Boston, Bucharest (Romania) and Beijing (China).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-3828
Published: 2014-10-22
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.