Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Mobile

    Biometrics, Trusted Computing Key to Securing Laptops, Handhelds

    By
    Rob Enderle
    -
    January 17, 2004
    Share
    Facebook
    Twitter
    Linkedin

      Now that the U.S. government has announced it is using fingerprint readers to authenticate foreign visitors, its time to revisit the use of this technology for securing laptop and handheld computers.

      One advantage to fingerprint readers, or biometrics in general, is that there are no passwords to forget or cards to lose. On the other hand, keys, cards and passwords can all be easily replaced if lost or compromised, but if a fingerprint were to be virtualized, there is no practical way to replace it. Fingerprint readers also present reliability problems.

      Read more about the technical challenges involved with fingerprint readers.

      While passwords are the most common—yet least secure—method of securing PCs, smart cards are also becoming more common. One advantage to smart cards is their versatility—in addition to securing your PC, they can also be used to access corporate facilities or networks, and even as a corporate charge card (though Im not aware of anyone doing all of that with a single card yet). Although quite common in the European Union, smart cards have not completely caught on in the United States.

      One of the biggest problems with securing a laptop or a handheld computer has been that, regardless of the security, the data remains relatively vulnerable to physical attack. By simply removing the hard drive and placing it in another system, anyone can access the data in your computer. Drives can be encrypted, but this can dramatically decrease performance.

      This is where the Trusted Computing Group comes in. The group—made up of hardware OEMs from around the world, chip companies and Microsoft Corp.—has developed a specification to secure data properly on a laptop computer—a method that could also be applied to a handheld device.

      Another element of the Trusted Computing specification is the establishment of a trust relationship between computers. This is not only critical for accessing sensitive corporate or government information online, but also for patches and e-commerce transactions. For instance, IBMs Linux group maintains that this component is essential to ensure that only IBM customers receive legitimate patches from IBMs own trusted servers. For devices outside the firewall, this trust relationship will be one of the most critical aspects of a secure mobile enterprise.

      The problem with the Trusted Computing specification is that it doesnt specify user authentication, and (without a decent lock) even the most solidly built safe is not secure enough.

      But, if we were to combine a fingerprint reader with the Trusted Computing technology, we would have a secure repository to store our sensitive information, the ability for a solid trust relationship with a Web-based service, and a key that is both easy to use and very difficult to duplicate.

      Given the recent adoption of fingerprint readers by the U.S. government and the availability of biometric technologies, perhaps now is the time that large enterprises and governments should start building these requirements into specifications for portable devices (and even desktop PCs).

      To date, companies like Acer and NEC have been the most aggressive with fingerprint readers, with IBM and HP leading the pack on Trusted Computing specifications. But the vendor that can address both will undoubtedly have an advantage going forward, as will the IT executives who successfully implement these technologies.

      Just remember: In todays world, you can never be too secure. Rob Enderle is the principal analyst for the Enderle Group, a company specializing in emerging personal technology.

      Rob Enderle
      https://enderlegroup.com
      Rob Enderle is a principal at Enderle Group. He is a nationally recognized analyst and a longtime contributor to eWEEK and Pund-IT. Enderle is considered one of the top 10 IT analysts in the world by Apollo Research, which evaluated 3,960 technology analysts and their individual press coverage metrics.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×