Mouse That Scans Your Fingerprints 90
Pac writes: "The U-Match mouse has an embedded fingerprint scanning device. It is currently available only for Windows 9x/NT, but Biolink says it will have a Unix\Linux version by the end of the year and a Mac version in the beginning of 2001." I've been eyeballing finger scanners since I saw a nifty one that worked through PAM at a tradeshow one time: I still think it'd be very convenient if it worked, but I'm very skeptical that something like this could gain widespread acceptance.
Problems with this.. (Score:3)
Secondly, How often do you replace your mouse? Mine last about 1.5 years.
The best quality is that the hardware captures the minutae. Fairly advanced, IMHO (If, in fact the hardware does actually do this.)
Probably the best finger scanning technology is (ahem, plug) by ethentica. We use a plastic with embeded phosphors over a glass CCD. (Abour 1/16" thick.. 500 DPI) The scan can only be induced by having a live finger because of the electrical properties we use to detect a finger. Also, there is no glass to clean regularly. The plastic is cheap, and lasts for millions of scans. And it's the smallest of all.
Pan
Re:This is a first... (Score:1)
If I were a hardware developer, I would not create a product for the existing Mac OS. I would create it for Mac OS X. Since Mac OS X isn't being released until 2001, I would hesitate to announce a product before the OS is released.
Re:Accuracy? (Score:1)
Dude, 1 million x 0.01% = 100 false rejections. 100,000 would be 10%.
--
Re:Linux before Mac? (Score:1)
Maybe it's because Macs use a different kind of mouse from PC's. To adapt the system to Unix/Linux all they have to do is write a new driver. For Mac, though, they actually have to go to the trouble of building a different piece of hardware.
Re:Accuracy? (Score:2)
--
Great... another product we don't need (Score:2)
Here's why: It'll create a black market for fingers.
Think about it! If you want access to someone's financial history, personal information, bank accounts, complete LIFE, all you need to do is chop off a finger or two! Don't think criminals wouldn't be able to go through with this -- it's very easy to see an organized crime syndicate pop up that specializes in fingers, eyeballs, even larynx's if we go as far as to implement widespread voice recognition as a way of identification.
We already have password sniffers -- that's bad enough, but at least it's intellectual theft. We don't need theft of body parts to accomplish the same goals.
Thank you.
What, exactly, is the point? (Score:2)
At home, to prevent unauthorized access? If you're that worried about the wife or kids finding your porn collection, encrypt it.
At work, to prevent unauthorized access? If you're the sysadmin, this might be a good security measure for your terminal, but do you really want to make things that much harder for Joe Temp to work at whatever desk is available?
What I really see it being used for is tracking users, in a way which can provide legally binding evidence.
Re:Problems with this.. (Score:1)
I agree. While I don't go through mice as quickly as you do (I've been using the same optical mouse for about 6 years now on my home machine), it doesn't make much sense to embed an expensive biometrics scanner in a very cheap input device that is subject to regular mechanical stress. A stand-alone reader would seem to make alot more sense.
Probably the best finger scanning technology is (ahem, plug) by...
It's not an official plug unless you give a link to the web site [ethentica.com].
Re:Great... another product we don't need (Score:1)
Can't I hack you with my keyboard? (Score:1)
The fingerprint is used for login and screensaver passwords. I guess that's useful 95% of the time.
A boot flopppy or mounting the harddrive on another machine should gain access to the files.
Re:hmm... (Score:2)
What I want is decent security for my front door so I don't have to hold a collection of nice 1960's pickable keys and no real authentication. I basicly want my front to be unlocked for me and locked for everyone else.
For things you don't care about.... (Score:1)
Confirm X.10 to turn off my security system.....confirm my computer to delete certain files (projects, essays, etc)....
Re:Pretty Clever (Score:2)
I found that the "finger print scanner" program could be fooled into to taking a picture of what was already on the glass and with the right combination of red and IR I expect you could build a keychain sized device to trip these things up.
No thinks, I'll use real security.
Worthless for widespread use (Score:1)
Consider:
- The system has to store the biometric signatures somewhere. Biometrics takes a set of measurements of some analog quantity, and compares how close they are to those on file. Because they are testing how _close_ the measurements are, within a margin of error, instead of whether they're exactly the same, they _cannot_ use a one way hash like we do with passwords.
- Every comany you deal with is going to have a copy of your biometric information. Even if its not enough to reconstruct (say) your entire fingerprint, it will be enough to spoof anyone else who uses the same implementation, or a different implentation with similar algorithms.
- The system is only as secure as the most insecure company/organization/site useing it. Imagine if you use retina scanning at your job at the CIA to access Top Secret files, and your favorite pr0n site introduces retinal scanning to stop your kids/younger siblings from using your account. Anyone who could hack into the pr0n site could potentially access your top secret files.
- If a few (or just one) organization[s] held all the biometric signatures and did all the verifications, we might get a bit more security, but we'd have to kiss what little privacy we have left goodbye. Those groups could (and would) track all interactions we had with other companys. Because biometrics can uniquely identify you, you couldn't get a false email or isp account. And if a site holding a large % of the populations signatures were comprimised, it could destroy the trust of the entire system, and anything that was based on it (eg global ecommerce).
- Biometrics are often easy to steal without comprimising the server side of the system. Fingerprints, palmprints and DNA tests all leave traces on the sensor. You don't even have to be on the same continent to get hold of a mugshot or voice sample. And once a biometric signature is stolen, it is useless for the rest of your _life_. You can't repudiate like a PGP key, or pick a new one, like a password.
Re:Problems with this.. (Score:1)
I've actually used this mouse and it does have optical scanners in the thing that can detect whether a real finger is there or not. The guy who was showing it off said it detects heat and scans a couple layers deep within the finger to get past oil and dirt. Unfortunately I couldn't pull any more specs out of the guy and he seemed to be totally lost when I started talking about a possiblity to integrate this with PGP. Oh, well.
The thing requires three samples before it will take and an image of your fingerprint does appear on the screen if that means anything.
Could get interesting..... (Score:2)
Others have already commented on the possible privacy implications here. And I agree with them. I remember it said that our Social Security #'s were never meant to be used as I.D. except for the purposes, and business of maintaining one's SS account. Now it's used by everyone and everything as an additional ID.
Next we'll have retinal-scans, blood samples, skin-samples and what-ever-else, where users will gleefully participate in. With such data one's general health, use of illegal drugs, etc. will be used by law-enforcement, insurance companies, pharmaceutical companies, and others to "better serve the needs of the public" ( read into this as you wish ).
So I'm paranoid. But I'm also an old fart that has seen ALOT in my years.
Re:Privacy problem (Score:1)
Re:fooling it (Score:1)
Physical access (Score:1)
All someone needs to do is create a device that records the input from the mouse and can replay it. Then you can replay any fingerprint of anyone who has used the device since the capture hardware was installed.
Use a glove! (Score:1)
what my mouse would say (Score:1)
check out my mp3 page [mp3.com]
check out my mp3 page [mp3.com]
Secured Use of Corporate Assets... (Score:1)
Re:This is a first... (Score:1)
John
hmm... (Score:3)
greeeeaat...
Other fingerprint stuff for Linux (Score:2)
---
Re:Accuracy? (Score:1)
Re:Privacy problem (Score:2)
ID#
FIRST NAME
MIDDLE INITIAL
LAST NAME
WEIGHT
HEIGHT (in inches I think?)
EYECOLOR (lookup.. don't remember the records)
But there is some "trash" as the end of the record. Actually,quite a bit. (I had previously thought it was a hash of the data)
It is quite possible to store your fingerprints on the card as well (Cards typically hold about 1-4Kb).
Using minutae-extraction can give you a "starmap" of x,y,theta values. Most people have about 20-30 useful points. (400 bytes is the industry average)
Nobody expects the spanish inquisition!
Pan
Think of the possibilities! (Score:1)
Johnny, age twelve, decides he's going to buy a new computer, because he's tired of little Julie using his computer. (After all, she's only six.) But even then, his computer's so cool, he's worried she'll use it anyway. So he buys this mouse.
Fast forward four years. Johnny is now a fully blown hacker, producing programs that are the coolest thing in the world and inserting stuff into his kernel that only a Code God could think of. What's up?
The FBI comes after him. Yet... because of the awesome power of a system implemented, you can't get into his computer -- at all -- without mouse input that matches his fingerprints.
The thing about this sort of device is just that sort of situation. I'm sure the FBI will find a way around it, but it's our responsibility to stay six steps ahead of them all the time. Let's be realistic: They don't have the manpower that we have. Plus, of course, we have people that think that American imperialistic `secret service' conduct is idiotic, and they'll help out!
With the help of devices like these, we can finally -- if we choose to have it -- the ultimate security. (On workstations, though; models serving as servers on the Internet would still be open to breaches, of course.)
Talk about a good way to thumb your nose at the anti-security people, like Republicans.
Re:Privacy problem (Score:1)
Not new here... The local superstore sells them (Score:2)
They've been there for months.
.m
Flaw (Score:1)
Nathaniel P. Wilkerson
NPS Internet Solutions, LLC
www.npsis.com [npsis.com]
Re:Privacy problem (Score:2)
Before spouting off about how terrible these solutions are and how they present a risk to security, you should read Applied Cryptography [counterpane.com] (which explains how most of these issues are solved problems) and check to see that the vendors of these products have also read the relavent literature.
-pjf
Re:Crime just loves Open Source (Score:1)
Sorry to let the side down by glorifying a troll like that with an answer but I think most people who are not "mentally disadvantaged" would agree that the sender is round the twist...
We have to be wary of such a device but there could be a place for it. I am Tech support in a hospital. We need seroius system security, but doctors & nurses tell me that they have got better things to do than mess about with passwords all day!
If you got this mixed in with a nice Open Source encryption method it would be really secure and could be made impossible to misuse - like some proprietary products...
Re:hmm... (Score:2)
--
Re:Fingerprint? no way! (Score:1)
Re:Privacy problem (Score:1)
If you think education is expensive, try ignornace
disabled access? (Score:1)
Just a thought
Wake up, kid (Score:2)
Fingerprint? no way! (Score:2)
I won't trust these things until I can use urine.
There would be at least one benefit, I can set a preference oh how low my alcohol level is set before I start buying stuff online.
Re:Problems with this.. (Score:1)
The technology to scan seismic data requires alot of FFT experience and engineers, scientist, and other professionals. Only 1 in 3 wells hits. (I used to work in the seismis analysis sector)
There may be some little hacks to check an optical density of an object, and maybe a IR CCD that could read the heat from a finger. But is this going to work on an oil pipeline in alaska? Or on a cold New York morning?
pan
Cannot Regenerate (Score:1)
What happens, I wonder, when you smash your finger in a door and it doesn't recognize it? I assume there's some other way past this.
Also, does it continually validate, or is it more like a one-time 'screen saver password' replacement? That would be nifty.
It says Unix-compatible...I presume that means Linux, too?
Dlugar
Accuracy? (Score:1)
Privacy problem (Score:2)
When a crime is commited in the area, the FBI subpoenas the fingerprint database to look for the crimanal. Might as well just have a national database of fingerprints of non-criminals.
Or perhaps the administrator of that system simply decides to use your fingerprint to act as you, messing around with your finances.
No, fingerprint scanners should be separate devices that are intentionally activated by the user.
Edict from above! (Score:1)
---------------
Can Regenerate (Score:2)
You can also compare against other fingerprints by generating their signatures.
Re:Privacy problem (Score:1)
_
/
\_\ sig under construction
Pretty Clever (Score:3)
One of the best parts of the system is that it doesn't actually send a complete fingerprint scan to the computer. Instead, it crunches it down into a 500 byte "template" that can't be used to reconstruct the user's fingerprint. This seems intelligent both from the standpoint of minimizing necessary mouse-computer bandwidth and for their stated objective of protecting privacy. I guess that this is sort of like storing passwords using an MD5 hash.
The only problem I can see is that it seems as though it would be comparatively straightforward to spoof. All you'd need would be a hardware tap on the mouse plug and you could capture the fingerprint template as it's sent to the computer. Then you can log in as anyone else by reversing the transmission and sending their fingerprint template instead of your. Since it uses a standard PS/2 port, this shouldn't be too hard to engineer. I guess that you'll have to use this as a secondary system together with a password.
What's the true benefit? (Score:1)
fooling it (Score:1)
Biometrics (Score:1)
One must ask the question, though: how conspicious is this mouse? Would you know that you were using the mouse? A industrial designer would tell you that this would be the final stage of evolution for the product, but I could see problems arising.
Re:Pretty Clever (Score:1)
They are in fact, nothing like an MD5 or SHA1
Pan
What a stupid idea. (Score:1)
Re:What's the true benefit? (Score:1)
Using this for logging into your personal computer might be okay but over the network? No thanks.
Re:Can Regenerate (Score:1)
More Anti-Mac FUD... (Score:1)
So more likely, they're just putting off writing a USB driver for this new invasion of privacy^H^H^H^H^H^H^H tool for security...
-J
In other news... (Score:1)
Biolink said it is currently developing an upgrade which would combine technologies from several partners to enable the real-time collection, transmission and storage of DNA profiles and other data.
"The mouse is second only to the keyboard as a natural collection site for users hair, skin flakes, nail clippings, and traces of any controlled substances being used while online." said J. Mimpton Cleeb III, Director of Research & Development. "Our piece is ready, we're only waiting to close deals with our potential partners".
Sources say Biolink is negotiating deals with Real Networks and AOL/Netscape for the data transport functionality, and the FBI for data storage and archival services.
"I will gladly pay you today, sir, and eat up
Heh.. (Score:1)
The LIC does store fingerprints. *looks at his lic*
IT IS NOT magnetic either, I can be certain because the device used optics to read the information.
It looks like a majorly condensed barcode all scrambled up. It is more than a magnetic strip.
It does not store the picture I take that back but I you take a fingerprint scan at the time of your LIC.
So yes im sure a lot of stupid people believe that for a good reason, it is true.
Mysteriously mine was scratched up and now the readers cant seem to read it.. hmmn I dont know just HOW it got scratched
Also just to save people the trouble from calling me stupid or implying it... again, I know that my Lic being scratched does me absolutely no good anyways.
Just a little side note.. Looking over the strip part that is still somewhat 'readable' There are at least 220+ distinc 'columns' of varying width and at least like 30 rows, probably more and lets see we are talking probably just something similar to a coordinate system so a bunch of sets of numbers, 3-4 numbers per set to map out a fingerprint?? I dont really know but I know compression is no secret and you can squeeze 10K of data on the back of this card pretty easily by my guessing. Have you ever seen a small GIF? Anyways.
Jeremy
If you think education is expensive, try ignornace
Great. (Score:1)
Eyeballs are not fingers (Score:1)
I've been eyeballing finger scanners since I saw a nifty one that worked through PAM at a tradeshow one time: I still think it'd be very convenient if it worked,...
I can tell you why it didn't work: You're not supposed to use your eyeball! Why do you think they're called fingerscanners?!? Would you use your finger in an eyeball scanner?
Re:hmm... (Score:2)
So, if I need to log in for some really important reason (e.g. I want to log back in before the rm -rf / does too much more damage), your system will detect that, and prevent me from logging in?
As a Microsoft Software Designer{tm}, I can tell you that we would write a Wizard{tm} which would methodically determine the exact nature of your distress via a series of simple dialog boxes. But of course, due to the underlying design superiority of our OS products, many important system tasks such as deleting the file system are commonly available to users, so the point is moot.
Innovation. UNIX doesn't get it.
"I will gladly pay you today, sir, and eat up
Re:More Anti-Mac FUD... (Score:1)
--
Encouraging, but keep it in perspective (Score:2)
It's great that Linux is starting to resemble a mainstream OS choice. But let's remember, Linux and Mac are vastly different markets. In particular, there is a large bias in Linux numbers towards servers, and a desktop bias on the Mac side. These gaps will begin to fill in and we may see more overlap as 1) Mac OS X public beta ships in the next several weeks 2) Linux becomes more desktop-friendly.
But for the time being, it is not surprising that something like, say, an IDE would arrive first on Linux, and then later on the Mac. But conversely, it will be some time before Linux users will get the the full attention of graphics app and page layout developers. Either way, having two viable alternative operating systems is certainly better for everyone, particularly if developers support both equally. It sucks when you're forced to use an OS purely because that application you need to use runs on it.
- Scott
------
Scott Stevenson
smart cards (Score:2)
I think you are wrong on the count of the need for any company you would have to deal with to know your biometric information, or of the need for a biometric database.
You could just use a smart card to check the biometric information (after some preprocessing by the host, since biometric recognition is likely to be too expensive for smart cards at least in the near future). The card would then sign the transaction.
Smart cards signing transactions when the correct PIN is input have been in use in France for more than ten years.
Re:Linux before Mac? (Score:1)
Sounds like some salesdroid talking with the usual amount of intelligence that salesdroids have. Salesdroids and other imbeciles are very used to giving the Mac short shrift.
Answer: Re:Pretty Clever (Score:2)
The computer should send a key to the mouse, the mouse hashes the biometric data, then hashes it again with the key. As long as both hashes are one-way, this would ensure that tapping data between the mouse and cpu would be worthless.
Kevin Fox
Not secure since your fingerprints are no secrets! (Score:1)
A fingerprint is like a password. A password can be used for authentication since it is secret. And to keep it secret you change your password often, and avoid using the same password at multiple sites. How do you change your fingerprints?
Take this fingerprint mouse. Understand that each fileserver, web shop company, or other program that needs to perform authentication needs to have your fingerprint to match with what the mouse transmits. It does not matter how well you encrypt or hash your fingerprints. If fingerprint "authentication" catches on, the prints will NOT be secret!
BIG fingerprint database (Score:1)
Instead they capture a biometric (their 500 byte file). I can see two ways the forces of evil (read: the government) could use this:
No more anonymous computer use. After all if the computer knows who is using it because it identified you, it can transmit that.
Also, if the FBI finds a fingerprint, they could just run it through the same algorithm, giving them a 500 byte file and compare that to their database of fingerprints. This is probably very close to what they do right now.
This is truly scary!!!!!
Not so clever (Score:4)
Biometric systems should always assume that the fingerprint, iris scan, etc is not a secret and is known to the attacker. Your password can only be considered secret because you can change it.
To have any meaningful security a biometric system must have a trusted reader and a secure path from the reader to the verifier.
Two examples:
1. The verifier is inside the reader. Your private key is embedded into a tamper-resistant device and a fingerprint is required to perform a private key operation (signing, decryption).
2. The verifier is in a secure remote server, but communication between the reader and the verifier is cryptographically protected. The reader should sign the scan and also use a timestamp or challenge/response system to prevent replay attacks. Each reader would have a separate signing key so they can be revoked, if necessary. Even the best tamper resistance cannot be trusted with a global reader signing key that results in catastrophic failure if it is compromised.
Suggested protocol:
Before being used for the first time the readers are connected to the verification server for initialization. The server generates random keys and sends them to the readers. These keys cannot be read back from the reader, only overwritten.
For authentication, the client first asks the verification server for a challenge. It sends the challenge into the reader which calculates a hash of the biometric scan, reader signing key and the challenge. This hash is sent to the server along with the biometric scan for verification.
The reader key should be kept in battery backed static RAM rather than EEPROM. This makes it easier to self-destruct in case a tampering attempt is detected. To prevent the value from permanently affecting the memory cells via ion migration or similar phenomena it could be cycled continously.
The key database on the server is a single point of failure - but the server is probably the same resource you are trying to protect anyway. It would still be nice to make the key database less vulnerable by using asymmetric cryptography - a key pair is generated during initialization and only the public key is stored on the server.
The Sony fingerprint scanner (also featured on slashdot recently) appears to implement #1. Does anyone know of a system similar to #2?
----
Re:Privacy problem (Score:1)
I just wanted to make a comment, Here in Georgia, finger prints are mandantory when you get your driver lic.
Its all encoded into a bar strip on the back, everything, your finger print a digital picture...
To late to stop the national database thing huh?
If you think education is expensive, try ignornace
Re:Accuracy? (Score:2)
--
This is a first... (Score:4)
Look closely at the text. It says that there will be a Unix/Linux version at the end of the year, but the mac version will not come into 2001.
This is rare right now, but I suspect that we will see a lot more of this happening. As Linux (and to a lesser extent, BSD[*]) grows, we will see much greater acceptance of Linux as an alternative platform at equal or greater standing relative to the Mac.
[*] Nothing against the technical merits of BSD; they just have a smaller marketshare at the moment, thus having a lesser affect as an alternative OS.
Fingerprint really not captured??? (Score:2)
Think about it. Why embed a processor to do that work when they could use the one already installed on the other side of the port?
Workplace (Score:1)
have to worry about lost password. And thing to that affect. It could help in security so you don't have to worry about changing password every month and things to that affect
The only reasonably foolproof setup (Score:3)
This is the only biometric that everyone has.
Some people don't have fingerprints, some people have skin conditions that prevent hand scanners and face recognition from working, some people don't have eyes (so no retina or iris scanners), some people are mute (no voice print), but everyone has a head.
Also, a dead head will not work, and this sort of scanner may even be able to detect emotional distress.
--
Re: (Score:1)
I played with one of these... (Score:1)
I think they had a screensaver locked and you had
to press your thumb against the side of the mouse,
it would then draw your fingerprint and tell
you access denied (since I obviously wasn't
the correct finger).
It was nifty. I hope I remember this correctly.
Re:Pretty Clever (Score:1)
Um, no. The site claims, at least, that the "template" is not reversible. They specifically mention that it's not possible to regenerate the fingerprint from the "template", and mention this as a privacy feature.
Uh oh... (Score:1)
Combine All Good Features (Score:1)
I would love to use that mouse but where is the electronic eye. I want one with a Microsoft TYPE electronic eye.
Where did they get the 10^-9 false accept chance? (Score:1)
Oh well, I'm sure a biometrics company would never imply it was secure if it wasn't.
definately not foolproof (Score:1)
Re:hmm... (Score:2)
No, the applications that come to mind are things like ATMs that possibly alert a security company to take a look at the video camera, or you could set up your own system to not let you send email when upset (to cut down on flaming). The applications of a mood-detection sytem in conjunction with an identification system are up to the developer/administrator.
The context of a security system determines how various features would be implemented. No formulation will be appropriate in all cases.
--
Re:Heh.. (Score:1)
If you think education is expensive, try ignornace
Bad idea (Score:2)
Re:Accuracy? (Score:1)
Linux before Mac? (Score:2)
What does it say that a Unix/Linux version is coming out before a Mac version?? I mean, Macolytes are used to being second-class citizens, but third class? The Mac population is pretty puny, but I don't think it's smaller than the Linux population that would use this.
Maybe they are aiming this also at the server market.
--
Processor... (Score:2)
Because they already have a processor in the mouse anyhow, to drive the scanner and otherwise process mouse movement. (High-power processor cores are cheap, and when you already have one for some other reason they're free.)
Because they're concerned about privacy issues, and don't want a raw fingerprint on the wire.
Because they want to compress the data before it hits the wire.
Because they want to be compatable across many platforms without dumping a lot of code into the driver where it might need tweaking - or they don't want to expose their compression/signature algorithm in an open-source or hackable driver.
Mind you, I'm not saying they DO compress the fingerprint in the mouse. I'm just providing reasons why they might chose to do so.
Re:Privacy problem (Score:2)
Re:What's the true benefit? (Score:1)
I'd imagine that this wouldn't occur quite as simply as you paint it. Firstly, there are too many legacy devices without snazzy fingerprint scanners. Secondly, any self-respecting company will want to protect their customers, so you can be assured encryption will be a given. Naturally, anyone dedicated enough can crack or hack anything, but to say that the method itself is unusable for 'Net applications is silly.
Honestly, I'd prefer the authentication to be in a separate device. I use a repackaged and modified Logitech Marble+ due to my physical limitations, and I'm not upgrading any time soon. ;] And two buttons? I like three m'self.
*gel
hmm... (Score:2)
So, if I need to log in for some really important reason (e.g. I want to log back in before the rm -rf / does too much more damage), your system will detect that, and prevent me from logging in?