1(630)802-8605 Ravi.das@bn-inc.net

In today’s blog, we introduce the topic of how Biometrics can replace the password once and for all (sort of):

The Role Of Biometric Technology And Single Sign On Solutions

You can use biometric technology as an alternative to passwords-literally, your fingerprint becomes your password.  This has great benefits to you, as an emerging business owner.  Employees will not have to remember multiple passwords, and the costs of password administration will be greatly diminished.  You could even technically eliminate the use of passwords completely by employing biometric technology.

The use of biometric technology as an alternative to passwords has been referred to as “Single Sign On Solutions.”  This is so because you need to sign on only once in order to gain access to the shared resources.  The most commonly used biometric technologies for Single Sign On Solutions are fingerprint recognition devices.  Also, iris recognition technologies are utilized, but to a lesser degree.

The Single Sign On Solution device (if it is a fingerprint recognition device) usually comes in three different formats:  (1)  Installed on a keyboard;  (2)  Installed on the mouse;  (3)  Or a dedicated device (such as a miniature stand alone fingerprint reader).  Single Sign On Solution devices which employ iris recognition technology usually come in the form of a small camera, which can be  easily mounted on top of a server or workstation.

Software comes with the Single Sign On Solution device, to allow for either local authentication (for example, your employee logging into their workstation), or centralized authentication (authentication occurs at a centralized point, namely the server).  There are drawbacks to centralized authentication.  Local authentication tends to be much cheaper (typically less than $150 per device), as opposed to centralized authentication which can be more expensive, because of sever software licensing and maintenance fees.  Most emerging to medium sized businesses tend to use local authentication, because of these costs.

See specific examples of this in tomorrow’s blog!!!