Biometrics, Trusted Computing Key to Securing Laptops, HandheldsBy Rob Enderle | Posted 2004-01-17 Email Print
WEBINAR: Event Date: Tues, December 5, 2017 at 1:00 p.m. ET/10:00 a.m. PT
How Real-World Numbers Make the Case for SSDs in the Data Center REGISTER >
As the U.S. Department of Homeland Security implements a biometrics-based system to protect our borders, governments and enterprises should look to use similar technology for locking down their mobile assets.
Now that the U.S. government has announced it is using fingerprint readers to authenticate foreign visitors, it's time to revisit the use of this technology for securing laptop and handheld computers.
One advantage to fingerprint readers, or biometrics in general, is that there are no passwords to forget or cards to lose. On the other hand, keys, cards and passwords can all be easily replaced if lost or compromised, but if a fingerprint were to be virtualized, there is no practical way to replace it. Fingerprint readers also present reliability problems.
While passwords are the most commonyet least securemethod of securing PCs, smart cards are also becoming more common. One advantage to smart cards is their versatilityin addition to securing your PC, they can also be used to access corporate facilities or networks, and even as a corporate charge card (though I'm not aware of anyone doing all of that with a single card yet). Although quite common in the European Union, smart cards have not completely caught on in the United States.
One of the biggest problems with securing a laptop or a handheld computer has been that, regardless of the security, the data remains relatively vulnerable to physical attack. By simply removing the hard drive and placing it in another system, anyone can access the data in your computer. Drives can be encrypted, but this can dramatically decrease performance.
This is where the Trusted Computing Group comes in. The groupmade up of hardware OEMs from around the world, chip companies and Microsoft Corp.has developed a specification to secure data properly on a laptop computera method that could also be applied to a handheld device.