SHARE
Facebook X Pinterest WhatsApp

Biometrics, Trusted Computing Key to Securing Laptops, Handhelds

Now that the U.S. government has announced it is using fingerprint readers to authenticate foreign visitors, it’s time to revisit the use of this technology for securing laptop and handheld computers. One advantage to fingerprint readers, or biometrics in general, is that there are no passwords to forget or cards to lose. On the other […]

Written By
thumbnail Rob Enderle
Rob Enderle
Jan 17, 2004
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Now that the U.S. government has announced it is using fingerprint readers to authenticate foreign visitors, it’s time to revisit the use of this technology for securing laptop and handheld computers.

One advantage to fingerprint readers, or biometrics in general, is that there are no passwords to forget or cards to lose. On the other hand, keys, cards and passwords can all be easily replaced if lost or compromised, but if a fingerprint were to be virtualized, there is no practical way to replace it. Fingerprint readers also present reliability problems.

While passwords are the most common—yet least secure—method of securing PCs, smart cards are also becoming more common. One advantage to smart cards is their versatility—in addition to securing your PC, they can also be used to access corporate facilities or networks, and even as a corporate charge card (though I’m not aware of anyone doing all of that with a single card yet). Although quite common in the European Union, smart cards have not completely caught on in the United States.

One of the biggest problems with securing a laptop or a handheld computer has been that, regardless of the security, the data remains relatively vulnerable to physical attack. By simply removing the hard drive and placing it in another system, anyone can access the data in your computer. Drives can be encrypted, but this can dramatically decrease performance.

This is where the Trusted Computing Group comes in. The group—made up of hardware OEMs from around the world, chip companies and Microsoft Corp.—has developed a specification to secure data properly on a laptop computer—a method that could also be applied to a handheld device.

Read about the Trusted Computing specification in Rob Enderle’s full column on eWEEK.com.

thumbnail Rob Enderle

Rob Enderle has been a columnist for the TechnologyAdvice B2B sites since 2003. His areas of interest include AI, autonomous driving, drones, personal technology, emerging technology, regulation, litigation, M&E, and technology in politics. He has an AS, BS, and MBA in merchandising, human resources, marketing, and computer science. Enderle is currently president and principal analyst of the Enderle Group, a consultancy that serves the technology industry. He formerly worked at IBM and served as a senior research fellow at Giga Information Group and Forrester.

Recommended for you...

Caylent Research on Database Migrations: What to Know
Victoria Durgin
Aug 28, 2025
Exterro Debuts Agentic AI Tools for Data Risk and E-Discovery 
Jordan Smith
Aug 26, 2025
Multi-OEM Strategies & More Key to Infrastructure in AI Era
Victoria Durgin
Aug 26, 2025
Kendra Krause on New Role at ThreatDown & Channel Goals
Victoria Durgin
Aug 25, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.