The dream of multiple-biometric IDs may become a reality in India
Computerworld - A ubiquitous identification system based on multiple biometrics has until now existed only in Hollywood movies. Today, India is attempting to make it a reality. Can the Indians pull it off?
The Unique Identification Authority of India's Aadhaar program, referred to as UID, will provide identity cards for that nation's 1.2 billion citizens. India's government now issues multiple special-purpose IDs, including a Permanent Account Number for income tax transactions, an Electors Photo Identity Card for voting, ration cards, health care cards, driver's licenses and passports. The UID will eventually replace all of those. The UID system will process hundreds of thousands of identity validation requests each second, against the world's largest database of individuals.
It's a huge project, with an estimated cost of $2.2 to $4.4 billion.
The UID will use multiple types of biometric data for identification, including retina scans, fingerprints for all 10 fingers, and multiple facial images. The system is so complex that no single company has all the required skills to develop it. A consortium of Accenture, MindTree (India), Daon (Ireland), and Neurotechnology (Lithuania) designed the biometric data capture, categorization, storage and retrieval processes.
The UID will yield significant benefits. Indians will need only one ID document for government services, banking and more. This is especially important for India's poor, many of whom can't access needed services because they can't prove their identity. Moreover, the government expects to save $4.3 billion annually with UID. By cross-referencing current systems and deduplicating databases, the government expects fraud to decline tremendously. The system will also reduce administrative costs associated with issuing multiple IDs and maintaining incompatible ID systems.
Critics, though, point to technological difficulties, compounded by social and environmental challenges. More than 70% of India's citizens live in villages with spotty electricity, and they may be wary of smart-card readers, say critics. And given India's 30% illiteracy rate, many people will be unable to read prompts. In addition, an environment that includes dust, large temperature swings and monsoons requires rugged and highly reliable equipment.
Other critics fear erosion of civil liberties. Misused, a national database could allow police or intelligence groups to discriminate against people by caste, religion or birthplace. According to The Wall Street Journal, "Numerous social studies show that knowledge of these identifiers adversely impacts delivery of services such as education and health care to disadvantaged citizens." Others worry that security will be inadequate. In November 2009, WikiLeaks published an internal working paper stating, "The UID Database will be susceptible to attacks and leaks at various levels."
Critics' arguments notwithstanding, IT organizations worldwide should monitor this impressive project. Begun in 2009, the 18-month initiative is a month ahead of schedule; pilot deployments begin this fall. If successful, the Aadhaar will have several byproducts. Other countries will likely adapt and adopt India's technology. In addition, the lesser-known companies contributing to the UID project will gain global recognition. And the concept of multiple-biomarker identification tools will be catapulted out of the movies and into everyday use. How long until your CEO demands them in your company's security systems?
Bart Perkins is managing partner at Louisville, Ky.-based Leverage Partners Inc., which helps organizations invest well in IT. Contact him at BartPerkins@LeveragePartners.com.
More by Bart Perkins
- Bart Perkins: Power to the people's devices
- Bart Perkins: Pester no more: How to handle the FCC's new rules on robocalls
- Bart Perkins: 3D printing is IT's next big challenge
- Bart Perkins: Benchmarking is great, when it's not a waste
- Bart Perkins: Global standards, meet local constraints
- Bart Perkins: Congratulations on your new supplier. Got a good prenup?
- Bart Perkins: Can't buy you love
- Bart Perkins: Jousting for jobs
- Bart Perkins: Unresponsive suppliers might just not be that into you
- Bart Perkins: Avoiding IT audit nightmares
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts