The dream of multiple-biometric IDs may become a reality in India
Computerworld - A ubiquitous identification system based on multiple biometrics has until now existed only in Hollywood movies. Today, India is attempting to make it a reality. Can the Indians pull it off?
The Unique Identification Authority of India's Aadhaar program, referred to as UID, will provide identity cards for that nation's 1.2 billion citizens. India's government now issues multiple special-purpose IDs, including a Permanent Account Number for income tax transactions, an Electors Photo Identity Card for voting, ration cards, health care cards, driver's licenses and passports. The UID will eventually replace all of those. The UID system will process hundreds of thousands of identity validation requests each second, against the world's largest database of individuals.
It's a huge project, with an estimated cost of $2.2 to $4.4 billion.
The UID will use multiple types of biometric data for identification, including retina scans, fingerprints for all 10 fingers, and multiple facial images. The system is so complex that no single company has all the required skills to develop it. A consortium of Accenture, MindTree (India), Daon (Ireland), and Neurotechnology (Lithuania) designed the biometric data capture, categorization, storage and retrieval processes.
The UID will yield significant benefits. Indians will need only one ID document for government services, banking and more. This is especially important for India's poor, many of whom can't access needed services because they can't prove their identity. Moreover, the government expects to save $4.3 billion annually with UID. By cross-referencing current systems and deduplicating databases, the government expects fraud to decline tremendously. The system will also reduce administrative costs associated with issuing multiple IDs and maintaining incompatible ID systems.
Critics, though, point to technological difficulties, compounded by social and environmental challenges. More than 70% of India's citizens live in villages with spotty electricity, and they may be wary of smart-card readers, say critics. And given India's 30% illiteracy rate, many people will be unable to read prompts. In addition, an environment that includes dust, large temperature swings and monsoons requires rugged and highly reliable equipment.
Other critics fear erosion of civil liberties. Misused, a national database could allow police or intelligence groups to discriminate against people by caste, religion or birthplace. According to The Wall Street Journal, "Numerous social studies show that knowledge of these identifiers adversely impacts delivery of services such as education and health care to disadvantaged citizens." Others worry that security will be inadequate. In November 2009, WikiLeaks published an internal working paper stating, "The UID Database will be susceptible to attacks and leaks at various levels."
Critics' arguments notwithstanding, IT organizations worldwide should monitor this impressive project. Begun in 2009, the 18-month initiative is a month ahead of schedule; pilot deployments begin this fall. If successful, the Aadhaar will have several byproducts. Other countries will likely adapt and adopt India's technology. In addition, the lesser-known companies contributing to the UID project will gain global recognition. And the concept of multiple-biomarker identification tools will be catapulted out of the movies and into everyday use. How long until your CEO demands them in your company's security systems?
Bart Perkins is managing partner at Louisville, Ky.-based Leverage Partners Inc., which helps organizations invest well in IT. Contact him at BartPerkins@LeveragePartners.com.
More by Bart Perkins
- Bart Perkins: Pester no more: How to handle the FCC's new rules on robocalls
- Bart Perkins: 3D printing is IT's next big challenge
- Bart Perkins: Benchmarking is great, when it's not a waste
- Bart Perkins: Global standards, meet local constraints
- Bart Perkins: Congratulations on your new supplier. Got a good prenup?
- Bart Perkins: Can't buy you love
- Bart Perkins: Jousting for jobs
- Bart Perkins: Unresponsive suppliers might just not be that into you
- Bart Perkins: Avoiding IT audit nightmares
- Bart Perkins: Beware of self-destructing messaging in the enterprise
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts