Forget fingerprints: Your iris is your new identity
Iris-centric law enforcement in Missouri
While most organizations use iris recognition as an additional authentication resource, law enforcement agencies in Missouri have made the technology central to everything they do. Missouri was the first state to use iris recognition as the core platform on which to build a statewide law enforcement records management and jail records management system for tracking people as they pass through the criminal justice system, says Mick Covington, director of the Missouri Sherriffs' Association.
The new system, purchased from MorphoTrust and used by sheriff's offices and the Missouri Department of Corrections, starts tracking people the moment they're arrested and booked.
"When someone comes into one of our jails, you get a read back in three seconds that tells you who they are and where they were last," Covington says. Deployed in 55 of the state's 115 counties to date, the system is used by county jails to, for example, identify people, check them in and out for court dates, and make sure medication is delivered to the right person at the right time.
The system will eventually upload iris data to a state repository that will in turn upload the data to the FBI's NGI database. The fact that the system doesn't require touching the individual is an advantage in a prison setting, Covington says, and the technology requires minimal staff training. "The quality of the images is much better now," he says. "And the machines are more user-friendly and more durable. They're cop-proof."
Iris recognition technology is continuing to evolve and outgrow its spy novel image, as is the manner in which users interact -- or don't interact -- with the systems. The technology is moving beyond what HRS's Norman calls a "coerced method of acquisition" -- exemplified by the types of systems historically used at border crossings and in prisons -- to a more social technology. "Social is if I go to a store and take a soda from a machine using a biometric," he says. "We're on the edge of moving into a personalization stage and away from this security/paranoia type of application. That's the next phase."
This article, "Forget Fingerprints: Your Iris Is Your New Identity," was originally published on Computerworld.com.
Robert L. Mitchell is a national correspondent for Computerworld. Follow him on Twitter at
twitter.com/rmitch, or email him at rmitchell@computerworld.com.
Read more about Security in Computerworld's Security Topic Center.
- iOS 7 Must Know Tips and Tricks
- Apple iPhone 5S vs. Nokia Lumia 1020: Which Camera is Better?
- How Tech Companies Can Succeed by Going Private
- CIOs Share How They Made the Leap to CEO
- Slideshow: 7 ways users drive IT support crazy
- How to spot a phishing email
- Social engineering: The basics
- 20 security and privacy apps for Android and iPhone
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- The 10 "Must-Haves" for Secure Enterprise Mobility. A security framework and evaluators' checklist.
- Critical Capabilities for Mobile Device Management Software Gartner reviews critical capabilities, attributes that differentiate products in a class in terms of their quality and performance, for mobile device management.
- Embracing BYOD Through Secure App and Data Delivery Enterprise mobility management in the real world. BYOD isn't just a trend; it's an important new model for allowing people to choose the...
- Integrated Data Protection for VMware infrastructure This paper describes how Data Protector enables fast, efficient, and reliable protection for mission-critical data and applications in VMware vSphere and vCloud Director...
- Live Webcast Securing Mobile Devices with Citrix XenMobile MDM In this video, Chief Demo Officer, Brad Peterson provides a demo of how Citrix XenMobile MDM works.
- Live Webcast Secure Mobile Email Users Will Love Maintain full control over sensitive corporate data
- Secure Mobile Email Users Will Love Maintain full control over sensitive corporate data
- Securing Mobile Devices with Citrix XenMobile MDM In this video, Chief Demo Officer, Brad Peterson provides a demo of how Citrix XenMobile MDM works. All Security White Papers | Webcasts