Professional Documents
Culture Documents
"The computer, with its insatiable appetite for information, its image of infallibility, its
inability to forget anything that has been put into it, may become the heart of a
surveillance system that will turn society into a transparent world in which our home,
our finances, our associations, our mental and physical condition are laid bare to use
most casual observer." (Prof. Arthur Miller. "Statement to Sub-Committee of US Senate on Administrative Practice
and Procedure" March 14th, 1967)
As with many rapidly expanding technologies that affect social life, biometrics has
in a justifiable manner come under attack by civil libertarians. Privacy advocates
argue that biometrics will lead to an even deeper erosion of personal privacy in both
the real world and cyber-space. In this paper we study the many privacy concerns
which have emerged following the increase in use and the popularity of biometric
systems for identification and authentication purposes in digital and physical
environments. We will argue that contrary to critics' arguments, Innovya’s traceless
biometrics solution is in fact completely traceless and noninvasive with regard to
personal privacy. Further, we hold that if these new traceless biometric systems are
used in conjunction with existing security mechanisms (such as public-key
algorithms), they can provide almost foolproof protection for electronic transactions
and other operations in smart environments. The key element however, is that
government intervention, in the form of a set of standards for how the new traceless
biometric solution will be adopted, is an absolute necessity for complete privacy
protection.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
For more information please contact Mr. Ronen Blecher: Ronen@Innovya.com
requiring the storage of any unique biometric information. Furthermore, the solution
does not need to link, write, or bind any unique information to an external device,
smart card, or network of any kind. The solution’s method is able to positively
recognize and identify biometric identity in real-time without violating the user’s
privacy and without leaving any intrinsic traces. The company was founded in 2006
by Michael (Micha) Shafir and Ronen Blecher, both experienced entrepreneurs from
the network security devices industry. The company owns a revolutionary patented
platform and method for Traceless Biometric Identification.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
intelligence. At the same time, researchers have continually been concerned with
improving the identification and authentication methods used for access to computer
systems and networks. Biometric authentication systems are a natural extension (to
computers) of the recognition methods that humans have used since the beginning
of time. In these systems, physical or behavioral characteristics of the person to be
authenticated determine whether he is indeed who he declared himself to be - this is
analogous to how people recognize each other (i.e. how they identify others and
verify that the person is who he appears to be) by examining physical features that
are essentially unique to the other person, like his face.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
A similar situation arises when a transaction involving a credit card number is
conducted on the Web. Even though the data are sent over the Web using secure
encryption methods, current systems are not capable of assuring that the transaction
was initiated by the rightful owner of the credit card, since both the real owner and
the counterfeiter are using the same transaction initiation process which is, the entry
of a credit card number and expiration date to the payment system. Indeed, for such
transactions even the card itself does not need to be physically present, further
increasing the potential scope of fraud and deceptive use of credit card information.
Biometrics contradictions:
Fortunately, automated biometrics in general and fingerprint technology in
particular, can provide a much more accurate and reliable user authentication
method. There are three classic bases for authentication: (1) something the user
knows (a password), (2) something the user has (a key, a smartcard), (3) something
the user is or does (biometrics). Biometrics is a rapidly advancing field that is
concerned with identifying a person based on his or her physiological or behavioral
characteristics. Examples of automated biometrics include fingerprint, face, iris, and
speech recognition.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
this reliance continues to increase the question becomes one of safeguarding
electronic information against misuse. There are thousands of databases of less
permanent information about people on computers, often servers connected to the
Internet. Names, addresses, credit card and bank account numbers are just some of
the personally identifying information that is being stored by independent
information traders, including state and federal governments. We all must be aware
that biometrics exposure may take a long period of time to recover (actually a life-
time period). Can anybody implant ‘new’ biometrics in case of exposure? Anything
can be faked but, if someone owns your biometrics he practically owns your
identity. Exposing or losing biometric property is lost for life.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
about themselves should not be automatically available to other individuals and
organizations, and that, even where data is possessed by another party, the
individual must be able to exercise a substantial degree of control over that data
and its use." In other words, users of computer systems (especially those in
networked environments) expect that those who store their personal information
will not abuse it. They expect too that wherever their personal information is being
stored, it is safe, so even if a hacker were to succeed in breaking into the computer
or server on which this data were stored, it would be protected. Users expect also to
be able to communicate anonymously. This is especially important for those who
want to criticize the government, or an employer without having to worry about
victimization.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
Vendors and scanner operators may say that they protect privacy in some way,
perhaps by hashing the biometric data or designing the database to enforce a privacy
policy. But the end user typically has no way to verify whether such technical
protections are effective or implemented properly. End users should be able to
verify any such claims, and to leave the system completely if they are not satisfied.
Exiting the system should at least include expunging the end user's biometric data
and records.
Despite these concerns, political pressure for more deployment of biometrics is
increasing. Much U.S. federal attention is devoted to deploying biometrics for
border security. This is an easy sell, because immigrants and foreigners are
politically speaking, easy targets. But once a system is created, new uses are usually
found for it, and those uses are not likely to stop at the border.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
2. Constitutional Provisions
Though there is no clearly defined right to privacy in the U.S. Constitution,
privacy rights are implied in several of the amendments. The right to privacy is
rooted in the 4th Amendment, which protects individuals from unreasonable
search and seizure; the 5th Amendment, which protects individuals from self-
incrimination, and the 14th Amendment, which gives the individual control over
his personal information.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
people do not want dispersed. The threat to privacy arises from “the ability of third
parties to access this data in identifiable form and link it to other information,
resulting in secondary uses of the information, without the consent of the data
subject.” This would be a violation of the Code of Fair Information Practices, since
the individual would no longer have control over the dissemination of his personal
information.
People have generally frowned on biometrics, in particular fingerprints, because of
the long association with criminal identification, and more recently because of its
use in State welfare schemes to prevent recipients from making double claims on
their benefits. The argument is that people are reduced to mere codes and are subject
to inanimate, unjust treatment. A similar argument against the use of biometrics is
that traceable biometric identifiers are an "example of the state's using technology to
reduce individuality." This type of identification corrupts the relationship between
citizen and state because it empowers the state with control over its citizens.
Religious groups argue that traceable biometric authentication methods are “the
mechanism foretold in religious prophecy” (e.g. the Mark of the Beast). Further
religious objections are based on the premise that individuals must give up
themselves, or part of themselves, to a symbol of authority which has no spiritual
significance.
Though there are no documented cases of biometric technologies causing actual
physical harm to users, certain methods are considered as invasive. For example,
retina scanning requires the user to place his eye as close as three inches away from
the scanner so that it can capture an image of his retina pattern. Fingerprint
recognition devices too are deemed as invasive because they require the user to
actually touch a pad.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
secure protection against impersonators. Criminals in the real world and cyberspace
commonly exploit weaknesses in token-based and knowledge-based authentication
systems in order to break into an individual's bank account. Using a biometric
identifier for access to systems makes it much more difficult for such compromises
to occur. Second, Woodward argues that biometrics is a friend to privacy because it
can be used to limit access to information. Finally, he proposes that biometrics is a
privacy-enhancing technology. Innovya traceless biometric algorithms use
biometric characteristics to construct non-unique biometrics with a unique
identifier code that can be reconstructed only with a particular identifier. This means
the person's actual physical characteristics are not stored by the system. These types
of biometric systems can be used to create PINs for users, thus providing a form of
anonymous verification.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
This is a first step toward privacy protection for users of biometric systems, but it is
lacking. First, it suggests only self-regulation for the private sector. This means
there would be no legal way to punish corporations for misuse of biometric
information. This would leave the current state of affairs as is. It is imperative that
database managers be accountable for how they handle people's information.
Second, it is hard to keep track of who is adhering to these principles and who is
not. There are many companies that do not audit how information is used and
disclosed. Businesses commonly sell information to each other in order to use data
mining algorithms to discover consumer trends, and send them targeted advertising
material. Third, it makes no mention of what sorts of technological solutions can be
used to deal with the privacy problem. Engineers need to come up with different
methods so individuals can have more control over their personal information.
Innovya's Traceless Biometric technology which uses a non-unique biometric
identifier to create a PIN is an example of how industry can design safer and more
secure systems.
Government policy-makers and industry need to collaborate to ensure that there are
legal prohibitions against the selling, collecting or exchanging of biometric
identification databases to third parties:
• That there is legislation to ensure that electronic storage of biometric identifiers
will not be carried out in the same manner as companies' other information. It
must not be there in the first place.
• That there are legal prohibitions against the use of peoples’ biometric
characteristics for identification purposes without their consent.
• That there are legal prohibitions against using traceable biometric identifiers for
discriminatory purposes either by law enforcement agencies or the private
sector.
Industry and governments need to set up and fund a research organization (or extend
the research scope of the government-funded Biometric Consortium) to design
traceless biometric authentication systems that fall in the realm of privacy-
enhancing technology. The implications of such collaboration could eliminate the
privacy problems created by security solutions that use biometric identifiers. This
would also provide a model for how to approach the wider privacy issue which is a
consequence of the ubiquitous presence of computers and the wealth of information
available on the Internet.
Conclusion:
The digital evolution that we are witnessing today is leaning ever more strongly
toward smart environments where humans and computers are in symbiosis.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
sector information traders to exploit individuals. Their stance is that biometrics will
lead to an even deeper erosion of personal privacy in both the real world and
cyberspace; that it will foster Big-Brother monitoring of citizens by the government;
and that individuals will lose their anonymity whenever they use traceable biometric
devices to authenticate themselves. In the absence of adequate legislation to regulate
how such information is deployed and used, some of the predictions of the critics of
biometrics may well materialize. What is needed is for policy makers (who
represent the ethical interests of individuals) and engineers of biometric systems
(who represent the technological interests of individuals), to collaborate so that a
well-defined legal framework within which traceless biometric technologies can
safely operate and advance is established. Innovya Research and Development has
already begun designing and implementing traceless biometric systems tailored
toward giving the user as much control as possible over his information. It is now
time for policy makers to look more closely into what contributions they can make
to accommodate the privacy interests of individuals.
Innovya’s solution:
When designing a security system, it is best not to make it too powerful. If an
intruder manages to gain access, he has more power over you. If however, the
security system is simpler, the intruder’s success is more limited. Innovya’s
technology overcomes these disadvantages by using its patented traceless
biometrics for identifying an individual with a biometric identifier that is designed
to be non-unique. Innovya uses an amorphous and non-unique biometric identifier
agent called ‘BIdToken’ (Biometric Identifier Token) that is designed to be
biometrically traceless, so that an image or copy of the biometric information does
not need to be maintained. Instead, the BIdToken refers to an incomplete and non-
unique identifier obtained from the biometric information. By ‘incomplete’ we
mean that the biometric information itself cannot be reconstructed from the
BIdToken, because the necessary information is discarded during processing of the
biometric information.
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only
Author:
Michael (Micha) Shafir – Cofounder seasoned entrepreneur (RadWare, MagniFire,
CrossID)
Email: micha@Innovya.com
Direct: +972 54 4837900
All content copyright © 2006 Innovya R&D Ltd. All rights reserved.
Highly Confidential – Limited circulation only