Feeds

RSA gets into fingerprints

Factor 3

  • alert
  • submit to reddit

Seven Steps to Software Security

RSA Security is to add biometric recognition technology to its popular line of two-factor authentication products. This will give customers the opportunity to add another layer of authentication to its identity management system.

RSA Security will integrate Precise Biometrics' Precise BioMatch fingerprint authentication technology with RSA SecurID Passage smart card software and the RSA SecurID USB Token to enable strong protection and validation of a user's identity based on a biometric.

RSA plans to provide an integrated biometric/smart card package for customers who want either strong two or three-factor authentication. This technology could be used in applications such as protect access to corporate apps, to unlock credentials stored on a smart card, or to digitally sign electronic forms or documents.

Organisations needing to balance ease of use with another level of security can select from either two or three-factor authentication with the use of a smart card or USB token (something you have) the biometric (something you are) and a PIN (something you know).

Sarah Kent, RSA bizdev director, said the company is seeing customer interest in three-factor authentication to control access to government buildings. For enterprise customers, integration between RSA's tokens and biometrics technology has ease of use advantages because it means companies can do away with the need to use PINs.

RSA Security expects to make the integration with Precise Biometrics technology available in the second half of 2003.

RSA SecurID Passage replaces static passwords with a Java platform smart card for user authentication to workstations, networks and sensitive data. Its Java Card multi-application capability allows customers to deploy other applications - ranging from electronic purse, custom designed employee applications and now biometric functionality - to the same card. The RSA SecurID USB Token combines a USB device with secure storage of digital credentials on a standards-based Java platform. ®

Related Stories

RSA teams up with Courion for identity management
UK firm touts alternative to digital certs
Microsoft marries RSA Security to Windows
Liberty Alliance unveils secure sign-on specs
RSA touts DIY certificates

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.