Touchy Subject

Biometric technology: Is it time for your computer to get to know you?
Magazine Contributor
3 min read

This story appears in the April 1999 issue of Business Start-Ups magazine. Subscribe »

Keep forgetting the passwords to your confidential computer files? In a few years, you may be able to forget them permanently. Instead, biometric devices will verify your identity based on the unique attributes of your fingerprints, facial features, voice or even your handwriting. Recent breakthroughs in microchip technology and manufacturing processes have reduced both the size and the price of biometric devices. Taking advantage of such innovations, a small but growing number of PC makers, including , are planning to incorporate biometric devices such as fingerprint readers into the keyboards and laptop casings of future product lines.

Still, given the cost and effort involved in switching from passwords to a relatively unproven technology like voice verification or fingerprint reading, why should a protect its computers with a biometric security system? Because passwords have simply ceased to provide an adequate level of , says Robert Clyde, vice president and general manager of the Security Management Business Unit at AXENT Technologies Inc., a Rockville, Maryland, provider of information security solutions.

"Unfortunately, password cracking has become pretty straightforward," Clyde says. "Users choose passwords that are pretty easy to guess, and password-cracking programs are getting more powerful. Even passwords that were thought to be secure five years ago may not be secure today."

Another reason to upgrade to is convenience. "The biggest difference between biometrics and a password is that a fingerprint is a password you just don't forget," says Ed Murrer of Santa Clara, California, Veridicom Inc., a manufacturer of fingerprint readers. "In a few larger corporations, it's been shown that 50 percent of help-desk calls are related to forgotten passwords." It also means your IT manager will spend less time changing, updating and tracking passwords, and more time on important business functions.

While fingerprinting's similarity to police booking procedures might bother some people, Murrer says it hasn't really been an issue. "The people who adopt this technology know they have a security problem and believe the cure is worth the medicine," he says. "Fingerprint readers are used to authenticate users, not identify them."

Who's Got It?

  • Fingerprint recognition: Key Tronic's Secure Finger Scanner Keyboard ( has incorporated a fingerprint-recognition device into a standard 104-key Windows keyboard.
  • Face recognition: FaceIt PC software from Visionics Corp. ( uses a video camera (not included) to detect the presence of an authorized user in front of a PC.
  • Voice verification: T-NETIX Inc.'s VoicEntry I software ( features a voice-secured screen saver that remains locked until a registered user speaks a password into a microphone (not included).
  • Signature verification: Cyber-SIGN from Cyber-SIGN Inc. ( verifies users' identities by the shape, speed, stroke and pressure of their signatures as written on an electronic pad included with the software.

Contact Sources

AXENT Technologies Inc.,

Veridicom Inc., (408) 588-9400,


More from Entrepreneur

Get heaping discounts to books you love delivered straight to your inbox. We’ll feature a different book each week and share exclusive deals you won’t find anywhere else.
Jumpstart Your Business. Entrepreneur Insider is your all-access pass to the skills, experts, and network you need to get your business off the ground—or take it to the next level.
Let us help you take the NEXT step. Whether you have one-time projects, recurring work, or part-time contractors, we can assemble the experts you need to grow your company.

Latest on Entrepreneur