* Trade in your pins and passwords for prints Eric Beck is a personable guy. His home is an inviting place; his friends always welcome.But Beck also brings work home – files and financial data from Complete Graphix, his North Miami Beach, Fla., promotional products company. So he needed a way to ensure that a friend Web surfing on Beck’s home PC didn’t stumble across his firm’s financial records or client projects.Tired of authentication methods that rely on pins and passwords that must be changed frequently, Beck decided to try U.Are.U, a fingerprint reader from Digital Persona. With it, he can secure select files on his PC – ensuring only Beck and his wife, Shannon, can open the files.Biometric authentication uses a person’s distinct characteristics, such as a signature, fingerprint, iris, voice or facial scan, to secure or open a computer, software application, folder or document. It’s also used to control access to facilities or rooms within a corporate office. Biometrics isn’t the stuff of Hollywood, the CIA or Fortune 500 firms trying to stop corporate espionage. The industry is booming, with a projected $153 million in revenue for 2003 and 47% compounded annual growth through 2007, according to Allied Business Intelligence (ABI), a research firm in Oyster Bay, N.Y. ABI attributes some of the growth to security measures resulting from the Sept. 11 terrorist attacks.Moreover, there are a host of products priced for the home and small office, including Digital Persona’s U.Are.U fingerprint scanner and software ($79.99), and Biolink’s U-Match Mouse, which has a built-in fingerprint reader ($89.95). For remote workers with laptop computers, Identix BioTouch PC card ($179) slips into the PC Card slot, exposing a fingerprint touch pad. In the case of U.Are.U, setup is a simple three-step process. You plug the biometrics reader into the USB port and install the software. Then you scan two or more fingers; manufacturers recommend scanning multiple fingers, in case one is injured or blemished and the scanner cannot read the print. Next, you set the point at which security function is enabled, such as when the computer boots up, when the screen saver activates, or when a file or application is opened. You can program biometric applications to allow different users different levels of access, so you can lock down specific directories or subdirectories, while leaving others open to access.Failure rates, including false accept (when the device falsely recognizes the wrong finger or print) or false reject (when it declines the right finger), hover near 1%, says Harvey Bondar, vice president of marketing with Digital Persona. Users simply try again to get it open. If the system corrupts or fails to open, the user can bypass the scan and enter a code word into a dialog box. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe