• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Bank’s Approach to Biometric Authentication a ‘Valid’ One

    June 10, 2008 Alex Woodie

    Keeping unauthorized users out of its core banking systems and complying with industry regulations are top priorities for the International Bank of Miami. One way to satisfy these requirements is to implement a strong password enforcement system. However, with users already inundated with passwords, the bank decided to try another strong security mechanism–i OS-based biometric authentication from Valid Technologies–which has streamlined the sign-on process, and cut down password reset calls to the help desk.

    With more than $800 million in assets, The International Bank of Miami, or TIBOM, is one of the largest independent banks in South Florida. TIBOM provides financial services in the areas of commercial and real estate lending, personal and online banking, correspondent banking, and Small Business Administration lending. Powering TIBOM’s business are a collection of IBM System i and Microsoft Windows applications. These applications run on a collection of servers that the bank operates at its headquarters in Coral Gables, Florida, and its hotsite, or which are outsourced to third-party service providers.

    About two years ago, the bank started preparing for new industry regulations calling for strong authentication of users logging onto any systems that have an exposure to the Internet. Heading up this endeavor was Ray Guzman, who was TIBOM’s CIO at the time, and who now services the bank as an independent consultant.

    The most obvious solution to this requirement would be to implement a password-based authentication system that enforced the use of strong passwords, with a mixture of letters and numbers in hard-to-guess combinations, and a policy requiring passwords to be changed every 30 to 60 days.

    Biometric Authentication

    However, Guzman was hesitant to implement such a system. Like most groups of users, TIBOM employees were already so inundated with passwords that they had trouble remembering them. As a result, more than 30 percent of all the calls to the bank’s help desk were for password reset requests. Instead, Guzman started researching biometric authentication program, which enable users to sign-on to their applications with a simple swipe of their finger across a scanner that attached to their PC via a USB port.

    Most of the authentication systems Guzman looked at ran on Windows, which was a concern. “I wasn’t too happy with that, because the security of the application to me was number one,” he says. “I wanted to make sure that the biometric solution was running on an OS platform that I trusted.”

    Right before Guzman was to make his decision on a new authentication system, he heard about Valid Technologies’ biometric authentication system, called Valid Secure Systems Authentication (VSSA). VSSA runs on the i OS (formerly i5/OS), which is one of the most secure operating systems in use today.

    Guzman compared VSSA to the Windows-based solution. They both offered equivalent functionality at an equivalent price, but the fact that VSSA runs on i was a dealmaker for Guzman. “What caught my eye was the solution would run on the OS/400 platform. I hadn’t seen that before, so I immediately became very interested,” he says.

    Running a Windows-based biometric system might be OK for internal users. “But I was looking for more. I was looking for a service oriented architecture solution that would be more than for internal users. It would be for customers of the banks as well as for customers inside the bank,” he says. “Once I saw VSSA, I said ‘This is what I’m looking for.'”

    VSSA Implementation

    Guzman started testing VSSA on TIBOM’s System i 525 server about a year ago. The initial install, which involves inserting VSSA program calls into the target applications, went smoothly, according to Guzman. The test targeted TIBOM’s Microsoft Active Directory running on Windows Server 2003, which is used to control access to its applications and network.

    “It was clear to me that it was a simple solution, yet because it was on the OS/400 server, it was very secure,” Guzman says.

    The test was a success. Today, whenever one of TIBOM’s 150 internal users attempt to sign-on to specific Windows and i (OS/400) applications, instead of prompting for a password, the bank’s Active Directory server requests users to place their fingers on the USB-based scanners from APC, which check their fingerprints against the original prints (actually, a binary rendition of the prints) stored on the System i server.

    Once users were enrolled in the VSSA system (which wasn’t the easiest part of the process–see below for more), the results were immediate and dramatic. Calls to the help desk dropped by more than 25 percent, freeing up TIBOM’s IT staff to focus on other problems. Guzman estimates TIBOM has recuperated most of the costs of the VSSA implementation in the first year of usage.

    Not all of TIBOM’s banking applications are utilizing VSSA for authentication. Its i OS-based wire transfer application is hooked up to VSSA, as are various Windows applications. Plans are being made to use VSSA with TIBOM’s Internet banking Web site.

    But its core banking system, developed by a prominent Midwestern i OS banking software company, is not yet hooked in. The integration work for VSSA has been done and tested. However, because the vendor runs TIBOM’s banking software for it as part of an outsourcing arrangement and TIBOM does not have ready access to the server, and because TIBOM is asking the vendor to tweak the RPG source code (not to mention that the vendor offers a Windows-based biometric alternative), caution has been the word in getting this application hooked up to the fingerprint scanners.

    The Enrollment Process

    “In my opinion the enrollment is the most important piece of the VSSA puzzle,” Guzman says. “If you don’t enroll users the right way, they will not accept the solution because they’re going to have a lot of false negatives.”

    The enrollment process involves working with users to scan their fingerprints into the VSSA database, and then show them how to correctly use the APC scanners each time they want to log onto the system.

    TIBOM had some user issues in the early days of the enrollment process. Guzman attributes it to a lack of training of his IT staff. Once a solid procedure was mapped out–including graphics showing the correct way to place fingers on the scanner–there were few problems with the system. “There’s a procedure, and they have to follow it exactly,” Guzman says.

    The second most important piece of the puzzle is educating users about the information collected and stored by VSSA, Guzman says. VSSA doesn’t keep a copy of fingerprints or even an image of fingerprints that are scanned into the system. Instead, it creates a binary rendition–a number–based on the unique curves of an individual’s fingerprint, and it’s this unique number that’s used to authenticate the user.

    Some TIBOM users were hesitant to allow their employer to scan their fingers. However once Guzman or one of his IT staff explained to the users that there they were not compromising their privacy in any way, then they were OK with it.

    “You must do individual training,” Guzman says. “You have to take two to three minutes to explain to them what’s going on, how the system works, that we don’t have a picture of your finger anywhere in the systems, that there’s no way that we can reproduce the fingerprint or a picture of a fingerprint because VSSA can only use a template kind of technology . . . once you explain that to the customer, they say, ‘Oh, great, excellent.’ If you don’t do that, then they will come to you and say ‘I don’t want a picture of my finger anywhere on the network.'”

    However, explaining this in such a way that doesn’t insult the user can be challenging. “You don’t want to make the customer look dumb,” he says. “You have to be very careful, and you have to explain it in a way that is not a technical way.”

    Overall, Guzman is very happy with the VSSA implementation. TIBOM is complying with regulations, forgotten passwords are less of a problem, and there is less room for abuse of system privileges.

    RELATED STORIES

    Pat Townsend to Resell Valid’s i5/OS Biometric Authentication

    Valid Tech Assimilates Biometric Authentication Into the Enterprise

    Valid Tech Delivers Biometric Authentication Solution for OS/400



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    COMMON:  Join us at the Focus 2008 workshop conference, October 5 - 8, in San Francisco, California
    Profound Logic Software:  Web-enable in less than a day with Genie
    Vision Solutions:  System i Management Tips Blog - Free i5/OS Tips Each Week!

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    Getting Started with PHP for i5/OS: List Price, $59.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Recent Acquisitions Helping the BOS Cause Keeping 5250 Alive

    Leave a Reply Cancel reply

Volume 17, Number 23 -- June 10, 2008
THIS ISSUE SPONSORED BY:

MKS
Bytware
Seagull Software
nuBridges
Twin Data

Table of Contents

  • Bank’s Approach to Biometric Authentication a ‘Valid’ One
  • Programmer Conveniences Added to BCD’s WebSmart ILE
  • ASNA Brings RPG to .NET Migration Software to Latest Windows IDE
  • Safestone Re-emerges with New Corporate Identity, i OS Security Tools
  • NetManage and HiT Software Partner for Structured Data
  • Brooks Updates Remote Print Manager with Customized Workflows
  • NGS and Munson Good for Laughs
  • Small Insurance Companies Get On-Demand BI Service
  • IBM Mashup Center to Offer Online Trials
  • Vision Signs Filipino Retailer to HA Contract

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23
  • SEU’s Fate, An IBM i V8, And The Odds Of A Power13
  • Tandberg Bankruptcy Leaves A Hole In IBM Power Storage
  • RPG Code Generation And The Agentic Future Of IBM i
  • A Bunch Of IBM i-Power Systems Things To Be Aware Of
  • IBM i PTF Guide, Volume 27, Numbers 21 And 22

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle