Checking Out Biometric Security

RSS

I’ve be carrying Apricorn’s Aegis Bio - USB 3.0 (Fig. 1) for awhile and I have been pleased with its overall operation. It uses fingerprint biometrics to unlock access. The drive uses 256-bit AES-XTS hardware encryption so it can take advantage of USB 3.0 throughput.

The nice thing about these types of drives is that they operate with any operating system. I actually put a Windows, Linux ext4 and MacOS partition on the drive. Yes, the partitions do make a difference. The Mac only syncs with a MacOS partition and Windows wants an NTFS partition to maintain its attributes. Using the drive with any of the systems was a matter of plugging in the built-in USB cable and swiping a finger over the sensor.

The drive remembers up to five fingerprints but the only option to change them after five have been programmed requires a complete wipe of the hard drive. Of course, this is usually not necessary since one typically registers fingers once. It is recommended to have at least two or three fingers registered for the primary user. Using fingers on different hands is useful as well. Five fingerprints are sufficient for two people.

It is possible to use one fingerprint per user but recognition is not 100%. That is why having at least two per person helps. I usually got the system to recognize my primary finger after two swipes and have never used the backups except to occasionally test the system. On the other hand, the drive does have a more difficult time recognizing my wife’s fingerprint.

The registration process is a bit arcane since the only I/O consists of three colored LEDs, the fingerprint sensor and one button. Still, once the fingers are registered the system can be utilized easily. It is simply a matter of swiping a registered finger when the red LED is on until the finger is recognized and the green LED lights.

The advantage is that you do not have to remember or enter a code to gain access to the drive. I have also use Apricorn’s secure drive with that employs a keyboard for entering a password (see Secure USB 3.0 Hard Drive). This system does have the advantage of master passwords and more selective programming. I use a ten digit PIN so getting the system to work takes a bit more time and any error takes longer to correct. Failure to recognize a fingerprint takes less than a second so retries are fast.

Biometrics like fingerprints can be spoofed but not easily. Of course it does require access to one’s fingerprint and you need to know what fingers are registered. In general, these types of drives provide good protection if they are lost or stolen.

The one downside is that a drive can be reset thereby destroying all the data. It must be done deliberately. Unfortunately there is no indication that a drive has been reset and reprogrammed. This is true for most other drives of this type that I have seen including those using keypads. On the other hand, this would not be very different from someone erasing or formatting a conventional hard drive.

So far I find the Aegis Bio to be more convenient that the keypad-based sibling. I actually have to keep the PIN for the latter in a safe just in case. I tend forget it when I have not used the drive for awhile.

The Aegis Bio comes with a carrying case and an extension USB cable with dual plugs in case a single USB host connection does not provide sufficient power. Any USB 3.0 host will work nicely as will most USB 2.0 hosts.

As with any hard drive, you will want to have a backup. The security these drives provide is very good but security does not equate to data integrity. A file can be deleted or corrupted by an application or operating system by accident or on purpose and the encryption support will make no difference.

The Aegis Bio starts at $199 so security comes at a premium but still very affordable compared to unsecured drives. Software-based security is a lower cost option but it is not as secure and it can be harder to use especially if the drive is used with different systems. For the average user, the Aegis Bio makes a lot more sense.

Discuss this Blog Entry 18

on Mar 9, 2016

Therefore protection comes in a quality but nonetheless really inexpensive when compared with unprotected devices, the Aegis Biography begins at $199. Application-based protection is just a less expensive option-but it's as insecure also it could be tougher to make use of particularly if the push can be used with various methods www.imagyneer.com/. For that typical person, much more sense is made by the Aegis Biography.

on Mar 10, 2016

Consequently safety is available in an excellent but nevertheless truly cheap in comparison with products that are unprotected, the Aegis Resource starts at $199 www.massagercodes.nation2.com/ . Software-based safety is a more affordable choice-however itis as vulnerable additionally it might be harder to create use of especially if

on Mar 16, 2016

Just like any drive, you'll wish to have a copy. Protection doesn't equal information reliability although the protection these devices supply is great www.buykidsbedroomsets.com/. A document damaged or could be erased by an operating or application system accidentally or purposely and also no distinction will be made by the security assistance.

on Mar 16, 2016

Consequently safety is available in an excellent but nevertheless truly cheap in comparison with products that are unprotected, the Aegis Resource starts at $199 www.society-inserts.wallinside.com/. Software-based safety is a choice that is more affordable -however itis not as secure additionally it might be harder to create use of especially

on Mar 18, 2016

Of course, SEO perform is actually the sales of information and keeping the information a technique is important, but the mixture of secrecy and no responsibility for outcomes really creates SEO methods dangerous www.thruststage.livejournal.com/. So, how can an SEO organization slow up the danger for the customer and deliver the best quality of service?

on Mar 24, 2016

Consequently safety is available in an excellent but nevertheless truly cheap in comparison with unprotected products www.smore.com/vrv61-gaming-station, the Aegis Resource starts at $199.

on Mar 26, 2016

Consequently safety is available in an excellent but nevertheless truly cheap in comparison with products that are unprotected, the Aegis Resource starts at $199 www.workoutmotivation.jimdo.com/. Software-based safety is a choice that is more affordable -however itis not as secure if the drive may be used with different techniques additionally it might be harder to create utilization of especially

on Mar 28, 2016

As with any hard drive, you will want to have a back-up. The protection these pushes provide is very good but protection does not equal data reliability www.tabletcasez.yolasite.com/. Data can be removed or damaged by an program or os by incident or on objective and the security support will make no difference.

on Mar 29, 2016

Consequently safety is available in an excellent but nevertheless truly cheap in comparison with products that are unprotected, the Aegis Resource starts at $199 www.myfashiontrendsite.wordpress.com/ . Software-based safety is a choice that is more affordable -however itis not as secure additionally it might be harder to create use of especially

on Mar 30, 2016

Just like any drive, you'll wish to have a copy www.unsigned.com/gtasanandreasapkgame . Protection doesn't equal information reliability although the protection these devices supply is great. A document damaged or could be erased by an operating or application system accidentally or purposely and also no distinction will be made by the security assistance.

on Apr 1, 2016

The same as any push, you will want a duplicate. Even though safety the unit offer is very good safety does not equal info stability www.coolingfans.wordpress.com/. A doc broken or might be removed by a software or running program intentionally or inadvertently as well as the protection help will not makes any difference.

on Apr 2, 2016

It is possible to use one side marks per customer but identification is not 100%. That is why having at least two per individual allows. I usually got the program to identify my main side after two swipes and have never used the back-ups except to sometimes analyze the program. However, the generate does have a more hard time acknowledging my wife’s side marks www.laptoprepairguide.shutterfly.com/.

on Apr 6, 2016

Consequently security is available in an excellent but nevertheless truly cost-effective in assessment with products that are unprotected, the Aegis Resource starts at $199 www.narutoguide.com/. Software-based security is a choice that is more cost-effective -however itis not as effectively properly secured furthermore it might be more complicated to function with especially

on Apr 5, 2016

It is possible to use looking after represents per client but recognition is not 100%. That is why having at least two per personal allows www.lawncareservicessite.wordpress.com. I usually got the system to recognize my primary part after two swipes and have never used the back-ups except to sometimes look at the system.

on Apr 5, 2016

It is possible to use looking after represents per client but recognition is not 100% www.brokersassociation.snack.ws/. That is why having at least two per personal allows. I usually got the system to recognize my primary part after two swipes and have never used the back-ups except to sometimes look at the system.

on Apr 5, 2016

Just like any produce, you'll wish to have a replica . Security does not comparative information balance although the security these items offer is great. A documents damaged or could be eliminated by an operating or system system accidentally or deliberately and also no distinction will be made by the security assistance www.graveyardempires.jimdo.com/.

on May 28, 2016

Just like any generate, you'll wish to have a duplicate. Protection doesn't equivalent information stability although the protection these products provide is great www.designwebworld.com/stall-exihibition-designers-mumbai.htm. A papers broken or could be removed by an working or program system unintentionally or intentionally and also no difference will be made by the protection support.

on Jun 9, 2016

This is my first time visit to your blog and I am very interested in the articles that you serve. Provide enough knowledge for me. Thank you for sharing useful and don't forget, keep sharing www.cosdobrego.pl/przepis-na-kotlet-de-volaille-z-serem/.

Please or Register to post comments.

What's alt.embedded?

Blogs focusing on embedded, software and systems

Contributors

William Wong

Bill Wong covers Digital, Embedded, Systems and Software topics at Electronic Design. He writes a number of columns, including Lab Bench and alt.embedded, plus Bill's Workbench hands-on column....
Commentaries and Blogs
Guest Blogs
Jul 15, 2016
blog

Simple Yet Effective ESD Testing Methods for Higher Reliability 5

There are multiple ways to test for electrostatic discharge, ranging from implementing a human-body or machine model to....using a balloon and a comb?...More
Apr 8, 2016
Commentary

Confabbing on the Fabless Fad 4

High capital and maintenance costs, and EDA advances along with abstractions to deal with chip complexity, have been leading contributors to the fabless migration....More
Mar 2, 2016
Article

Home or Very Small Office Electronic Circuit Prototypes, Part 4 22

Part 4 focuses on testing for a reflow oven and build of a mixed SMT/through-hole board....More

Sponsored Introduction Continue on to (or wait seconds) ×