Mobility and Biometrics

G T Hochstetter 03Dec2013 Disruptive Technologies

• Disruptive technologies such as cloud, mobile , social and big data, are all transformational IT trends that Unisys has been tracking for many years now and innovating within our portfolio. As we kick off 2013, we wanted to provide a glimpse from our various subject matters experts in terms of what we might expect from these trends throughout the course of the year. How will these major trends evolve and what kinds of new challenges and opportunities might we expect CIOs to encounter as they continue to leverage these trends across their organizations for strategic business benefit? In a recent article for ComputerWorld, I outlined 10 CIO considerations for disruptive trends in 2013 . Rather than predictions, these were considerations that we anticipate CIOs to encounter throughout the year looking across all of these disruptive trends. Some of the major themes included leveraging unique new combinations of the trends, driving initiatives from the end user perspective, managing complexity while transforming the entire IT stack on the fly, and re- thinking application development frameworks. In our set of six blogs highlighted below, our Unisys subject matter experts examine each disruptive trend individually. Within each blog, they provide their views in terms of both new and ongoing business benefits we anticipate CIOs will be extracting from these trends, and also some of the underlying challenges and complexities they will need to address as part of the journey. You can review each blog by clicking on each trend below: Cloud Computing Mobile Computing Social Computing Big Data / Smart Computing IT Appliances From CyberSecurity www.unisys.com McKinsey Global Institute

• McKinsey Global Institute Ranks Most Disruptive Technologies to 2025 • What technologies will most radically transform human life in the twelve years? The McKinsey Global Institute looked at more than a hundred possible candidates across a variety of technology fields and narrowed the most potentially disruptive down to a dozen. They are, in order of size of potential impact: • Mobile Internet defined as "increasingly inexpensive and capable mobile computing devices and Internet connectively." • Automation of knowledge work or "intelligent software systems that perform knowledge work tasks involving unstructrured commands and subtle judgments." An example might be IBM’s Watson system. • Internet of Things or "networks of low-cost sensors and actuators for data collection, monitoring, decision making and process optimization." • Cloud Technology or "use of computer hardware and software resources delivered over a network or the Internet, often as a service." • Advanced Robotics or "increasingly capable robots with enhanced senses, dexterity, and intelligence used to automate tasks or augment humans." This category is perhaps most famously personified by the Baxter robot (profiled in the May-June issue of THE FUTURIST magazine). • Autonomous and Near-Autonomous Vehicles. • Next Generation Genomics or "fast, low-cost gene sequencing, advanced big-data analytics, and synthetic biology." • Energy Storage. • 3D Printing • Advanced Materials defined as "materials designed to have superior characteristics." Much of what we today call nanotechnology would fall within this category. • Advanced Oil and Natural Gas Recovery • Renewable Energy • Of the above, the Mobile Internet, which could change the lives of more than 5 billion people around the globe, the automation of knowledge work, and the Internet of Things would have by far the largest economic impacts, according to McKinsey. All together, the above technologies could generate $14 to $33 trillion. But the authors caution that much of that growth will be at the expense of older technologies and even entire industries falling into obsolescence. • "When necessary, leaders must be prepared to disrupt their own businesses and make the investments to effect change," the report’s authors write. "By the time the technologies that we describe are exerting their influence on the economy in 2025, it will be too late for businesses, policy makers, and citizens to plan their responses. Nobody, especially businesses leaders, can afford to be the last person using video cassettes in a DVD world." • Source: Mckinsey Global Institute [PDF] Mobility

Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage.

In addition, Mobilities is a contemporary paradigm in the social sciences and humanities that explores the movement of people, ideas and things, as well as the broader implications of those movements

From Wikipedia, the free encyclopedia Transforming the User Experience Business environments are changing dramatically with the increasing proliferation of consumerized devices like smartphones and tablets. Employees and partners expect organizations to provide options of working from remote locations on a device of their choice with access to information they need when they need it . They are also increasingly commingling personal and business tasks on the same device instead of using separate devices. Customers today, want instant and on-hand access to products and services; and they want nothing less than the ‘complete’ digital experience in anything they do. Unfortunately, many organizations are not equipped to handle these expectations. They are hindered by standardized IT environments built for cost efficiencies and lack the agility to respond quickly to changing business needs. Mobility to an organization means balancing business demands for mobile flexibility while being able to manage the mobile environment with their existing standardized IT environment.

From unisys.com With Unisys Mobility Solutions organizations can: Simplify enterprise mobility with an integrated end to end mobile solution designed to make business, employees and customers more effective by enabling businesses to: Gain Insights & Control Business and operational insights help you securely manage mobile resources while identifying areas of inefficiencies and opportunities. Mobilize Information Improve productivity and efficiency through enabling mobile access to existing enterprise or new applications designed to improve employee productivity or increase customer engagement. Be Enterprise Agile Meet the demands of the mobile enterprise with reliable, secure, and agile processes and resources that support the growth and demands of the mobile business environment. Unisys’ Mobility Solutions enable clients to achieve organizational value by: Delivering industry-standard centralized outsourcing services for mobile environments. Focusing on enabling legacy, primary system interfaces on latest device technology. Securing the user, applications and data, not just the device, with user authentication and biometric solutions , mobile application management technology and data isolation. Re-engineering standardized IT infrastructure from a less secure to a tiered, agile environment. The user is at the heart of our solution. We work with you to ensure that the right people access the right information, at right time, and at the right location. June 6, 2013

•You see, today more mind-blowing new technologies are hitting the market faster than ever before.

These technologies are transforming the world around us: the way we work... the way we live... the way we play.

They're also creating the biggest wealth-building opportunities of the last fifty years. Things like...

Revolutionary biotech advances being used to eradicate dangerous viruses... •Exotic materials creating a "New Gold Rush" in material science... •A "Mobile Wave" so huge it's going to reestablish America as the dominant force in technology and economics in the world. The newest cyber battlefield is as close as your own pocket. "Mobile computing technology ," says Ray, "is facilitating everything from mobile payment processing to banking and instantaneous stock trading. This gives cybercriminals new targets that haven't had much time to develop resistance to malicious viral code. "The sheer number of smartphones that will be on the Internet in the years to come makes them a logical target for hackers, scammers and thieves. This creates lucrative opportunities for innovators working on ways to secure mobile computers." June 10, 2013 How to protect Mobile devices and the information gathered?

The merging of two trends: Mobility and Biometrics Examples of Biometric protected Mobile Devices • HP PDA • Fingerprint swipe for Sign-on and to protect data Facial Recognition for • HP Laptop • Sign-on • Fingerprint swipe for • IBM/Lenovo Laptops Sign-on • Motorola ATRIX 4G • Swipe to unlock device, Android OS Apple iPhone

• Date: September 10, 2013 2:36:52 PM PDT

• Subject: Apple Announces iPhone 5s—The Most Forward-Thinking Smartphone in the World

• Source: Apple Hot News

• Apple today announced iPhone 5s, the most advanced iPhone yet. With its new A7 chip, iPhone 5s is the first smartphone with 64-bit technology, providing blazing-fast performance when launching apps, editing photos, or playing graphic-intensive games. iPhone 5s features an all-new 8-megapixel iSight camera and introduces the Touch ID fingerprint sensor, which allows you to securely unlock your phone with the touch of your finger. iPhone 5s comes with iOS 7, the most significant iOS update since the original iPhone. “iPhone 5s is the most forward-thinking smartphone in the world, delivering desktop class architecture in the palm of your hand,” said Philip Schiller, Apple’s senior vice president of Worldwide Marketing. iPhone 5s comes in gold, silver, or space gray, and will be available September 20 at the suggested retail price of $199 for the 16GB model, $299 for the 32GB model, and $399 for the 64GB model. Apple iPhone Touch ID

• The most impressive feature of the new iPhone 5S may be its ability to turn your finger into a password. • Touch ID is Apple's name for a new fingerprint scanner that would act as a security tool for log-ins and for making purchases from iTunes and other Apple stores. • "Your fingerprint is one of the best passwords in the world," said Dan Riccio, a senior vice president for hardware design at Apple, in a promotional video . "It's always with you and no two are exactly alike." Use of Mobile Devices to Collect Biometrics • Synergy Approach – Use commercial available device: cell phone, laptop, PDA, tablet, etc., as the host for transmission. • Total Solution Approach – Vendor provides a device that collects the biometric and provides the transmission to a centralised biometric search system. Synergy Approach

• Biometric Capture Device – Scanner (Optical or Capacitive) – Processor (perform quality check) – Communications path (Bluecheck, USB, other) – Battery

Capture Device to be small, light, rugged and low cost. Host Device • Commercially available • Interoperable on transmissions systems – adheres to International Standards (Private networks in some cases) • Easy to use • Provides security • Processor to process NIST packet • Memory to hold transactions • Long battery life

Host Device to be small, light, rugged, provide good coverage, and be low cost. Synergy Approach

Promotes Officer/Staff Safety Infrastructure for the Synergy approach -- (MIDAS)

Capture Subject’s Create Record & Authenticate User Identify Subject Biometrics Submit Transaction & Device & Respond

Police UK Force Mobile ID Gateway Service Sample of the Total Solution Approach Total Solution Approach Total Solution Infrastructure

Capture Subject’s Create Encrypted Record & Authenticate User Identify Subject Biometrics Submit Transaction & Device & Respond

Mobile Devices

Gateway UK Mobile ID Service Biometric Applications in a Mobile World

• Parolee Compliance • Sporting Events Security • Warrant Enforcement • ID soccer “hooligans” • Field Citation and Release • Undocumented Aliens • Jail Management • Processing “Boat People” • Drunk Driver Enforcement • Gambling ID of registered clients • Gang Violence Suppression Unit • Medical Id of senior citizens • Drug Enforcement • ID of arrivals and departure from • Stolen Vehicles Mecca • Violent Crime Reduction • “Line busting” wherever there are queues • Field Identification of subjects • Airline check in • Witness ID • Passport control • Crime Scene collection • Financial transactions The 5 min Forecast 26Sep2013

• "The U.S. Department of Homeland Security," the article from the Biometric Update blog begins predictably enough, "will test its crowd-scanning facial recognition system, known as the Biometric Optical Surveillance System, or BOSS, at a junior hockey game this weekend." • With the help of their friends at the Pacific Northwest National Laboratory in Richland, Wash., the DHS will test BOSS at a packed hockey game in the Evergreen State. • "The test will determine," the blog goes on, "whether the system can distinguish the faces of 20 volunteers out of a crowd of nearly 6,000 hockey fans, to evaluate how successfully BOSS can locate a person of interest." Financial Times 11Oct2013

• October 11, 7:31pmFraudsters leave fingerprints over fake Samsung dealSweden's financial authorities are investigating how fraudsters issued a forged press release on behalf of a Swedish biometrics company that claimed it had been acquired by Samsung Electronics for $650m, sending the shares soaring by 50 per cent. • http://www.ft.com/cms/s/0b972892-3259-11e3- b3a7-00144feab7de.html The Wall Street Daily 24Nov2013

• The Mobile Mantra • Repeat after me, “It’s all about mobile. It’s all about mobile. It’s all about mobile!” • And here’s the latest proof… • For the first time in recorded history, smartphone and tablet revenue will exceed revenue for the entire consumer electronics market, according to the Application Market Forecast Tool from IHS Inc. (IHS ). • Mind you, only a year ago, the consumer electronics market was 30% larger than the mobile market . • As Randy Lawson, Senior Principal Analyst for Semiconductors at IHS, says, “Consumers simply are finding more value in the versatility and usefulness of smartphones and tablets, which now serve as the go-to devices for everything.” From New Scientist, Nov 2013

• “Soft” biometrics is the new way monitor people • The US government is challenging researchers to use cameras to ID people by unique features like the shape of their ears, or their gait • CAMERAS are strewn around our environment, catching glimpses of our faces everywhere we go, yet even the best facial recognition technology still has a hard time picking us out of the crowd. • So the US government's Intelligence Advanced Research Projects Activity (IARPA) has called for a new approach. The agency announced a contest on 8 November , challenging teams of the country's top researchers to revolutionise how machines recognise people. Those entering the competition already know that conventional facial recognition won't cut it. • The usual approach to identifying people is to sift through camera footage frame by frame, find a few that offer the best chance of an ID, and then attempt to match them to a database of known images. Ideally, this will mean the subject is facing the camera, with a neutral expression, and without any shadows on their face. All other frames are discarded, and only then do the facial recognition algorithms get to work. • “One of the goals of the IARPA challenge is to see what you can do with the discarded data,” says Mary Ann Harrison of the West Virginia High Technology Consortium Foundation in Fairmont. • That data contains “soft” biometrics, information which does not explicitly identify a person, but narrows the range of possibilities. This could be height, size, gait or other features. • “Our main focus has been ear recognition,” says Harrison. “ The evidence is that the structure is unique to each person. There is a whole science of the structure of ears.” People can be categorised according to details such as whether the ears have lobes, or ear size in comparison to the head. • Bir Bhanu at the University of California, Riverside, who leads another team, says this type of work will result in faster, more flexible tracking that will help law enforcement after events like the bombing of the Boston Marathon in April. Partial shots of the suspects' faces, as well as their gait would have been abundant from CCTV cameras, but it took an army of trained professionals several days of poring over footage to unearth their images. • There are other applications too. Airport security could be streamlined to allow passengers to walk freely from check-in to the gate, their movements monitored and identities verified automatically by cameras. • “Ultimately the goal is to be able to recognise a person in natural through any scene,” says Jack Ives of machine vision company, CyberExtruder in Newark, New Jersey, who stresses that the benefits are not only for the military and government. • “A department store or bank could have a system which is able to recognise each person as they approach the counter,” he says. “Wouldn't it be nice to walk in and get the service you want without having to say a word.” • This article appeared in print under the headline “Soft surveillance” • Back to the iPhone

• "Esoteric and academic theories of usability, reliability, false positives, false negatives, and so on will suddenly be tested by millions of real users in real situations."

This real use may be the real value ! Are you ready for the Mobile Wave?

• How will your organisation use biometrics to protect your mobilite customers? • If your organisation uses biometrics, how will you remotely collect biometrics and send search responses to your field staff? Biometrics will replace passwords

Thank You for your attention.