{"id":9303,"date":"2012-05-03T18:34:39","date_gmt":"2012-05-03T22:34:39","guid":{"rendered":"http:\/\/sciencebusiness.technewslit.com\/?p=9303"},"modified":"2012-05-03T18:34:39","modified_gmt":"2012-05-03T22:34:39","slug":"nist-develops-new-biometric-communications-protocol","status":"publish","type":"post","link":"https:\/\/technewslit.com\/sciencebusiness\/?p=9303","title":{"rendered":"NIST Develops New Biometric Communications Protocol"},"content":{"rendered":"<figure id=\"attachment_9306\" aria-describedby=\"caption-attachment-9306\" style=\"width: 208px\" class=\"wp-caption alignright\"><a href=\"http:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2012\/05\/Fingerprint_USembassyGov.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9306\" title=\"Fingerprint_USembassyGov\" src=\"http:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2012\/05\/Fingerprint_USembassyGov.jpg\" alt=\"Fingerprint scan (USEmbassy.gov)\" width=\"208\" height=\"300\" srcset=\"https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2012\/05\/Fingerprint_USembassyGov.jpg 208w, https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2012\/05\/Fingerprint_USembassyGov-104x150.jpg 104w\" sizes=\"auto, (max-width: 208px) 100vw, 208px\" \/><\/a><figcaption id=\"caption-attachment-9306\" class=\"wp-caption-text\">(USEmbassy.gov)<\/figcaption><\/figure>\n<p>Computer scientists at <a href=\"http:\/\/www.nist.gov\/itl\/biometrics\/biometrics-050212.cfm\">National Institute of Standards and Technology<\/a> (NIST) have developed and published a new protocol for communicating with biometric sensors over wired and wireless networks. Biometric sensors are being used increasingly for security access to and controls on electronic systems and physical facilities.<\/p>\n<p>The new protocol, called <a href=\"http:\/\/www.nist.gov\/manuscript-publication-search.cfm?pub_id=910334\">WS-Biometric Devices<\/a> (WS-BD), allows desktops, laptops, tablets, and smartphones to access sensors that capture biometric data such as fingerprints, iris images, and face images through the use of Web services. Web services enable the exchange of data and messages among different platforms, operating systems, and programming languages over the Web using standard protocols, in this case WS-BD.<\/p>\n<p>The WS-BD protocol is expected to simplify setting up and maintaining secure biometric systems for verifying identity. With WS-BD, biometric systems should be easier to assemble with interoperable components compared to current biometrics systems that generally have proprietary and device-specific drivers and cables.<\/p>\n<p>WS-BD adds a device-independent Web-services layer in the communication protocol between biometric devices and systems to encourage interoperability. The addition of this layer will help make the addition of biometric sensing devices easier to install for users, by eliminating the time and cost of acquiring and installing separate proprietary drivers for the devices.<\/p>\n<p>Those costs can become significant when biometric sensors, which are often installed outdoors and exposed to weather or physical manipulation, need repair or replacement. When current biometric systems break, it can be expensive and time-consuming to find a replacements, since manufacturers often change product lines and phase out previous generations of devices.<\/p>\n<p>A few broken devices could require rebuilding entire systems, with upgraded devices and drivers that may be incompatible with host operating systems. A 2010 <a href=\"http:\/\/www.nap.edu\/openbook.php?record_id=12720&amp;page=9\">National Academies report<\/a> recommended designing biometric systems with an eye toward anticipating new advances and upgrades to allow for the easy replacement of components.<\/p>\n<p>The <a href=\"http:\/\/www.nist.gov\/customcf\/get_pdf.cfm?pub_id=910334\">document<\/a>, &#8220;Specification for WS-Biometric Devices (WS-BD)&#8221; is authored by NIST computer scientists Ross Micheals, Kevin Mangold, Matt Aronoff, Kayee Kwong, and Karen Marshall. The following video tells more about WS-BD.<\/p>\n<p><center><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/VTxIA-wkmo0?rel=0\" frameborder=\"0\" width=\"560\" height=\"315\"><\/iframe><\/center>Read more:<\/p>\n<ul>\n<li><a href=\"http:\/\/sciencebusiness.technewslit.com\/?p=5652\">First Flaw Reportedly Found in Advanced Encryption Standard<\/a><\/li>\n<li><a href=\"http:\/\/sciencebusiness.technewslit.com\/?p=5443\">Univ. Research Leads to Mobile Transaction Security Advances<\/a><\/li>\n<\/ul>\n<p style=\"text-align: center;\">*\u00a0\u00a0\u00a0\u00a0 *\u00a0\u00a0\u00a0\u00a0 *<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer scientists at National Institute of Standards and Technology (NIST) have developed and published a new protocol for communicating with biometric sensors over wired and wireless networks. Biometric sensors are being used increasingly for security access to and controls on electronic systems and physical facilities. The new protocol, called WS-Biometric Devices (WS-BD), allows desktops, laptops, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[109,86,64,105,78,71],"class_list":["post-9303","post","type-post","status-publish","format-standard","hentry","category-regulations","tag-computer-science","tag-engineering","tag-life-sciences","tag-physical-sciences","tag-software","tag-standard"],"_links":{"self":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/9303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9303"}],"version-history":[{"count":4,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/9303\/revisions"}],"predecessor-version":[{"id":9308,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/9303\/revisions\/9308"}],"wp:attachment":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}