Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

National Sheriffs Deploy BIO-Key Fingerprint Authentication in First Phase of Pegasus Program
TechWeb - PRNewsire ^ | September 7, 2004 | Unedited news and product information from vendors

Posted on 09/07/2004 11:03:34 PM PDT by Eagle9

MINNEAPOLIS, Sept. 7 /PRNewswire-FirstCall/ -- BIO-key International, Inc. (BULLETIN BOARD: BKYI) , a leader in finger-based biometric identification and wireless public safety solutions, today announced that the Pegasus Program, a nationwide information sharing system designed by and for the Nation's Sheriffs, has implemented the first phase of BIO-key's state-of-the-art WEB-key fingerprint authentication system.

The Pegasus Program is deploying approximately 1,100 fingerprint access authentication devices for 220 Sheriffs' offices in the first phase of this project. Plans are in place to expand the rollout to over 3,000 Sheriffs' offices nationwide, as well as local law enforcement and first responder agency partners. Under the program, each participating Sheriff's office is provided the WEB-key software along with fingerprint readers. Larger offices can purchase additional readers if necessary.

The Pegasus system provides Sheriffs in any state with Web-based access to information required for day-to-day law enforcement investigations and first responder situations. It also allows them to securely send and receive secure messages to other jurisdictions, such as requests for information and assistance and alerts. WEB-key assures that only authorized personnel access the system through positive fingerprint authentication.

"Although there are fingerprint authentication systems in use within a single location or enterprise, we believe the Pegasus Program is the first multi-agency system using secure Internet connections for fingerprint authentication," said Mike DePasquale, CEO of BIO-key. "We are directly addressing the most pressing issue in homeland security: sharing critical information between first responders nationwide in a highly secure environment."

Fingerprint authentication provides a high degree of security and user accountability in the Pegasus system. As an added measure of security, before accessing more sensitive functions, the user must re-authenticate using their fingerprint to ensure that the user is still present and accountable for the requested action. Only a fingerprint is required, and this critical security process is completed in two seconds or less.

"BIO-key's technology is critical in achieving the Pegasus Program's goal of creating an information technology and communications system that treats local law enforcement and emergency responders as an information sharing enterprise," said Dennis Kelly, Project Executive for the Pegasus Program's technology implementation consortium. "System security efforts are key to the Pegasus Technology Consortium's efforts to support the Nation's Sheriffs, who are leading this information sharing effort."

The Pegasus Program for Sheriffs and their local law enforcement partners is administered by the Pegasus Research Foundation. The Pegasus Technology Consortium includes Circadence Corp., which provides a military grade technology designed to assure emergency priority for local law enforcement and first responders; Cquay Technologies, which provides mapping and location applications; and Geographic Data Technologies, which provides mapping and location data in support of the Pegasus Program service.

About BIO-key
BIO-key develops and delivers advanced identification solutions and information services to law enforcement departments, public safety agencies, governments and private sector customers. BIO-key's mobile wireless technology provides first responders with critical, reliable real time data and images from local, state and national databases. BIO-key's high performance, scalable, cost effective and easy to deploy biometric finger identification technology accurately identifies and authenticates users of wireless and enterprise data to improve security, convenience and privacy as well as reducing identity theft. (http://www.bio-key.com/)

About the Pegasus Program
The Pegasus Program is a nationwide information sharing program providing a more efficient and secure way for local law enforcement officers to access the same information to which they have traditionally had access. It utilizes a non-federal, multi-state immediate information sharing system designed by and for the Nation's Sheriffs and their local law enforcement and other first responder partners, utilizing COTS technology. The Program is administered by the Pegasus Research Foundation using U.S. Department of Justice-approved NIST standards, and is supported by the National Sheriffs' Association. (http://www.pegasusresearch.org/)

About Pegasus Research Foundation
The Pegasus Research Foundation ("PRF") is a non-profit corporation created to work in coordination with the Nation's Sheriffs, municipal police, fire departments, first responder, public health and critical infrastructure entities, to facilitate multi-state sharing of essential law enforcement and Homeland Security information. PRF's Executive Director is Dr. Lee Colwell, former Associate Director of the FBI, and a nationally recognized leader in local, State and Federal law enforcement policy development and implementation. Information on PRF may be found at http://www.pegasusresearch.org/.

About Circadence
Circadence Corporation, founded in 1993 as VR*1, Inc., has its origins in the massive multi-user online simulations industry. Based in Boulder, Colorado, Circadence grew through several acquisitions, successful product launches and the formation of strategic partnerships including Microsoft, Deutsche Telekom, and Hewlett Packard. Circadence's proven Transport Morphing Protocol(TM) (TMP(TM)), built into its Web Assured Response Protocol solution, enables efficient use of bandwidth with additional data transport speed, reliability and consistency. For more information, contact: Albert Maruggi 651-695-0174 amaruggi@providentpartners.net CONTACT: Albert Maruggi for BIO-key International, Inc., amaruggi@providentpartners.net+1-651-695-0174, or Web site: http://www.pegasusresearch.org/ Web site: http://www.bio-key.com/


TOPICS: Crime/Corruption; Culture/Society; Extended News; Government; Technical
KEYWORDS: authenication; biokey; biometrics; crime; fingerprint; national; pegasus; police; security
"Although there are fingerprint authentication systems in use within a single location or enterprise, we believe the Pegasus Program is the first multi-agency system using secure Internet connections for fingerprint authentication," said Mike DePasquale, CEO of BIO-key. "We are directly addressing the most pressing issue in homeland security: sharing critical information between first responders nationwide in a highly secure environment."

The uses of this technology in the multiple fields of security, e.g., National, local, personal, banking, credit, are mind-boggling.

1 posted on 09/07/2004 11:03:38 PM PDT by Eagle9
[ Post Reply | Private Reply | View Replies]

To: Eagle9

There was an article here a few months ago about a professor who managed to easily beat all of the fingerprint readers on the market.


2 posted on 09/07/2004 11:18:58 PM PDT by Libertarianize the GOP (Make all taxes truly voluntary)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eagle9
Are people unaware of the severe weaknesses of biometric security measures in a distributed environment?

If I use a Java iButton as a security authentication device, I can use it for authentication without anyone ever having access to any of my private keys. Even if I happen to plug it into a reader that's been "hotwired" with a capture device, such a device won't capture anything that can be used to impersonate the iButton.

By contrast, if a fingerprint scanner is hotwired to capture "private" copies of fingerprints that are scanned, the hotwirer can use those captured fingerprints to impersonate their owners.

Although computer passwords have the same problem, the harm caused by such disclosure can be mitigated by changing passwords.

By contrast, if somebody's fingerprints fall into the hands of crooks, what is a person supposed to do?

3 posted on 09/07/2004 11:26:13 PM PDT by supercat (If Kerry becomes President, nothing bad will happen for which he won't have an excuse.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: supercat
I wasn't aware of the technical issues that you've covered in short order, but I was thinking of both the positive and negative uses of this technology.

What do you think the chances are of this being used by Sheriffs nationally?

4 posted on 09/07/2004 11:39:15 PM PDT by Eagle9
[ Post Reply | Private Reply | To 3 | View Replies]

To: supercat

Many fingerprint readers also want a password in addition to the "finger" just for that reason of counterfit copying!


5 posted on 09/07/2004 11:40:36 PM PDT by mdmathis6 (The Democrats must be defeated in 2004)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Libertarianize the GOP

Any chance you could locate the article?


6 posted on 09/08/2004 4:56:36 AM PDT by B4Ranch (Truth goes through three stages, ridiculed, violently opposed, then accepted as self-evident)
[ Post Reply | Private Reply | To 2 | View Replies]

To: B4Ranch

Found it
Fun with Fingerprint Readers
http://www.freerepublic.com/focus/f-news/1154620/posts


7 posted on 09/08/2004 10:44:31 AM PDT by Libertarianize the GOP (Make all taxes truly voluntary)
[ Post Reply | Private Reply | To 6 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson