Although I’ve never worked with the company directly, I have a long history with ESRI.
- When Printrak acquired portions of SCC back in 1997, Printrak became the company of record for SCC’s computer aided dispatch product, which used ESRI technology for its mapping.
- When I rejoined the Proposals organization about a decade ago, the (then) Southern California Chapter of the (then) Association of Proposal Management Professionals arranged for satellite locations for its chapter meetings. Initially I would go to Redlands and attend the meetings at ESRI’s corporate headquarters. (Very nice facility, by the way.) Eventually I arranged to host satellite meetings at MorphoTrak’s Anaheim headquarters on Tustin Avenue, so my visits to ESRI in Redlands ceased. Now most meetings (other than Training Day) are online-only.
Add my interest in mapping to the mix, and you would think that I would be a prime target to attend ESRI’s annual User Conference in San Diego. However, as I mentioned, I wasn’t working with the company directly, and so I could never justify attending the ESRI User Conference in the same way that I could justify attending Oracle OpenWorld, the International Association for Identification, or IDEMIA/MorphoTrak/Motorola/Printrak’s own User Conference.
Then this pandemic thing happened, I became a free agent, bla bla bla. And so I found myself watching the Monday plenary session for the virtual 2021 ESRI User Conference.
For those who know ESRI, it’s no surprise that the speaker for much of the 3 1/2 hour plenary session was Jack Dangermond. This was the first time that I heard Dangermond speak at any length, and he provided a helpful overview of the company and its offerings, supported by a slew of ESRI product managers and outside partners.
For those who know ESRI, it’s no surprise that ESRI’s offerings have expanded since the late 1990s, with mobile and cloud options that could barely be envisioned in the last millennium.
And (like Oracle) ESRI has expanded from its base product into various verticals, such as ArcGIS Business Analyst for location-based market intelligence. The case studies illustrate how this product can benefit its users.
And I am certainly a fan of case studies…
I thought I had blogged about the five factors of authentication, either here or at jebredcal, but I guess I haven’t explicitly written a post just on this topic.
And I’m not going to do that today either (at least in any detail), because The Cybersecurity Man already did a good job at that (as have many others).
However, for those like me who get a little befuddled after authentication factor 3, I’m going to list all five authentication factors.
- Something You Know. Think “password.” And no, passwords aren’t dead. But the use of your mother’s maiden name as an authentication factor is hopefully decreasing.
- Something You Have. I’ve spent much of the last ten years working with this factor, primarily in the form of driver’s licenses. (Yes, MorphoTrak proposed driver’s license systems. No, they eventually stopped doing so. But obviously IDEMIA North America, the former MorphoTrust, has implemented a number of driver’s license systems.) But there are other examples, such as hardware or software tokens.
- Something You Are. I’ve spent…a long time with this factor, since this is the factor that includes biometrics modalities (finger, face, iris, DNA, voice, vein, etc.). It also includes behavioral biometrics, provided that they are truly behavioral and relatively static.
- Something You Do. The Cybersecurity Man chose to explain this in a non-behavioral fashion, such as using swiping patterns to unlock a device. This is different from something such as gait recognition, which supposedly remains constant and is thus classified as behavioral biometrics.
- Somewhere You Are. This is an emerging factor, as smartphones become more and more prevalent and locations are therefore easier to capture. Even then, however, precision isn’t always as good as we want it to be. For example, when you and a few hundred of your closest friends have illegally entered the U.S. Capitol, you can’t use geolocation alone to determine who exactly is in Speaker Pelosi’s office.
Now when these factors are combined via multi-factor authentication, there is a higher probability that the person is who they claim to be. If I enter the password “12345” AND I provide a picture of my driver’s license AND I provide a picture of my face AND I demonstrate the secret finger move AND I am within 25 feet of my documented address, then there is a pretty good likelihood that I am me, despite the fact that I used an extremely poor password.
I don’t know if anyone has come up with a sixth authentication factor yet. But I’m sure someone will if it hasn’t already been done. And then I’ll update to update this post in the same way I’ve been updating my Bredemarket 2021 goals.