Heartbeat Biometrics (Bionym)

By: Brian Rhodes, Published on Sep 13, 2012

It is impossible to spoof a heartbeat: That's the claim of a new biometrics company that wants to use the signature of your heart pumping as personal identification. Is the idea quack science, or does it have promise? In this note, we examine Bionym's HeartID technology [link no longer available] and contrast to other biometric methods.

HeartID

Bionym was founded as a spinoff from several research projects at the University of Toronto. Originally applied to battlefield medicine, Bionym's heartbeat detection technology uses electrocardiogram sensors to record heart rhythms. Like fingerprints, retinas, and palm print veins, no two heartbeats are the same and each have different characteristics.

Bionym describes HeartID technology as "a ground-breaking cardiac recognition system that can reliably recognize people from their ECG. The ECG can be captured from various points on the body, including the fingertips, making the system suitable to be embedded into a wide range of fixed and mobile devices."

Applications

Bionym does not have any end user products. Rather they are looking for OEM partners. The company is targeting access control vendors, since identity verification and access controls go hand-in-hand. While Bionym had no production examples of access control readers in the booth, the company claims that the material cost of adding the ECG technology to readers is less than $5 per device. We have no to evaluate this.

The company claims that authenticating heartbeats for readers, credentials, or portable electronics is low impact and high convenience: "The sensors can be positioned so that enrollment and authentication can be performed without the user having to perform any special task. They simply hold the device as they normally do, and the patented biometric recognition algorithm works seamlessly in the background to provide robust security and automatic personalization."

Additionally, they claim that it can be done even if the person is wearing gloves.

Limitations

A few limitations / concerns are likely:

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

  • The company says changes in heartbeat rate do not impact it. They showed that "tachycardia", or fast heart beat does not affect the signature of the beat, only the frequency. The company's website states "During physical or mental stress the heart rate increases. In this situation your cardiac rhythm contains more pulses than at rest. This provides HeartID with more information and will actually make identification more accurate."
  • Like fingerprinting, users must make contact with reader and this can be inconveniencing. However, the developer claims that, unlike fingerprints, neither the cleanliness or conditions of the fingers will have any impact.
  • The developer recommends re-recording the heartbeat template every 4 years. We have not heard of fingerprint developers with similar requirements.

Dual Authentication

Bionym's CEO suggested the technology could most easily be retrofitted into existing access applications through a change in credential. He suggested a yet-to-be design concept credential that would first require an authorized user to make valid through a heartbeat read, then could be used in normal proximity card fashion.

Potential

Fingerprint biometrics look to be the most likely competitor/alternative to this technology. While fingerprints are, by far, the most commonly used biometric in access control, they do suffer from some issues such as exclusions (worn fingerprints) or gummy bears (fingerprint), problems in cold weather and/or requiring removing of gloves.

We see potential for heartbeat biometrics but it will need to demonstrated that this can be done cost effectively and reliably, given the lack of track record for this approach.

Comments : Members only. Login. or Join.

Related Reports

HID Launches Origo To Fix Mobile Credential Problems on Feb 05, 2019
HID is releasing Origo, an overhaul of its mobile credential platform, this time drastically restructuring the way it is priced and packaged. HID's...
BluB0x Company Profile on Feb 20, 2019
BluB0x has doubled in revenue every year since its founding in 2013, according to CEO Patrick Barry [link no longer available]. We originally...
Startup GateKeeper Aims For Unified Physical / Logical Access Token on Apr 04, 2019
This startup's product claims to 'Kill the Password' you use to keep your computers safe. They have already released their Gatekeeper Halberd...
Silicon Valley Access Startup Proxy Raises $13.6 Million on Mar 28, 2019
This mobile-credential based access startup just raised $13.6 million in funding.  Further, they claim that their technology can free businesses...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Fingerprints for Access Control Guide on Sep 09, 2019
Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one...
Open Access Controller Guide (Axis, HID, Isonas, Mercury) on Sep 19, 2019
In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently,...
Access Control Time & Attendance Guide on Sep 24, 2019
Access control systems can do more than lock doors. With little or no extra equipment, they can be used to track labor hours for employees...
Access Control Mustering Guide on Sep 30, 2019
In emergencies, determining where employees are located can be critical for knowing whether they are in danger. Access systems can be used for...
Directory of Access Reader Manufacturers on Nov 27, 2019
Credential Readers are one of the most visible and noticeable parts of access systems, but installers often stick with only the brand they always...

Most Recent Industry Reports

Motorola / Avigilon Drops ISC West on Feb 26, 2020
Motorola Solutions has pulled out of ISC West 2020 effective immediately, because of coronavirus concerns, IPVM has learned. This is done amidst...
Cancel or Not? Industry Split Over ISC West on Feb 26, 2020
The industry is split, polarized, over whether ISC West 2020 should run or be canceled. New IPVM survey results of 400+ respondents show heated...
Coronavirus Hits Sony, Bosch Says Switch on Feb 26, 2020
Sony's fall in video surveillance has been severe over the past decade. Now, they may be done. In this note, we examine Bosch's new...
Video Surveillance Cameras 101 on Feb 25, 2020
Cameras come in many shapes, sizes and specifications. This 101 examines the basics of cameras and features used in 2020. In this report, we...
Favorite Video Analytic Manufacturers 2020 on Feb 25, 2020
Video analytics is now as hot as ever, driven by the excitement of advancing deep learning offers. But what are actually integrator's...
Latest London Police Facial Recognition Suffers Serious Issues on Feb 24, 2020
On February 20, IPVM visited another live face rec deployment by London police, but this time the system was thwarted by technical problems and...
Masks Cause Major Facial Recognition Problems on Feb 24, 2020
Coronavirus is spurring an increase in the use of medical masks, which new IPVM test results show cause major problems for facial recognition...
Every VMS Will Become a VSaaS on Feb 21, 2020
VMS is ending. Soon every VMS will be a VSaaS. Competitive dynamics will be redrawn. What does this mean? VMS Historically...
Video Surveillance 101 Course - Last Chance on Feb 20, 2020
This is the last chance to join IPVM's first Video Surveillance 101 course, designed to help those new to the industry to quickly understand the...
Vulnerability Directory For Access Credentials on Feb 20, 2020
Knowing which access credentials are insecure can be difficult to see, especially because most look and feel the same. Even insecure 125 kHz...