Sie sind auf Seite 1von 3

What are biometrics?

Biometrics is concerned with identifying a person based on his / her physiological or behavioral characteristics. Examples of biometrics systems include fingerprint, hand, face, eye (iris or retina), and speech recognition. y Biometrics (or biometric authentication)[note 1] consists of methods for uniquely recognizing humans based upon one or more intrinsicphysical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to identify individuals[1]. The two categories of biometric identifiers include physiological and behavioral characteristics[2]. Physiological characteristics are related to the shape of the body, and include but are not limited to: fingerprint, face recognition, DNA, palm print, hand geometry, iris recognition (which has largely replacedretina), and odour/scent. Behavioral characteristics are related to the behavior of a person, including but not limited to: typing rhythm,gait, and voice[note 2]. Some researchers have coined the term behaviometrics to describe the latter class of biometrics[3]. More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number [1]. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods, however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information[1][4]. y

Issues and concerns


y Privacy and discrimination It is possible that data obtained during biometric enrollment may be used in ways for which the enrolled individual has not consented. For example, biometric security that utilizes an employee's DNA profile could also be used to screen for various genetic diseases or other 'undesirable' traits.[according to whom?] y Danger to owners of secured items When thieves cannot get access to secure properties, there is a chance that the thieves will stalk and assault the property owner to gain access. If the item is secured with a biometric device, the damage to the owner could be irreversible, and potentially cost more than the secured property. For example, in 2005, Malaysian car thieves cut off the finger of a MercedesBenz S-Class owner when attempting to steal the car.[11] y [Cancelable biometrics One advantage of passwords over biometrics is that they can be re-issued. If a token or a password is lost or stolen, it can be cancelled and replaced by a newer version. This is not naturally available in biometrics. If someone's face is compromised from a database, they cannot cancel or reissue it. Cancelable biometrics is a way in which to incorporate protection and the replacement features into biometrics. It was first proposed by Ratha et al.[12] Several methods for generating cancelable biometrics have been proposed. The first fingerprint based cancelable biometric system was designed and developed by Tulyakov et al.[13]Essentially, cancelable biometrics perform a distortion of the biometric image or features before matching. The variability in the distortion parameters provides the cancelable nature of the scheme. Some of the proposed techniques operate using their own recognition engines, such as Teoh et al.[14] and Savvides et al.,[15] whereas other methods, such as Dabbah et al.,[16]take the advantage of the advancement of the well-established biometric research for their recognition front-end to conduct recognition. Although this increases the restrictions on the protection system, it makes the cancellable templates more accessible for available biometric technologies.

The Role of Biometric Technology


You can use biometric technology as an alternative to passwords-literally, your fingerprint becomes your password. This has great benefits to you, as an emerging business owner. Employees will not have to remember multiple passwords, and the costs of password administration will be greatly diminished. You could even technically eliminate the use of passwords completely by employing biometric technology. The use of biometric technology as an alternative to passwords has been referred to as "Single Sign On Solutions." This is so because you need to sign on only once in order to gain access to the shared resources. The most commonly used biometric

technologies for Single Sign On Solutions are fingerprint recognition devices. Also, iris recognition technologies are utilized, but to a lesser degree. Why are biometrics secure? Unique: The various biometrics systems have been developed around unique characteristics of individuals. The probability of 2 people sharing the same biometric data is virtually nil. Cannot be shared: Because a biometric property is an intrinsic property of an individual, it is extremely difficult to duplicate or share (you cannot give a copy of your face or your hand to someone!). Cannot be copied: Biometric characteristics are nearly impossible to forge or spoof, especially with new technologies ensuring that the biometric being identified is from a live person. Cannot be lost: A biometric property of an individual can be lost only in case of serious accident.

What are biometric systems used for?


Reliable user authentication is essential. The consequences of insecure authentication in a banking or corporate environment can be catastrophic, with loss of confidential information, money, and compromised data integrity. Many applications in everyday life also require user authentication, including physical access control to offices or buildings, e-commerce, healthcare, immigration and border control, etc. Currently, the prevailing techniques of user authentication are linked to passwords, user IDs, identification cards and PINs (personal identification numbers). These techniques suffer from several limitations: Passwords and PINs can be guessed, stolen or illicitly acquired by covert observation. In addition, there is no way to positively link the usage of the system or service to the actual user. A password can be shared, and there is no way for the system to know who the actual user is. A credit card transaction can only validate the credit card number and the PIN, not if the transaction is conducted by the rightful owner of the credit card. This is where biometrics systems provide a more accurate and reliable user authentication method, as can be summarised in the table underneath: Existing user authentication techniques include: Something you know, e.g. password or PIN. The issue is that many password are easy to guess, and can also be easily forgotten. Something you have, e.g. key or car. They can be lost, stolen or duplicated. Something you know and have, e.g. card + PIN. Something you are, e.g. fingerprint, hand, iris, retina, voice. You cannot lose them, are unique for each individual and are difficult to forge.

Disadvantages of a biometric system.


The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication. It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time For people affected with diabetes, the eyes get affected resulting in differences. Biometrics is an expensive security solution.

Advantages of Biometrics :
* Increase security - Provide a convenient and low-cost additional tier of security. * Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise the opportunity for ID fraud, buddy punching. * Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorised use of lost, stolen or "borrowed" ID cards. * Reduce password administration costs. * Replace hard-to-remember passwords which may be shared or observed. * Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access * Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! * Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance. * Unequivocally link an individual to a transaction or event.

Biometrics and Internal Control: An Emerging Opportunity


Maintaining effective internal controls is a fundamental element of financial management, required by both accounting guidelines and federal regulations. Biometrics is an emerging technology that has the potential to improve the effectiveness of internal controls for governmental units by strengthening control over access to assets and information systems, improving the reliability of financial data and ensuring greater compliance with laws and regulations. This article explains the emerging technology of biometrics, describes several of the more common biometrics currently in use, shows how biometrics can strengthen internal control and presents some real-world examples of biometric

Das könnte Ihnen auch gefallen