Biometrics is the science that uses unique physical characteristics of your body, such as your fingerprint or the pattern of your iris, to confirm your identity. Fingerprinting has been used for decades, primarily in law enforcement, but past technology was expensive and slow…
Download file to see previous pages...
Biometrics eliminates the danger of a password being stolen, or as is more common, a password being used without proper authorisation. Biometrics can reduce the problem of corporate risk associated with a supervisor "loaning" his badge to an associate to gain unauthorised access.
With the vast number of systems and the associated passwords, forgotten passwords and their problems could be reduced. Estimates suggest that between 25 to 50 % of all calls to help-desks are caused by forgotten passwords and cost $25 and $50 each(Leyden). When a worker loans his password to another worker to gain access to protected information on a one-time basis, that password has been breached. Biometrics eliminates the risk and assures that access to any entryway, file, or account can only be granted to authorised personnel. Biometrics also has a future in a wide range of applications where it is essential to identify the subject such as credit transactions and health care records.
Biometric applications are almost always used to prevent the unauthorised access to sensitive data. Since the early 1980s, systems of identification and authentication based on physical characteristics have been available. These systems were slow and expensive. Twenty years later, computers are faster and cheaper and have renewed the interest in biometrics (Kay).
Biometrics may be used in conjunction with smart card technology to gain access to a bank account to transfer funds. This eliminates the threat of unwanted intrusion, as can be the case with a PIN number. The added security verifies the account that is protected, and the biometric information can also be used as a legal verification in the same way we use signed documents.
With the increased need for a central medical database for medical records has come the controversy surrounding the unauthorised use and access of the information. Biometrics can verify the request for the records has come from an authorised source and minimise the opportunity for the records to be compromised. Biometrics can also be applied to portable devices, such as laptops, to prevent stolen devices from being accessed with pre-boot biometric authorisation. This can be applied to cell phones and PDAs as well. Though there may not be a foolproof method, biometrics does make it more difficult. According to Jamie Fenton in PC World, "The devices are not error-free, so they're best suited for businesses that need another safeguard for standard or somewhat sensitive data "
Wireless devices are especially appropriate for the application of biometrics. Biometrics can be used to prevent unauthorised use of communications devices such as cell phones as well as police, emergency, and defence department networks. As an ever-increasing number of wireless devices are connected to corporate networks, the need for security becomes imperative. With smaller and less expensive devices, the advancement of biometrics can assure that the implementation of wireless will be done with a minimum of risk(DigitalPersona).
Voice recognition is another popular application in wireless communication devices. It is most widely used to place calls, or perform routines based on voice recognition. It allows for hands free operation and is generally applied for safety concerns. Though it can suffer from reliability issues, there is
...Download file to see next pagesRead More
Cite this document
(“Barriers to using biometrics for mobile authentication Essay”, n.d.)
Retrieved de https://studentshare.org/technology/1528186-barriers-to-using-biometrics-for-mobile-authentication
(Barriers to Using Biometrics for Mobile Authentication Essay)
“Barriers to Using Biometrics for Mobile Authentication Essay”, n.d. https://studentshare.org/technology/1528186-barriers-to-using-biometrics-for-mobile-authentication.
Collaborations are at their verge as people use mobile devices to integrate, communicate, distribute the work, and coordinate (Katz, 2011). As of today, workers are becoming mobile, majority of organizations are focusing on supporting the growth of the number of employees who apply the use of mobile devices which include tablets and Smartphone to perform their duties while at their homes, while travelling, and at work.
These services give the people privileges to deal with their respective environments and be able to assure to themselves the freedom of choice to their own lives. According to the National Organization of Human Services, Human Services is very broad in scope; however it also uniquely approaches the “objective of meeting human needs through an interdisciplinary knowledge base, focusing on prevention as well as remediation of problems, and maintaining a commitment to improving the overall quality of life of service populations.” The Barriers towards Good Quality Human Services Human services are also experiencing barriers in order to meet the current standards for a variety of clients.
The present study focuses on an understanding of the use of biometrics and the commercial factors associated with it along with the current trends in its growth and use. In the present times, the use of information technology has increased to a great extent that calls for the need of privacy and security of all data and information.
Biometrics (Add Student’s Name) (Add Tutor’s Name) (Add Date) Biometrics Biometrics is the ultramodern means of identification of individuals based on their biological as well as behavioral characteristics. Biometrics had been a popular topic of debate for a while especially in choosing it as the technology for security checks and access control.
There are various kinds of biometrics one of the most common being facial recognition. In facial recognition, the spatial geometry of the facial biometrics is recorded. There are various ways of facial recognition but the common feature for all of them is the fact that they all rely on measurement of the distinguishable facial features (Woodward et al.
The integration of Information Technology and the physical access control systems have created a vibrant and a dynamic industry which is constantly redefining its capabilities. Physical security of the entrances and exits along with the logging of all inbound and outbound personnel has become an indispensable part of the security management of the facility.
t varieties of wheat were compared with the help of different agricultural experiments, in order to understand the yielding characteristics of the wheat with the facilitation of statistical analyses through biometrics. In this way, a number of sectors have employed the means of
The kind of technology and networking that exists around us has without doubt made life simpler for us. But, the extent to which it has made us safer is still being debated.
While on the one hand we have advanced security gadgets, on the other the acts of
Systems and applications that require such authentication include computer systems, gaining access to buildings, personal computers, laptops, cellular phones and ATMs. Need for reliability has led to heightened concerns about security increased advancements in
10 Pages(2500 words)Research Paper
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Barriers to using biometrics for mobile authentication for FREE!