Nobody downloaded yet

Barriers to using biometrics for mobile authentication - Essay Example

Comments (0) Cite this document
Biometrics is the science that uses unique physical characteristics of your body, such as your fingerprint or the pattern of your iris, to confirm your identity. Fingerprinting has been used for decades, primarily in law enforcement, but past technology was expensive and slow…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Barriers to using biometrics for mobile authentication
Read TextPreview

Extract of sample
"Barriers to using biometrics for mobile authentication"

Download file to see previous pages Biometrics eliminates the danger of a password being stolen, or as is more common, a password being used without proper authorisation. Biometrics can reduce the problem of corporate risk associated with a supervisor "loaning" his badge to an associate to gain unauthorised access.
With the vast number of systems and the associated passwords, forgotten passwords and their problems could be reduced. Estimates suggest that between 25 to 50 % of all calls to help-desks are caused by forgotten passwords and cost $25 and $50 each(Leyden). When a worker loans his password to another worker to gain access to protected information on a one-time basis, that password has been breached. Biometrics eliminates the risk and assures that access to any entryway, file, or account can only be granted to authorised personnel. Biometrics also has a future in a wide range of applications where it is essential to identify the subject such as credit transactions and health care records.
Biometric applications are almost always used to prevent the unauthorised access to sensitive data. Since the early 1980s, systems of identification and authentication based on physical characteristics have been available. These systems were slow and expensive. Twenty years later, computers are faster and cheaper and have renewed the interest in biometrics (Kay).
Biometrics may be used in conjunction with smart card technology to gain access to a bank account to transfer funds. This eliminates the threat of unwanted intrusion, as can be the case with a PIN number. The added security verifies the account that is protected, and the biometric information can also be used as a legal verification in the same way we use signed documents.
With the increased need for a central medical database for medical records has come the controversy surrounding the unauthorised use and access of the information. Biometrics can verify the request for the records has come from an authorised source and minimise the opportunity for the records to be compromised. Biometrics can also be applied to portable devices, such as laptops, to prevent stolen devices from being accessed with pre-boot biometric authorisation. This can be applied to cell phones and PDAs as well. Though there may not be a foolproof method, biometrics does make it more difficult. According to Jamie Fenton in PC World, "The devices are not error-free, so they're best suited for businesses that need another safeguard for standard or somewhat sensitive data "
Wireless devices are especially appropriate for the application of biometrics. Biometrics can be used to prevent unauthorised use of communications devices such as cell phones as well as police, emergency, and defence department networks. As an ever-increasing number of wireless devices are connected to corporate networks, the need for security becomes imperative. With smaller and less expensive devices, the advancement of biometrics can assure that the implementation of wireless will be done with a minimum of risk(DigitalPersona).
Voice recognition is another popular application in wireless communication devices. It is most widely used to place calls, or perform routines based on voice recognition. It allows for hands free operation and is generally applied for safety concerns. Though it can suffer from reliability issues, there is ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Barriers to using biometrics for mobile authentication Essay”, n.d.)
Retrieved de
(Barriers to Using Biometrics for Mobile Authentication Essay)
“Barriers to Using Biometrics for Mobile Authentication Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
...?Biometrics: Some Unseen Aspects Biometrics: Some Unseen Aspects Introduction Biometrics is the computerized method ortechnique of recognizing a person on the basis of physical or behavioral characteristics. Instead of the traditional security systems, the society today needs new verification systems to be in use; this is where the biometric authentication has gained its relevance. The production of biometric authentication systems has been increasing for the recent years. Numerous manufacturers and distributors have identified it as a growing industry. The technique has succeeded in preventing physical existence from highly protected environments. However the success of the method is still skeptical where network authentication... is...
4 Pages(1000 words)Assignment
...the likeliness of identifying theft. The Irish Council for Bioethics (2009) says that privacy concerns relating to biometrics are unambiguous in two spheres, namely personal privacy, i. e, abhorrence about personal identity, and bodily integrity and informational privacy relating to misuse of data and identity proofs. But the technology itself cannot be completely discarded only for these reasons because it has its own merits that are useful in providing extremely high levels of information security as well as clarity in security checks. Therefore, biometric systems should be upgraded that personal privacy is protected. The challenges faced by biometrics is rather...
2 Pages(500 words)Essay
Biometric Authentication
...authentication. What alternative solution(s) are applicable to this context of use? Provide their distinction(s) to rule-based authentication mechanisms. The biometrics technology does not go without fault as it has been termed as both a promising and disruptive technology. The inapplicability of the current authentication services deem a dedicated biometric solution extremely necessary. Before a biometric is chosen for use in biometric authentication, it is necessary that a suitability test be performed on the biometric authentication....
7 Pages(1750 words)Essay
Biometric Authentication
One’s fingerprint, hand, or face recognition senses such specific details as ridges, orientation, as well as other features of the fingerprint. DBS is thus an effective technology offering optimal solutions towards the safety of responsive areas, thereby meeting the demands of the clients for high security whilst maintaining litheness (Nanavati et al 2002). According to Jain et al (1996), a number of factors underscore the inevitability of a DBS. First, DBS requires that a recognition trait must be universal. This implies that all people must possess a chosen biometric, with each person having a distinctive one. Secondly, the chosen biometric, in every human being, must be stable. Role-based admission management is a fundame...
7 Pages(1750 words)Essay
... BIOMETRICS Introduction Biometrics refers to the unique personal, physical and measurable characteristics that can be used to identify an individual. The process involves both identification and verification of these traits. The identification process is different from the verification process in that verification involves comparison of the facial feature of a subject with the features of one other face to ascertain whether they match while identification involves comparison with several other faces to determine which of them accurately matches with the subject. There are various kinds of biometrics one of the most common being facial recognition. In facial recognition, the spatial geometry of the facial biometrics is recorded... . There are...
5 Pages(1250 words)Term Paper
..., and fingerprints. (Woodward, pp. 73-74) Until now, biometrics has only been used to identify, verify, and authenticate the humans around the globe, and animals and other species have not been included in this field. In the simple process of biometrics, a sample of biological or physiological trait is compared with the samples in a database, in order to identify the person X with the specific person in the records. Such simple process has been employed in a number of locations in different parts of the globe. Moreover, it has become a regular mode of identification of the individuals, such as airports, educational institutions, prisons, banks, etc. Prisons and jails are...
10 Pages(2500 words)Essay
BIOMETRICS the ePassport today. This passport contains the required biometric information in order to authenticate or verify a particular individual while traveling. These passports employ the use of the contact-less smart card technology in which no contact needs to be made with the biometric identifier system. A microprocessor chip along with an antenna is embedded onto or inside the passport. The picture on the next page shows the structure of the biometric passport: Source: Google Images All the critical information is on the passport as well as on the included chip. This chip might be vulnerable to people who might be willing to use one’s...
8 Pages(2000 words)Essay
Biometric Authentication
..., weaknesses and strengths among other pertinent issues. The biometrics technology does not go without fault as it has been termed as both a promising and disruptive technology. The main reason why a dedicated biometric solution is needed is because the current biometricauthentication services are not applicable under certain circumstances. Before a biometric is chosen for use in biometricauthentication, it is necessary that a suitability test be performed on the biometricauthentication. Jain, Bolle,...
7 Pages(1750 words)Essay
...Insert Biometrics Advancement in technology and especially electronic technology has brought about great demand for accurate, fast and reliable user authentication and identification systems. Systems require a personal recognition scheme that ensures that services are only accessed by legitimate users. Systems and applications that require such authentication include computer systems, gaining access to buildings, personal computers, laptops, cellular phones and ATMs. Need for reliability has led to heightened concerns about security increased advancements in communication, mobility, and networking. Biometrics recognition is, therefore, the automatic...
10 Pages(2500 words)Research Paper
Biometric Authentication
...on the actual data from the actual users, leaving minimal chances. Biometric methods are more reliable than other methods, but still faces various limitations and exposure to dynamic attacks.. The desirable processes of biometric authentication methods that make it reliable include verification, screening and identification. 1.1. Verification This is a test make sure that a person A is exactly the one he claims to be. The verification can be envisaged in two ways: using central storage or using distributed storage. 1.2. Screening This process makes use of a watch list or a database, containing data of people to be excluded. It has...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Barriers to using biometrics for mobile authentication for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us