If you can't read please download the document
Upload
darrell-lambert
View
221
Download
0
Embed Size (px)
DESCRIPTION
The Basics of Biometric Devices Much like passwords, biometric devices have an enrollment and verification process. You must first let the device have a record of what will be used to be authenticated. Uses personally identifiable information. This includes your fingerprint, iris, voice, or face. Devices are publically available to anyone with money. It is possible to purchase a biometric scanner of any sort to suit your security needs.
Citation preview
Biometric Devices Biometric devices use secure identification
andauthentication in order for someone to use thedevice. These
devices use automated methods ofverifying/recognizing the identity
of a living personbased on physiological or behavioral
characteristics.Such characteristics are fingerprints, facial
images,iris prints, and voice recognition. The Basics of Biometric
Devices
Much like passwords, biometric devices have an enrollment
andverification process. You must first let the device have a
record ofwhat will be used to be authenticated. Uses personally
identifiable information. This includes yourfingerprint, iris,
voice, or face. Devices are publically available to anyone with
money. It ispossible to purchase a biometric scanner of any sort to
suit yoursecurity needs. Fingerprint scanners are used in a variety
of devices now-a- days
Fingerprint scanners are used ina variety of devices now-a- days.
Most newer smartphonesand laptops have themalready built in, but
you mayalso purchase them for yourcomputer. Pros: Unique Identifier
Quick enrollment Quick authentication Culturally accepted Cons:
Injuries can affect authentication Storage of fingerprint algorithm
may be replicated Personal identity used vs. passwords/PINs
Fingerprint Scanners Iris scanners are much like fingerprint
scanners, but slightly more secure, and complex.
Enrollment usually takes a little longer than fingerprint scanners.
Enrollment usually takes a digital picture and infrared/night
vision picture. Pros: Iris is protected, and not commonly
disfigured Patterns/textures stay the same for decades Cons: Poor
digital images affect enrollment and authentication process
Distance to scan iris may affect authentication User needs to stay
still Iris Scanners Facial recognition is another camera-based
authenticationmuch like iris scanning. However, it is not widely
used for accountor information security. In most cases, facial
recognition is used in public places bysecurity or law enforcement
officials. Facial recognition can be used to pinpoint a wanted
felon orsuspected terrorist out of a group people. Pros: Picking
people out of a crowd Securing minimally important information
Cons: Twins? Picture of authenticated user bypass Facial
Recognition Voice recognition has came a long way in recent
years
Voice recognition has came a long way in recent years. Most ofit is
used for Speech-to-text services like Google, Siri,
Cortana,automated call centers, Xbox, and PlayStation. Not widely
used for security. Voice recognition programs search from patterns
detected inspeech, tone, frequency, and use artificial neural
networks. Pros: Hands-free use for multiple devices Good for
typing-handicapped people Cons: Background noise can interfere
Voices can be recorded; bad for security Voice Recognition Radio
Frequency Identification (RFID) Chips are used for multipledevices
and objects, to identify and track them. NBC Predicts that in 2017,
most humans will be implanted withRFID chips that contain all of
our personal data, such asfingerprints, facial data, iris data,
name. address, etc Not a lot of people like the idea RFID Chips
Biometric Impact on society
Biometric devices are mostly used for identification and security.
Places with a need for high security use biometrics to
protectsensitive information or materials from being exposed to the
public. Public places use biometric technology to monitor and
trackpeople; certain public places may be scanning for wanted
criminals. Helps people authenticate themselves to use certain
deviceswithout the need for a password or pin, no need to remember
suchthings. Has some personally identifiable information privacy
concerns. (Canour PID be hacked and stolen? [or even used against
us].) Biometric Impact on society Almost all biometric technologies
are already in place, ordeveloped, but most of these technologies
have room toimprove. New(ish) biometric technologies could be: the
use of thermalimagining scanners, hand geometry scanners,
signaturerecognition, type-behavioral patter recognition, internet
usagepatterns, and DNA and vein pattern scanners. The more
biometrics improve, the more controversy surroundingprivacy will
arise. Future of Biometrics Drawbacks of biometrics
Biometric devices are still under-developed, so most of
thesetechnologies have flaws concerning quality of performance,
andquestionable methods of storing personally
identifiableinformation. Privacy issues concerning use of facial
recognition technology inpublic places and on the internet. It
would suck to have RFID chips forcefully implanted in us. Drawbacks
of biometrics References
https://en.wikipedia.org/wiki/Biometric_device
cons your-life-in-the-near-future/ References Biometrics No
passwords are used Stored information has a potential to be hacked
and stolen/used Biometric devices use secure identification
andauthentication in order for someone to use thedevice. These
devices use automated methods ofverifying/recognizing the identity
of a living personbased on physiological or behavioral
characteristics.Such characteristics are fingerprints, facial
images,iris prints, and voice recognition. RFID chips can hold
information such as fingerprints, facial data, blood type, address,
etc Iris scanners, are highly secured, but a lot of memory and data
has to be stored, and is intrusive. Facial recognition is mostly
used in public places to track and identify people, and if youre a
wanted felon or suspected terrorist, you may be confronted.
Fingerprint scanners are the most widely accepted and used type of
biometric security devices. They are in a multitude of devices
now-a-days. Voice recognition is used is a multitude of devices
now-a-days