Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated

Embed Size (px)

DESCRIPTION

The Basics of Biometric Devices Much like passwords, biometric devices have an enrollment and verification process. You must first let the device have a record of what will be used to be authenticated. Uses personally identifiable information. This includes your fingerprint, iris, voice, or face. Devices are publically available to anyone with money. It is possible to purchase a biometric scanner of any sort to suit your security needs.

Citation preview

Biometric Devices Biometric devices use secure identification andauthentication in order for someone to use thedevice. These devices use automated methods ofverifying/recognizing the identity of a living personbased on physiological or behavioral characteristics.Such characteristics are fingerprints, facial images,iris prints, and voice recognition. The Basics of Biometric Devices
Much like passwords, biometric devices have an enrollment andverification process. You must first let the device have a record ofwhat will be used to be authenticated. Uses personally identifiable information. This includes yourfingerprint, iris, voice, or face. Devices are publically available to anyone with money. It ispossible to purchase a biometric scanner of any sort to suit yoursecurity needs. Fingerprint scanners are used in a variety of devices now-a- days
Fingerprint scanners are used ina variety of devices now-a- days. Most newer smartphonesand laptops have themalready built in, but you mayalso purchase them for yourcomputer. Pros: Unique Identifier Quick enrollment Quick authentication Culturally accepted Cons: Injuries can affect authentication Storage of fingerprint algorithm may be replicated Personal identity used vs. passwords/PINs Fingerprint Scanners Iris scanners are much like fingerprint scanners, but slightly more secure, and complex.
Enrollment usually takes a little longer than fingerprint scanners. Enrollment usually takes a digital picture and infrared/night vision picture. Pros: Iris is protected, and not commonly disfigured Patterns/textures stay the same for decades Cons: Poor digital images affect enrollment and authentication process Distance to scan iris may affect authentication User needs to stay still Iris Scanners Facial recognition is another camera-based authenticationmuch like iris scanning. However, it is not widely used for accountor information security. In most cases, facial recognition is used in public places bysecurity or law enforcement officials. Facial recognition can be used to pinpoint a wanted felon orsuspected terrorist out of a group people. Pros: Picking people out of a crowd Securing minimally important information Cons: Twins? Picture of authenticated user bypass Facial Recognition Voice recognition has came a long way in recent years
Voice recognition has came a long way in recent years. Most ofit is used for Speech-to-text services like Google, Siri, Cortana,automated call centers, Xbox, and PlayStation. Not widely used for security. Voice recognition programs search from patterns detected inspeech, tone, frequency, and use artificial neural networks. Pros: Hands-free use for multiple devices Good for typing-handicapped people Cons: Background noise can interfere Voices can be recorded; bad for security Voice Recognition Radio Frequency Identification (RFID) Chips are used for multipledevices and objects, to identify and track them. NBC Predicts that in 2017, most humans will be implanted withRFID chips that contain all of our personal data, such asfingerprints, facial data, iris data, name. address, etc Not a lot of people like the idea RFID Chips Biometric Impact on society
Biometric devices are mostly used for identification and security. Places with a need for high security use biometrics to protectsensitive information or materials from being exposed to the public. Public places use biometric technology to monitor and trackpeople; certain public places may be scanning for wanted criminals. Helps people authenticate themselves to use certain deviceswithout the need for a password or pin, no need to remember suchthings. Has some personally identifiable information privacy concerns. (Canour PID be hacked and stolen? [or even used against us].) Biometric Impact on society Almost all biometric technologies are already in place, ordeveloped, but most of these technologies have room toimprove. New(ish) biometric technologies could be: the use of thermalimagining scanners, hand geometry scanners, signaturerecognition, type-behavioral patter recognition, internet usagepatterns, and DNA and vein pattern scanners. The more biometrics improve, the more controversy surroundingprivacy will arise. Future of Biometrics Drawbacks of biometrics
Biometric devices are still under-developed, so most of thesetechnologies have flaws concerning quality of performance, andquestionable methods of storing personally identifiableinformation. Privacy issues concerning use of facial recognition technology inpublic places and on the internet. It would suck to have RFID chips forcefully implanted in us. Drawbacks of biometrics References https://en.wikipedia.org/wiki/Biometric_device
cons your-life-in-the-near-future/ References Biometrics No passwords are used Stored information has a potential to be hacked and stolen/used Biometric devices use secure identification andauthentication in order for someone to use thedevice. These devices use automated methods ofverifying/recognizing the identity of a living personbased on physiological or behavioral characteristics.Such characteristics are fingerprints, facial images,iris prints, and voice recognition. RFID chips can hold information such as fingerprints, facial data, blood type, address, etc Iris scanners, are highly secured, but a lot of memory and data has to be stored, and is intrusive. Facial recognition is mostly used in public places to track and identify people, and if youre a wanted felon or suspected terrorist, you may be confronted. Fingerprint scanners are the most widely accepted and used type of biometric security devices. They are in a multitude of devices now-a-days. Voice recognition is used is a multitude of devices now-a-days