Biometrics secure or not!
Observe
statistical study of biological data:
the application of statistical techniques to biological data
The word biometrics comes from the Greek bios (life) and metrikos (measure).
• It is pure mathematical pattern
• To measures distance between our Bio ID patterns by statistics.
Security levels
• Level 1 relies on something a person carries, such as an ID badge with a photograph or a computer cardkey.
• Level 2 relies on something a person knows, such as a password or a code number.
• Level 3, the highest level, relies on something that is a part of a person’s biological makeup or behavior, such as a fingerprint, a facial image.
Verification system which is based on “PREVIOUSLY STORED DATA”.
Techniques for usages
• Facial Recognition
• Fingerprint identification
• Hand geometry
• Retinal pattern recognition
• Iris based identification
• Signature recognition
• Voice recognition
Thank god:
• We ensure that the biometric trait would remain unchanged even ‘as the person aged’.
Needs of thief:
• 1st Thieves aim to gain access to your biometric data and claim the same as their own.
• 2nd We are collecting uniquely identifiable information that cannot change,
because that information we cannot change means there is no alternate recourse for an individual to prove who they are.
• 3rd Usage of mould and material such as clay, gelatin or dental plaster to make fake fingers,
or simply chop off a finger from a user to save the time
• E.g. Terminator movie
Research:
• of Clarkson Biomedical signals Analysis Laboratory,
• 60 faked finger samples can possible to make of one finger.
• in addition hi tech fingerprint scanners also did false verification 90 % of them.
• Wonder to use!
Information:
• Many developed countries like US, UK, Germany, Morocco, and Bahrain developed readable biometrics identity of all country’s people.
• India is also stands in this line of progress it make biometrics Civil ID.
Future conclusion:
• Hyperion, Biometric manufacture Comp.’s CEO David Brich said:
• “Biometric might work well for an environment under security control like ATM but would be less useful in a PC, unless secure hardware was added in future.”

No comments:
Post a Comment