Paper Details  
 
   

Has Bibliography
6 Pages
1399 Words

 
   
   
    Filter Topics  
 
     
   
 

Biometrics security

Biometrics uses personal characteristics to identify users. When it comes to security, mapping unique patterns and traits in fingerprints, irises or voices is considered light years ahead of forcing employees to memorize combinations of letters and numbers -- which are easily compromised and easily forgotten. The technology works by taking measurements -- whether it is the weight and length of bones in the hand or the pattern of blood vessels inside the eye or the pattern of fingerprints -- and then storing the specifics, often called minutiae, in a database. When a user scans a hand or retina, the new mapping is compared with the stored data. Access is either granted or denied based on matching patterns that are unique to each individual. It's that ability to identify someone based on unique physical traits that is driving biometrics into the corporate enterprise. As more high-priced transactions are conducted over the Internet, businesses increasingly need ironclad authentication of someone's identity. Add to that the increasing amount of in"house security breaches and corporate espionage, and you'll find network and security administrators grappling for a better way to secure information from unauthorized eyes. "Somebody who is doing stock trades online wants security that is amazingly accurate," says Michael Thieme, a senior consultant for International Biometric Group in Manhattan, an independent biometrics consulting and integration firm." A lot of recent security incidents are making people aware that they have a lot of data that just isn't as secure as they thought it would be. . . . If biometrics can even be a small part of that, it will be a tremendous market." Costs are dropping Until recently, the problem with biometrics has been its staggering cost. But prices have dropped by 80% to 90% in the past two to three years. A boom in research and development "largely driven by an increasing need for accurate forensics" has prod...

Page 1 of 6 Next >

    More on Biometrics security...

    Loading...
 
Copyright © 1999 - 2024 CollegeTermPapers.com. All Rights Reserved. DMCA