Friday, September 27, 2019

Biometrics and Wireless Technology Essay Example | Topics and Well Written Essays - 1750 words

Biometrics and Wireless Technology - Essay Example This technology is now the more favoured method of identification over traditional methods like password and PIN identifications. High numbers of passwords and PINs are generated on a daily basis as more and more people are settling in with the pace of technology. These PINs and passwords are saved electronically on database servers, which at some point may run out of space. In this scenario, the better choice for a person is to be her or his own password. In today's market many types of biometrical identification tools are available such as fingerprinting, face recognition, finger and hand geometry, iris recognition, voice and signature recognition (von Graevenitz 2003). Biometric data collected using sensors are converted to digital formats for storage into computer databases. Fingerprinting biometrics has been long in use by the crime solving agencies and immigration authorities. However, technologies to use iris, face, and voice for recognition are still in their infancy. According to the founder and chairperson of CardTech/SecurTech, Ben Miller, biometric technologies have been in use since 1968. The University of Georgia was a pioneer in the use of biometric technology when in 1973 the university set up a hand-scanning system that helped restrict entry into its all-you-can-eat dining halls. Fingerprinting, iris recognition, retina recognition, face recognition, and hand recognition have been successfully imple... Fingerprints are then stored in image formats or encoded character strings. This technology is cost effective and very accurate (Biometrics 101). Irises are also a unique characteristic that can be scanned saved in a digital format. Since irises remain unchanged after surgery or with the use of glasses or contact lenses, this technology is fast gaining popularity (Biometrics 101). Retina recognition systems are used in some high-risk facilities such as military installation systems. This technique is considered the most accurate among all available biometrics technologies. However, the installation cost for this technology is high (Biometrics 101). Face recognition systems analyse the facial geometry of a person and can verify a person's identity within a very short time and from a distance of 2 feet (Biometrics 101). As the internet age has progressed and matured, it has seen the advent of wireless technologies, which have brought flexibility of communication, as wireless systems do not need any physical connections. Transmission of data in wireless systems takes place through radio frequency. The popularity of wireless devices such as mobile phones, PDAs, smart phones, and other handheld devices is at its height at this time. Karygiannis and Owens (2002) recognised that wireless networks are at the same risk as wired networks but they are also vulnerable to a few new security threats due to the limitation of wireless protocols. For security implementation, in wireless systems biometric technology is getting a lot of attention as it provides an extra level of security. It can be used as a stand-alone security device or along with another protection system. Agencies that need higher levels of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.