RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
2011/01/16 17:57:19

Myths and stereotypes of biometrics

Now biometric identification is, perhaps, one of the most popular technologies in security systems and access control (ACS). About some myths and stereotypes accompanying references "biometrics" - in this article.

The directory of biometric technologies and projects is available on TAdviser.

Content

Myths

Myth number one – The first myth which needs to be dispelled is idea that biometric identification – the modern idea. Despite a hi-tech image of this technology, the principles which are its cornerstone are known since Ancient Egypt when the workers building great pyramids were identified not only on names, but also on growth, build, a form and complexion and other special signs, for example, to scars.[1]

Four and a half thousand years for implementation of technological approach to identification of the personality, but nevertheless were required, today technologies of this direction are in a stage of rapid development what "hockey stick" of a curve of their implementation, and the fact that in government structures, hospitals, schools, the airports, networks of retail and offices systems much expanding possibilities of control and access control are successfully used demonstrates to.

About stereotypes

Data of biometric identification can be stolen

After reading out modern biometric ACS identification data of the person, will transform them to the individual digital code by which it is impossible to recover personal user IDs. Thus, data of fingerprints and other individual physiological characteristics remain closed.

Myth

Devices of scanning of an iris of the eye of an eye use the laser

In fact, the camera used at recognition of a retina takes black-and-white pictures at distance of 60 cm and uses noninvasive infrared lighting (as at the television remote control) which is almost invisible and is absolutely safe for the person.

Stereotype

Biometric identifiers can be forged

Nothing is perfect in the world. Probably, if to aim to change geometry of the person or an iris of an eye, it is possible to achieve it. And sense?

The professional systems of biometric recognition, are rather reliably protected. If to speak about the budget systems, most likely, it is necessary to speak not about counterfeits - about imperfection of the system. It is possible to judge a possibility of falsification, but not the industry in general. There are solutions protecting systems from falsifications and at the program, and hardware level.

Again myth

For identification it is possible to use separate parts of a body

The majority of biometrics devices have function of determination of viability of an object on the basis of many characteristics – from finger pulse before reaction of a pupil. Usually it is enough that a system prohibited access when using of the cut-off parts of a body.

Still stereotype

The biometric equipment is very expensive Expensively or cheap - a question ambiguous and understood by all it is ambiguous. If the customer demands conveniences, and not strongly is anxious about security, he can quite expect systems at the price not exceeding ACS on the basis of smart cards. But if it is necessary to provide, except convenience, security as one of the making high-quality ACS on the basis of biometrics, the purchase price of the equipment can be both is slightly higher, and is much higher.

Again myth

The sensing technology of fingerprints is incapable to register or identify children or women of Asian origin on fingerprints

Recent achievements in the field of image processing allowed to increase resolution of the sensors which are reading out fingerprints therefore the biometric systems found capability to distinguish the relevant information necessary for creation of a biometric template of the person.

Stereotype

The biometric systems are unreliable

Systems consist of two parts: hardware and program. As for the equipment – it makes sense to take the producer into account.

About a program part: one of the asked questions - that will be if switch off electricity... The system of back supply, as well as for other ACS should be provided. In some cases it is possible to provide the lock with a key. It is unacceptable for corporate clients as it sharply reduces the level of security of an object.

If to speak about firmness of systems from vandalism, it is worth separating identification methods: at contact of the person with the reader, it is hardly possible to hide it behind armored glass. Respectively, there is a physical access to the equipment. If dactyloscopy and the optical scanner is applied, then it is possible to apply such protection, but it will affect other parameter – a possibility of counterfeit of a fingerprint. If the reader, for example, except removal of individual parameters catches temperature indicators, then with the device not to avoid direct contact of the person. Producers differently treat this problem. Some release systems with structure which even at damage of the reader excludes a possibility of manipulation as the actuator is in the protected object (with access restriction to it on the persons having the right to access to the premises). When using systems when the controller and the reader are in one "body", there is a risk of penetration of the malefactor. The safest creation of structure when even inactivation of the reader does not allow to get in the protected perimeter.

Myth

Myth number five is connected with idea that information on fingerprints registered by the system of identification in the commercial organizations can be transferred to police and is used at criminal investigations.

All existing systems with identification on fingerprints used for commercial purposes do not store the complete image of a print – they only read out information on a fingerprint for creation of its mathematical image – a template. This template which besides is usually ciphered forms in such a way that it is impossible to recover an initial image of a fingerprint therefore this information is absolutely useless for police and even for hackers. (The attempt from the hacker to deceive the system of identification on fingerprints using the recovered template will be rejected by a system which will at once give a signal that information was stolen and the repeated attacks are possible).

Other stereotypes

A biometric system is a lock

Speaking about use of biometrics devices, sometimes identify them with the normal lock - the actuator. It is not right. The biometrics performs function of a key (or the password – in case of its application in information technology field). She makes two major decisions – to provide access or to refuse. Function of unlocking/locking is executed by the actuator - the lock: electromagnetic, electromechanical, electromotor, an electrolatch, a digital cylinder, etc., gate with the electric drive, a gate, the elevator, a tourniquet, an intercom system, the smart home system, signaling, safes and so forth.


Biometrics scope - industrial or military facilities

A variety of systems such is that can satisfy needs of both representatives of the private sector, and large-scale productions and corporations. Biometric control and management systems for access are installed at schools, the universities, industrial buildings, financial institutions today – everywhere where the sufficient security level and good functionality is necessary.


Compatibility of the biometric systems with the equipment of the third firms

Different producers use different data exchange protocols. At the same time, the possibility of converting of a signal from "the" protocol in more widespread is available - necessary information will allow the biometric ACS to be a part of the "card" ACS which is already existing, for example. Now there are no problems with data integration of one program in another.

Notes