eSSL Security
Touch ID security feature, one may be inclined to ask: Can fingerprints
and other biometrics really replace passwords? More importantly, how effective
are biometrics in protecting our data?
In information technology, the term “biometrics” is also referred to
as “biometric authentication”. It is the process of identifying humans based on
their unique (anatomical, physiological or behavioral) characteristics and
traits. Common examples of human biometric markers are fingerprints, hand
prints, voice patterns, face patterns and irises, even one’s handwritten
signature.
And while we consider biometrics to be cutting-edge technology, the
basic premise of capturing, storing, and analyzing human markers has been
around for quite some time. Like most
technologies, using biometric authentication also has its pros and
cons. Having a computer system that is capable of scanning and verifying
fingerprints (for example), which in turn keeps unauthorized personnel out, is
an advantage.
Moreover, it
appears that the more potent a marker is in identifying an individual with
great accuracy and little false positives, the more intrusive the process of
capturing the marker is, not to mention more expensive. This is true for DNA,
and retinal and iris markers.
Biometric products are more likely
base on biological features of a person by the strong help of this kind of
features we can give extremely high security. Most of these features are abounded
with physical characters of a person like fingerprints, vein system of palm,
iris, footprints and face recognition. These features are unique for each individuals providing
extremely high security.
0 comments:
Post a Comment