Biometrics and Wireless Technologies

Undergraduate
Essay
Miscellaneous
Pages 8 (2008 words)
Download 0
Biometrics is the authentication or the identification of individuals based on a physical characteristic or trait. Physical characteristics include fingerprints, facial recognition, hand geometry or iris configuration; and traits include signature formation, keystroke patterns or voice recognition…

Introduction

Dominant security-enhancement technologies leave a lot to be desired. In addition to security risks, has been estimated that between half to a third of calls to IT help desks are password related, and that managing multiple passwords and password resetting costs can range between $200 (Forrester Research estimate) to $340 (Gartner estimate) per employee per year (www.Forrester.com (2005); www.Gartner.com (2005)).
Biometrics can offer significant security enhancements as well as other value-added applications. Potential applications of biometric technologies range from controlling physical access to facilities (used by Disneyworld to provide access to season pass holders), enabling voice recognition at call-centers (used by the Home Shopping Network and Charles Schwab to enable hassle-free client authentication), controlling time and attendance of employees (used by McDonalds), providing self-service access to safe deposit vaults at banks (used by the Bank of Hawaii and First Tennessee Bank), or cashing checks in supermarkets (used by Kroger, Food 4 Less and BI-LO).
Security concerns and higher levels of fraud, such as the rising incidence of identity theft, combined with advancements in biometric technologies and reducing costs of the technologies involved, have provided an impetus for greater diffusion and highl ...
Download paper
Not exactly what you need?

Related papers

Wireless Network technology
First is the GSM or Global System for Mobile Communications. GSM has 3 systems, the switching system, the base station system, and the operation and support system. Next is the PCS or Personal Communications Service. Sprint is said to be the first who used this kind of system. Last is the D-AMPS or the Digital Advanced Mobile Phone Service. This is the new version of AMPS. …
Wireless Management (How to manage wireless types)
If we analyze an overview of the content manager we would come to know the role "content manager" plays in managing various services. It enables you to edit services, including mobile services. These reusable services can be invoked as a normal service, or by another service to return a result to that service. Wireless provides several mobile services that are ready for deployment, including those…
Biometrics and Wireless Technologies
Dominant security-enhancement technologies leave a lot to be desired. In addition to security risks, has been estimated that between half to a third of calls to IT help desks are password related, and that managing multiple passwords and password resetting costs can range between $200 (Forrester Research estimate) to $340 (Gartner estimate) per employee per year (www.Forrester.com (2005);…
Verizon Wireless
These are its high quality nationwide wireless network, technological choice of CDMA instead of GSM, constant monitoring of its products and services, and provision of the best product to the customer through an automated software which analyzes customers' calling habits.…
Biometrics and Wireless Technology
This technology is now the more favoured method of identification over traditional methods like password and PIN identifications. High numbers of passwords and PINs are generated on a daily basis as more and more people are settling in with the pace of technology. These PINs and passwords are saved electronically on database servers, which at some point may run out of space. In this scenario, the…
Building Technologies
Social shaping of a building technology is related to the ways and customs, in which the physical structure, apparatus, and modus operandi used, cooperate with the social needs and customs of the community.…