StudentShare solutions
Triangle menu

Barriers to using biometrics for mobile authentication - Essay Example

Not dowloaded yet

Extract of sample
Barriers to using biometrics for mobile authentication

Biometrics eliminates the danger of a password being stolen, or as is more common, a password being used without proper authorisation. Biometrics can reduce the problem of corporate risk associated with a supervisor "loaning" his badge to an associate to gain unauthorised access.
With the vast number of systems and the associated passwords, forgotten passwords and their problems could be reduced. Estimates suggest that between 25 to 50 % of all calls to help-desks are caused by forgotten passwords and cost $25 and $50 each(Leyden). When a worker loans his password to another worker to gain access to protected information on a one-time basis, that password has been breached. Biometrics eliminates the risk and assures that access to any entryway, file, or account can only be granted to authorised personnel. Biometrics also has a future in a wide range of applications where it is essential to identify the subject such as credit transactions and health care records.
Biometric applications are almost always used to prevent the unauthorised access to sensitive data. Since the early 1980s, systems of identification and authentication based on physical characteristics have been available. These systems were slow and expensive. Twenty years later, computers are faster and cheaper and have renewed the interest in biometrics (Kay).
Biometrics may be used in conjunction with smart card technology to gain access to a bank account to transfer funds. This eliminates the threat of unwanted intrusion, as can be the case with a PIN number. The added security verifies the account that is protected, and the biometric information can also be used as a legal verification in the same way we use signed documents.
With the increased need for a central medical database for medical records has come the controversy surrounding the unauthorised use and access of the information. Biometrics can verify the request for the records has come from an authorised source and minimise the opportunity for the records to be compromised. Biometrics can also be applied to portable devices, such as laptops, to prevent stolen devices from being accessed with pre-boot biometric authorisation. This can be applied to cell phones and PDAs as well. Though there may not be a foolproof method, biometrics does make it more difficult. According to Jamie Fenton in PC World, "The devices are not error-free, so they're best suited for businesses that need another safeguard for standard or somewhat sensitive data "
Wireless devices are especially appropriate for the application of biometrics. Biometrics can be used to prevent unauthorised use of communications devices such as cell phones as well as police, emergency, and defence department networks. As an ever-increasing number of wireless devices are connected to corporate networks, the need for security becomes imperative. With smaller and less expensive devices, the advancement of biometrics can assure that the implementation of wireless will be done with a minimum of risk(DigitalPersona).
Voice recognition is another popular application in wireless communication devices. It is most widely used to place calls, or perform routines based on voice recognition. It allows for hands free operation and is generally applied for safety concerns. Though it can suffer from reliability issues, there is ...Show more

Summary

Biometrics is the science that uses unique physical characteristics of your body, such as your fingerprint or the pattern of your iris, to confirm your identity. Fingerprinting has been used for decades, primarily in law enforcement, but past technology was expensive and slow…
Author : starkteagan
Barriers to using biometrics for mobile authentication essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Barriers to using biometrics for mobile authentication"
with a personal 20% discount.
Grab the best paper

Related Essays

Using Mobile Technology and Mobile devices in the workplace
Collaborations are at their verge as people use mobile devices to integrate, communicate, distribute the work, and coordinate (Katz, 2011). As of today, workers are becoming mobile, majority of organizations are focusing on supporting the growth of the number of employees who apply the use of mobile devices which include tablets and Smartphone to perform their duties while at their homes, while travelling, and at work.
9 pages (2250 words) Essay
Human Services using technology to overcome barriers
These services give the people privileges to deal with their respective environments and be able to assure to themselves the freedom of choice to their own lives. According to the National Organization of Human Services, Human Services is very broad in scope; however it also uniquely approaches the “objective of meeting human needs through an interdisciplinary knowledge base, focusing on prevention as well as remediation of problems, and maintaining a commitment to improving the overall quality of life of service populations.” The Barriers towards Good Quality Human Services Human services are also experiencing barriers in order to meet the current standards for a variety of clients.
5 pages (1250 words) Essay
Biometrics
These are helpful for the purpose of authentication. In the recent times, the use of biometric systems for authentication has become significantly essential as well as popular in different organizations and workplaces intended on protection of organizational information from unwanted or risky individuals (Biometrics, 2012).
5 pages (1250 words) Essay
Biometrics
Biometrics (Add Student’s Name) (Add Tutor’s Name) (Add Date) Biometrics Biometrics is the ultramodern means of identification of individuals based on their biological as well as behavioral characteristics. Biometrics had been a popular topic of debate for a while especially in choosing it as the technology for security checks and access control.
2 pages (500 words) Essay
The Future of Access Control
The integration of Information Technology and the physical access control systems have created a vibrant and a dynamic industry which is constantly redefining its capabilities. Physical security of the entrances and exits along with the logging of all inbound and outbound personnel has become an indispensable part of the security management of the facility.
10 pages (2500 words) Essay
Biometrics
t varieties of wheat were compared with the help of different agricultural experiments, in order to understand the yielding characteristics of the wheat with the facilitation of statistical analyses through biometrics. In this way, a number of sectors have employed the means of
10 pages (2500 words) Essay
BIOMETRICS
The kind of technology and networking that exists around us has without doubt made life simpler for us. But, the extent to which it has made us safer is still being debated. While on the one hand we have advanced security gadgets, on the other the acts of
8 pages (2000 words) Essay
Human Services using technology to overcome barriers
These services give the people privileges to deal with their respective environments and be able to assure to themselves the freedom of choice to their own lives. According to the National Organization of Human Services, Human Services is very broad in
5 pages (1250 words) Essay
Biometrics
ain, Bolle and Pankanti (n.d) point out, biometrics will gradually become a prime appurtenance in identification technology especially for the following reasons: repeatedly falling prices of biometric sensors, advancement in the underlying technology, increasing awareness among
3 pages (750 words) Essay
Biometric Authentication
However, this does not guarantee safety for the individual’s property and data simply because of the rising number of identity theft cases and data disclosure cases. IT developers have
7 pages (1750 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation