Got a tricky question? Receive an answer from students like you! Try us!

Barriers to using biometrics for mobile authentication - Essay Example

Only on StudentShare
Masters
Essay
Technology
Pages 5 (1255 words)

Summary

Biometrics is the science that uses unique physical characteristics of your body, such as your fingerprint or the pattern of your iris, to confirm your identity. Fingerprinting has been used for decades, primarily in law enforcement, but past technology was expensive and slow…

Extract of sample
Barriers to using biometrics for mobile authentication

Biometrics eliminates the danger of a password being stolen, or as is more common, a password being used without proper authorisation. Biometrics can reduce the problem of corporate risk associated with a supervisor "loaning" his badge to an associate to gain unauthorised access.
With the vast number of systems and the associated passwords, forgotten passwords and their problems could be reduced. Estimates suggest that between 25 to 50 % of all calls to help-desks are caused by forgotten passwords and cost $25 and $50 each(Leyden). When a worker loans his password to another worker to gain access to protected information on a one-time basis, that password has been breached. Biometrics eliminates the risk and assures that access to any entryway, file, or account can only be granted to authorised personnel. Biometrics also has a future in a wide range of applications where it is essential to identify the subject such as credit transactions and health care records.
Biometric applications are almost always used to prevent the unauthorised access to sensitive data. Since the early 1980s, systems of identification and authentication based on physical characteristics have been available. These systems were slow and expensive. ...
Download paper
Not exactly what you need?

Related Essays

Mobile Computing Assignment
The design requirement I- e devices needed to construct the network will follow this. The issues like how will user connect to the network will be address in this part.…
20 pages (5020 words)
Mobile Phone Radiations
But several studies on workers and experts who live within proximity of active radio frequency transmitters and even the modern mobile phone base stations have not shown increased probability of them having radiation related complications.…
10 pages (2510 words)
Mobile Policy
The company mobile phones that will be supplied are Windows mobile Smart Phones and Blackberries. You have the choice to decide which you will use. When a phone is issued to you that is the phone that you will keep. When leaving at the end of the day, you will return the phone to your locker and use it again when you return to work the following day.…
11 pages (2761 words)
Power Control for Mobile Phones
The aim of the minimum power assignment method is to provide users of cellular communication services with an acceptable connection with minimum usage of power on the side of the user so as to elongate battery discharge time, i.e. the amount of time that it takes for the battery of the cellular device to get discharged. The use of the synchronous and asynchronous standard power control algorithms guarantee to find the minimal power level required for establishing an acceptable connection given that the interference from other users that needs to be over come to do so, characterized by the…
8 pages (2008 words)
Mobile Computing
As a key component of Intelligent Transportation Systems Inter Vehicle Communication (IVC) is one of the major applications of mobile computing. A large amount of research has been carried out by academia and the industry alike in this field. IVC enables each and every high speed automobile to send, receive and forward packets amongst each other by dynamically forming mobile ad-hoc networks (MANETS). The information is transferred, distributed and acquired over this network. The vehicle to vehicle communication (V2V) enables the drivers and their vehicles to communicate with other vehicles…
10 pages (2510 words)