Biometrics: The Future of IT Access Control

  • Thread starter mantra
  • Start date
In summary, biometrics are widely used in access control and network admin control. They are not just used as attendance machine, but also for security of personal computer access control. The issue is more of a social issue than a technological one.
  • #1
mantra
3
0
now biometrics are widely used in access control and network admin control.
they are not just used as attendance machine, but utilized as network access control and for security of personal computer access control.
 
Computer science news on Phys.org
  • #2
mantra said:
now biometrics are widely used in access control and network admin control.
they are not just used as attendance machine, but utilized as network access control and for security of personal computer access control.

Hello mantra and welcome to the forums.

Are you trying to ask a question or are you trying to get our views on biometric technologies?
 
  • #3
provide anything you can share

yes please share your views on future projections.
 
  • #4


mantra said:
yes please share your views on future projections.

It is hard to say.

The issue is not so much a technological issue, but more of a privacy and ethical issue.

In terms of classifying and searching for matches within a large database of results, techniques like wavelets are used currently for doing this kind of thing with fingerprints, and there is a lot of active research both pure and applied in this area.

The problem that I see is whether people will accept this. This is not a technological issue, but a social one.

The thing is that with any security protocol, the actual mechanism in this case which is checking that the biometric data against the hash stored on some computer being the same is a minor issue.

A large part of security is focused not on the strength of the verification protocol, but instead on everything else. I'll talk about this in the context of password based systems.

Let's say you are trying to analyze your standard password based system. You might find that despite the encryption techniques, and password structure requirements that are put in place (upper and lower case characters, numbers, high length and so on), the security may actually be very bad if everyone gets out a Post-It note and writes their password on it and sticks it on their monitor. You might laugh at something like this, but it has happened.

Also the security system might include some kind of "super-key" which when used, allows the user to bypass the system and get access to the raw material, or reset passwords.

If the implementation for the security manager did not have something like this, then basically if someone forgot or lost their password, then if their data was encrypted with that password, you would never get it back if the encryption protocol was anything standard grade or above.

With that being said, there will always be people who have an interest in anything security related and that will always involve governments and large corporations, so at least for these two entities, the biometric security is probably on their radar, but having said that I wouldn't be surprised what kind of ideas and implementations of security products they have at their disposal.
 
  • #5
launch of new hand held biometric

recently we launched a new hand held biometric, which can register in time and out time through fingerprint and can transfer data across cellular network with the help of sim card.

such kind of http://mantratec.com/attendance-machine-BioTime1.html" are widely used by big companies where their project sites are situated in far remote locations.

in such areas internet and electricity are not available, so we can register in time and out time any where with battery enabled machine.

this machine is not meant for access control.
 
Last edited by a moderator:

What is biometrics?

Biometrics is the use of physical or behavioral characteristics, such as fingerprints, facial recognition, or iris scans, to identify and authenticate individuals for access to systems or devices.

How does biometrics work?

Biometric systems use sensors to capture an individual's unique physical or behavioral traits and convert them into a digital code, which is then compared to pre-registered templates to verify identity.

What are the benefits of using biometrics for IT access control?

Biometrics provide a higher level of security compared to traditional methods such as passwords or PINs, as they are nearly impossible to replicate or steal. They also eliminate the need for users to remember and manage multiple login credentials, making the access process more efficient.

What are the potential concerns surrounding biometrics?

One concern is the risk of biometric data being stolen or hacked, which could compromise an individual's identity. Additionally, there are privacy concerns about the collection and storage of biometric data, as well as the potential for bias in the technology's accuracy.

What are some common applications of biometrics for IT access control?

Biometrics are commonly used in smartphones, laptops, and other devices for user authentication. They are also used in high-security environments such as government facilities, airports, and financial institutions for access control and identity verification.

Similar threads

Replies
13
Views
1K
  • Computing and Technology
Replies
23
Views
2K
Replies
5
Views
2K
  • Computing and Technology
Replies
1
Views
1K
  • Computing and Technology
Replies
1
Views
1K
  • Computing and Technology
Replies
8
Views
390
Replies
4
Views
955
  • Computing and Technology
Replies
2
Views
2K
  • Computing and Technology
Replies
10
Views
2K
  • Computing and Technology
Replies
8
Views
2K
Back
Top