Review: Biometrics Technologies Measure Up (Part 3/3)

Nov 21, 2005 feature

(Part 1, 2) Biometrics technologies have come a long way from a slow start in the early 80s. Now they can be found almost anywhere and soon, almost everywhere.

Pattern Recognition
Not commonly recognized among the biometric technologies but widely used and gaining in popularity is the technique of behavior recording. These systems are computer programs that monitor particular behaviors like typing and purchasing to identify users.

Credit card companies, for example, have records of your purchasing patterns. Any unusual purchases are flagged by a computer program and brought to the attention of a customer service representative who verifies the authenticity of the purchaser.

They way you type – frequency of keystrokes and their duration - has been proven to be a very effective way to identify unauthorized users on computer networks.

Internet sites you visit, programs and files you use and general work patterns can all be analyzed to prevent hackers from stealing sensitive information.

The big advantages to this approach include low cost, high effectiveness and unobtrusive operation – most users are completely unaware of the software’s operation.

Conclusion
The sharp increase in identity theft and the threat of terrorism combined with the falling prices of all biometric technologies, it’s predicted that the biometrics industry will explode as demand increases sharply in the next 3 to 5 years.

Already many systems are in use and technology is improving to eliminate false positives that may have deterred buyers in the past.

New inventions tend to cause backlash, but biometrics technologies, especially the clandestine ones, have provoked storms of protest from privacy groups and users. This may slow, but not stop rapid adoption. All experts agree more need to be done to address ethical and privacy concerns.

Like the adoption of any new technology, there are many problems that still remain to be fully overcome, but the idea of an ID-less society is not far off. The sheer convenience, low cost and security are very attractive to businesses, governments and users alike.

Who knows? One day you may be able to go about your business never having to present any form of artificial ID. Biometrics systems promise to make huge changes in the way we do business and identify ourselves. They also promise to invade our already beleaguered privacy and create a new breed of sophisticated criminals adept at hacking our biometric identities.

Part 1, 2

Copyright 2005 PhysOrg.com

Explore further: Project Jacquard to weave interactivity into textiles

Related Stories

Iris scanners can now identify us from 40 feet away

May 22, 2015

Biometric technologies are on the rise. By electronically recording data about individual's physical attributes such as fingerprints or iris patterns, security and law enforcement services can quickly identify ...

Halifax testing ECG wearable for identity authentication

Mar 15, 2015

We have to think a lot about creating, losing, restoring, renaming and managing our passwords. Users and vendors are interested in finding better ways to deliver protection that will not be difficult to use. ...

Recommended for you

Project Jacquard to weave interactivity into textiles

3 minutes ago

"Wearables" represents a broad-category of how we will interact with the digital world away from our laptop screens. It embraces arm bands, socks, bracelets, rings and watches. Google is now enhancing that ...

Silk Road website mastermind faces lengthy jail term

2 hours ago

The American convicted of masterminding criminal website Silk Road, which sold $200 million worth of drugs to customers all over the world using digital currency Bitcoin, will be jailed Friday.

Microsoft Research project can interpret, caption photos

4 hours ago

If you're surfing the web and you come across a photo of the Mariners' Felix Hernandez on the pitchers' mound at Safeco Field, chances are you'll quickly interpret that you are looking at a picture of a baseball ...

App data vulnerability threatens millions of users

5 hours ago

Researchers of the Technische Universität Darmstadt and Fraunhofer SIT have investigated Cloud databases and established: developers wrongly use authentications for cloud services thereby threatening millions ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.