Thursday, 1 August 2013

The Biometric Transaction

Time alone is a part of each person's independence. Credulous someone means sharing some of that privacy with him/her. For sharing of private information to occur, there must be security and self-confidence in the relationship. Security and self-assurance can be gained over time as a result of shared experiences.
A biometric trait is a very private matter. It is something exclusive to a human being and has great value. A biometric idiosyncrasy, unlike an issued identifier like a social security number, cannot be misrepresented. This means that the use of the biometric trait should be treated with the utmost privacy. This privacy is supplied by securing the entire biometric deal.

Securing and Trusting a Biometric Transaction

The security and trust of a biometric business deal must begin at the arrangement of the live biometric trait and keep on through the final algorithm decision. This transaction path is made up of the following mechanism:
·         User
·         Biometric reader
·         corresponding location

Matching Location

Corresponding can be done in one of four location. The location where the templating occurs can be independent of where the matching takes place. The next sections will discuss where templating could take place for use with each of the following matching locations:
1.   Trusted device
2.   Local host
3.   Authentication server
4.   MOC (smart card)

It is clear from exploratory the biometric transaction that privacy can be truly guaranteed only when adequate security actions are taken. The security measures must be in place from the time when the user is ready to validate to the moment when the corresponding decision is made.
The threats to a biometric business are numerous and always present. Therefore, continuous observation is necessary to keep the verification and local hosts patched, and ensure that only the proper people are accessing the local host and verification server, even with the best security methods in place, there will still be some level of uncertainty in the transaction. That feeling of uncertainty will be directly proportional to the risk of the methods used during biometric communication. Hopefully, an increase of time, money, and effort will adequately reduce the number of people able to attack a biometric system.


No comments:

Post a Comment