Time alone is a part of each person's independence.
Credulous someone means sharing some of that privacy with him/her. For sharing
of private information to occur, there must be security and self-confidence in
the relationship. Security and self-assurance can be gained over time as a
result of shared experiences.
A biometric trait is a very private matter. It is
something exclusive to a human being and has great value. A biometric idiosyncrasy, unlike an issued
identifier like a social security number, cannot be misrepresented. This means
that the use of the biometric trait should be treated with the
utmost privacy. This privacy is supplied by securing the entire biometric deal.
Securing and Trusting a Biometric Transaction
The security and trust of a biometric business deal must begin at the arrangement
of the live biometric trait and keep on through the final
algorithm decision. This transaction path is made up of the following mechanism:
·
User
·
Biometric reader
·
corresponding
location
Matching Location
Corresponding can be done in one of four location.
The location where the templating occurs can be independent of where the
matching takes place. The next sections will discuss where templating could
take place for use with each of the following matching locations:
1.
Trusted
device
2.
Local
host
3.
Authentication
server
4.
MOC
(smart card)
It is clear from exploratory the biometric transaction that privacy can be truly
guaranteed only when adequate security actions are taken. The security measures
must be in place from the time when the user is ready to validate to the moment
when the corresponding decision is made.
The threats to a biometric business are numerous and always
present. Therefore, continuous observation is necessary to keep the verification
and local hosts patched, and ensure that only the proper people are accessing
the local host and verification server, even with the best security methods in
place, there will still be some level of uncertainty in the transaction. That
feeling of uncertainty will be directly proportional to the risk of the methods
used during biometric communication. Hopefully, an increase
of time, money, and effort will adequately reduce the number of people able to
attack a biometric system.
No comments:
Post a Comment