You are here: hacking technology > hacker invade > Content
Hot Articles
Recommend Articles
New Articles
The myth of biometric enhanced security - Part 2
  Add date: 09/29/2010   Publishing date: 09/29/2010   Hits: 40
Total 3 pages, Current page:1, Jump to page:
 
biometric standards k?can be obtained if common information is hidden. That is, in itself, creates a vulnerability in the entire system, and thereby to secure the system. Currently produced each party biometric scanners own encryption method. The primary?rdate are critical biometric data. Not to be exposed to or stored in?public space. As difficult as it may be the creation of a secure standard for encryption is probably not identical paths m?possible to create standards for encryption is not the same way. overcome obstacles is the coding raises and lowers the security that creates blind spots, because the template w?During the authentication can be used. Traceable biometric authentication systems extract features of biometric scanning and pattern that corresponds to a registered template. In theory, a system can not authenticate extra?They store data. The other side of the theory is right where the hackers are looking for. The Unm?opportunity ""Recognizethe extra?Them the M?opportunity to break the authentication. If a biometric authentication system has a blind spot that can be exploited and used to clone or steal ID. It also means that if the owner?Real ID, or try to use their ID as legitimate, k?You may find that you have been locked by the system, without understanding why. An electronic device that the elements of identity?t contains?lt is only one of many threats to traceability systems biometric authentication.
Expiry of the template is a gr??eres problem because when the information gets a hold of the F?ability to prevent illegal copies, and "Original falschder legitimacy is gone, if the template ge?has changed. Each of?change to the template to?Change is all associated?uncircumcised ID as a "Master Key "is lost. The only L?solution is the use?to distribute the keys of the change use the new key to all. K?can you imagine if this case were to occur with a driver's license?Now imagine times when combined with P?were done need. Unfathomable!At least with the keys, the F?ability?changes of the template or block is not ideal, but m?possible. This is not the case of biometrics as a biometric to the individual for life. Dear Entscheidungstr security?ger?how you sleep at night?People want to k?, Can a circle around your personalizedPersonal data to draw, and not their K?body parts stored in electronic databases. Our system of government tells us we are entitled to all that f within this circle?filled control;must regulate, how, who and why the information given within this circle. Some people object biometrics, for cultural or religious?these reasons. Others imagine a world in which the cameras to identify and prosecute those who walk?on the road?e, as a result of their activity?th and buying habits without their consent. You wonder if the companies sell, the biometric data of the parts of K?body, as it sells the e-mail addresses and phone numbers. People also ask if a huge database that is available somewhere, contains?lt important information about everyone in the world, and if this information w safe?re there.

 
Other pages: : 1 * 2 * 3 * Next>>
Prev:Do not fall prey to social networks spam Next:Protection of network security in an age of social networking

Comment:

Category: Home > hacker invade