used in the following courses taught by Prof. Richardson
|Click on the
witiger "audio" icon below to hear Prof. Richardson's
audio introduction to this unit.
|A simple, but concise and
useful video made by student Arie L. in MRK619 at Seneca College on March
|focus on business applications||Essentially, we will be looking at the marketing consequences for people in business, e-commerce and international business who have to use this technology to identify relationships with people - people meaning employees, customers and suppliers. In order to operate securely in a world that has increasing security concerns post 9/11, it is more and more necessary for companies to use security technologies and secure processes since there are a number of circumstances that threaten the way a company can conduct its business.|
technologies discussed in this unit come under the heading of Encryption
And Authentication Tools because these technologies are applied to
allow organizations to keep information secret, send information secretly,
and to make sure only authorized people have access to places or information.
After reading this material, and listening to the lecture, students will be able to;
the range of technologies that biometrics encompasses
US Government organization concerned with automatically
recognizing a person using distinguishing traits.
"Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. "
|Why are biometrics
necessary, why can't we just carry a secure piece of plastic with our picture
and a hologram?
Biometric systems are superior because they provide a nontransferable means of identifying people not just cards or badges. The key point about an identification method that is "nontransferable" means it cannot be given or lent to another individual so nobody can get around the system - they personally have to go through the control point.
The fundamentals of biometrics
is that they are things about a person that are:
||The U.S. Government Dept. of Defense has an online tutorial that you can click through and provides an interesting and easy to understand introduction to the basic concepts of biometrics.|
|Components of Biometrics||Components
Under the heading of "components"
- which basically means information that is the same all the time, like your fingerprints
- means biometrics working on the principle that the person to be identified is close enough to make contact, or be measured close-up
|.||U of T student
Ruvani P in MGD415 in March 2008 found a YouTube clip which provides a
good overview of several of the biometrics technologies being talked about
in 2007 and 2008
|in March 2008
the YouTube link was
discusses fingerprints, facial
the clip is quite short
There are three different types of fingerprint capture technologies:
o Optical technology
Some Hand Geometry recognition
systems use ultrasound technology which allows penetration through gloves
or mitts to measure the bone size, shape and spacing in a hand.
A variation of this is the Fujitsu PalmSecure (palm vein recognition) and the Hitachi UB READER (finger vein recognition)
recognition can be done by telephone or cellphone (landline or wireless).
Facial recognition could be done from several metres away, or from video at an airport, border crossing or some other high risk access point
"Older voice recognition applications require each word to be separated by a distinct space. This allows the machine to determine where one word begins and the next stops. These kinds of voice recognition applications are still used to navigate the computer's system, and operate applications such as web browsers or spread sheets."
"Newer voice recognition applications allow a user to dictate text fluently into the computer. These new applications can recognize speech at up to 160 words per minute. Applications that allow continuous speech are generally designed to recognize text and format it, rather then controlling the computer system itself."
recognition and gait have their origins in intelligence applications in
the 1970's and 1980's but have been modified by IT companies in the 1990's
and early years of the millennium for a range of purposes.
"Biopassword is a product that provides user authentication by remembering the finger-typing pattern of a specific user. The user types in their password as they normally would and the system analyzes their typing pattern as a second level of authentication. The idea behind the technology dates back to Morse Code. During World War II, it was found that people on the receiving end of telegraph messages often knew who was sending the message simply based on the rhythm of their signals. Similarly, it was found that the manner in which specific people interact with a keyboard can be "captured" to form an identity. And it's that concept that drives keyboard-driven biometric devices such as Bio-password."
Adams wrote a story about how San Antonio city employees Credit Union has
deployed a password management product that remembers user keystroke patterns
for less user invasive authentication.
Digital Character Animation by George Maestri
authentication applications include workstation, network, and domain access,
single sign-on, application logon, data protection, remote access to resources,
transaction security and Web security."
Often, when biometrics is applied in situations requiring a high level of security, there is more than one feature that is authenticated and it is also often done in combination with other technologies such as smart cards, encryption keys and digital signatures.
that one of the 4Ps of marketing is "Place", which includes
the shipping function, it is important to recognize that anything that
can make shipping faster is a good thing in a competitive marketplace.
One of the things that makes shipping faster is allowing trucks to move
quickly without delays.
Problem - An easy to use, non-intrusive way of identifying transport truck drivers crossing the Canada-U.S. border
Solution - Allow truck drivers to pre-register their fingerprints and use this to quickly identify themselves at an accesspoint by reaching out the truck window and pressing a pad.
on the Canadian Border Services website
is interesting because it shows how such small things are starting to use
enhanced security features. These features have been used in many military
compounds but I think it will be a continuing trend for residential home
security systems. Biometrics will be used a lot more regularly as it becomes
cheaper and mass produced by companies. Also if the ease of use becomes
to a level that any average 'joe' can use the technology then that becomes
a large selling point. We are seeing many wearable computers created today
so it is a natural progression to be
what makes this story interesting is Sharon adds her own experience
with the fingerprint scanner
WTGR adds, thanks Sharon, your perspective is interesting because it illustrates that new technological applications are not always so simple when you try to do it with the general population, especially when you have to make allowances for having to explain certain procedures and ask people to follow instructions.
- you give a password to someone to access some web based content. They
pay for the access. You don't want them to pass on the password to other
people who can access the content for free by simply typing in the password.
What if there was a way of identifying a person not only by the actual
letters and numbers of a password they type, but also by the way they type
- when a person uses a password for the first time, the vendor records
the password, and way the strokes are typed on a keyboard. This pattern
is stored. When the customer logs in again, the password is matched to
the file rendering the way the letters were typed to see if it is the same
rhythm, and then authenticates the user.
CNET news.com carried a story about Musicrypt.com and Net Nanny Software.
These two companies are best known for Web filtering programs. ,The story said they are joining forces to create software that can identify individual music users. This information would be used to protect songs against unauthorized distribution and use.
John Borland, who wrote the article for CNET explains that the "companies want music labels or online retailers to insert the technology into downloaded music, so that only a person who buys a given song would be able to play it on a computer. Identifying the buyer by these keystroke patterns is far more secure than using passwords, which can be passed on to thousands of people..."
Can this work? Borland explained that "Analysts who follow the biometrics industry say the keystroke technology is less accurate than other technologies such as fingerprinting or retinal scans, but it makes up for that weakness in its relative ease of use."
"I was just reading your section on biometrics and found it quite interesting. By doing some further research I discovered an article relating the usage of biometrics to everyday smart phones. The more reliant people have become on their phones and apps, it makes for a definite possibility of security breach and theft in which case
biometrics can help negate the access of information to unauthorized personnel. More or less, this is the opinion of the article.
Several big firms have been working on this technology including BIO-key international, Oracle, CA, and IBM. On a side note I recently heard a rumour that the new Iphone 5 will utilize biometrics in the form of facial recognition which it thought would be pretty cool. Following is the link"
"Sir, Last night [2006 Nov 22] I watched a video on CNN about Fake ID's and homeland security. As you can see on the video link (below) cheaters are really professional and sometime it is really hard to recognize fake ID's. The only solution is using biometrics options to catch fake documents. I think this video is related to our last class subject; "Biometric"
Saman's video link pulled from CNN later
||CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE|
|MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I|