Biometric Authentication

Improved Essays
For years, biometric authentication has been seen in movies and television shows as a purely fictional piece of technology. However, in the past two decades, biometric authentication has become so common is it everywhere from phones, to computers, and even national digital based identification systems. There are still concerns about the privacy that this type of identification may lack. There are three major categories of authentication: what you know, what you have, and what you are. (See Figure 1). What you are is the category that biometric authentication falls into because it measures authentication through mainly physiological means; the most common being finger print and iris scans. Biometrics are favored because they are less likely to change; finger prints don’t change over time and neither do irises. For mobile phones, a simple four number password is easy to hack and even guess, creating very little privacy. Even with more complicated passwords, there is still the strong chance personal information, such as credit card …show more content…
In the recently released iPhone X, Apple has released a new Facial Recognition component to the smartphone. What is called Facial ID, can be used for everything that the Touch ID was used for because is supposed to be more secure. Apple has stated their design is extremely efficient at recognizing and remembering a face. It is supposed to be able to recognize the same person with different clothes on, a different hairstyle, and different lighting. They also tackled one of the biggest concerns when it comes to facial recognition: it will be able to tell the different between the correct face and someone who looks similar or even a photograph. So far the facial recognition software is only available in the iPhone X, but if what Apple claims is true, facial recognition will most likely become as common as the Touch ID in the next few

Related Documents

  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    James Earl Ray Case Study

    • 589 Words
    • 3 Pages

    Actually, the evidence found did point to James Earl Ray as the perpetrator of the crime and no other evidence other than claims of a conspiracy were found at the scene. However, there were some weaknesses in the prosecution’s case, the two witnesses at the rooming house could not identify the man they saw running from the bathroom after the shot. Nor could they match the gun to the mangled bullet that killed Doctor Martin Luther King (Polk, 2008). A confession of this crime helped the prosecutors put James Earl Ray behind bars and kept him there until his death. Nevertheless, I believe a good prosecutor could win this case.…

    • 589 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Unit 4 Forensics Question # 2: Briefly describe how the Automated Fingerprint Identification System (AFIS) creates a fingerprint image. What characteristics of the fingerprint does the AFIS record for comparison? With the advances of computer technology in U.S. Police agencies during the 20th century, it was only natural that what was once a labor intensive and cumbersome system, such as the filing and storage of individual fingerprint records, would become simplified by the implementation of modern computer technology. As such, the Automated Fingerprint Identification System (AFIS) was implemented, officially being adopted by the Federal Bureau of Investigation (FBI) in 1999 and made available to local, state, and federal agencies…

    • 474 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    We can determine biometrics through many different features such as your eyes. Your eyes can be used by being scanned and identified. They have two kinds of eye scans out, they are retinal scans and an iris scan. A retinal scan is when the blood vessels in the back of your eye is measured. A iris scan is when they scan the color of your eye itself.…

    • 475 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Unlike many other biometrics, face recognition is a Passive process that doesn't need the user's cooperation; this characteristic makes the face recognition very valuable for the surveillance and crimes solution purposes. But there are some drawbacks with face first: the face features are not permanent, it changes over age. Second: It is not accurate for Identical twins.…

    • 294 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Technology has changed a lot over the years, but has it changed for the better? Many people think it has not. All over the world, people are on their cellular devices. Little do they know that the government can see everything they do and search on their phone. Therefore, I propose a 28th Amendment to the United States Constitution stating that Technology privacy will now be issued among everyone and the government will no longer have access to anyone's history.…

    • 433 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Blown To Bits Analysis

    • 346 Words
    • 2 Pages

    Blown to Bits Chapter 2 showed us how private the digital world is. Headline spoke upon different types about privacy around the globe. The main topic was Radio Frequency Identification Tags (RFID). The topic entirely went into detail about how it knows almost everything about a person or company. This Chapter reveled benefits, effects of technology being in our private lives and the change it has had on our society as a whole.…

    • 346 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    The following quote explains a reason why guest are upset about this change, “Customers were not provided with information on how long the fingerprint information would be retained, nor whether the information collected would be used for other purposes other than the control of admission to the theme park.” This piece of information is important because, it gives one a better understanding about the guest not being fully aware of what is happening. Some of the frequently asked questions about theme parks using fingerprints are, are passes collected, retained or stored by the theme park or others and who will have access to fingerprint scan information? Another reason this freedom should not be…

    • 1056 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The government can be very controlling over its citizens. For example, in the novel 1984, Orwell the author invites the reader into a life where Big Brother is the main source of being overpowering over the people. Citizens are constantly being tracked by the government one way or another and in this case it’s through smartphones and cameras. The government shouldn’t be allowed the ability to be in the presence of someone’s privacy at all times.…

    • 1133 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Utilitarian Ethical Theory

    • 1000 Words
    • 4 Pages

    Also, based on the number of the drawback of Face Recognition technology in the iPhone X, it is a fact to say that this technology is not ethically right as per rule utilitarianism, a type of utilitarian…

    • 1000 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    In creating these programs, the NIJ uses a comprehensive process to make valid technology programs for the criminal justice system. This process uses the research, development, testing, and evaluation approach to “ensure that the NIJ’s research portfolios are aligned to the best technology needs of the criminal justice community,” (Justice, 2009). For example, the NIJ formed a working group to study some of the disadvantages of the praised specialized database, the AFIS. The Automated Fingerprint Identification System (AFIS) is a specialized database that is designed to match known and unknown fingerprints with intentions on connecting a suspect to a pending crime or to an unsolved crime. The Integrated AFIS has a hierarchical structure that is perpetuated throughout the United States.…

    • 992 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Data Mining Essay

    • 798 Words
    • 4 Pages

    The topic that I am interested in is Data Mining. This is interesting to me because it can help in various areas of society. This includes the medical field, elderly care, and commerce. This is controversial because of the amount and type of personal data that is being collected. We are living in the “Big Data” era where there are many ways to collect data.…

    • 798 Words
    • 4 Pages
    Improved Essays