The uses and abuses of biometrics
B Schneier - Communications of the ACM, 1999 - go.gale.com
B Schneier
Communications of the ACM, 1999•go.gale.comDespite its potential for identification systems, biometric technology must be linked to a
database. Whether the technology involves fingerprint identification or voice recognition,
data must be on file in order to facilitate recognition and verification. Other types of biometric
applications include hand geometry, fingerprints, iris scans, DNA, typing patterns, and
signature geometry. The moral here is that biometrics work well only if the verifier can verify
two things: one, that the biometric came from the person at the time of verification, and two …
database. Whether the technology involves fingerprint identification or voice recognition,
data must be on file in order to facilitate recognition and verification. Other types of biometric
applications include hand geometry, fingerprints, iris scans, DNA, typing patterns, and
signature geometry. The moral here is that biometrics work well only if the verifier can verify
two things: one, that the biometric came from the person at the time of verification, and two …
Abstract
Despite its potential for identification systems, biometric technology must be linked to a database. Whether the technology involves fingerprint identification or voice recognition, data must be on file in order to facilitate recognition and verification. Other types of biometric applications include hand geometry, fingerprints, iris scans, DNA, typing patterns, and signature geometry. The moral here is that biometrics work well only if the verifier can verify two things: one, that the biometric came from the person at the time of verification, and two, that the biometric matches the master biometric on file. If the system can't do that, it can't work.
Gale