Biometrics

toc



=Introduction=

So far present methods of identification primarily focus on the “what you have” and “what you know.” Consider this example, if I wanted to access my savings account from an ATM machine I would need to provide my bank card (what I have) and my pin number (what I know). In today’s constantly technologically involving environment advances have been made in the physiological realm of identification. So instead of just focusing on “what I have” and “what I know” we are progressing to “who I am.” **Biometrics uses** physiological traits such as your fingerprint, the blood vessels in the iris of your eye, and even the sound of your voice to further identify you. This is the ultimate method of identification since they are personal characteristics which cannot be copied or reproduced.

The following are categories from which people can be measured:
 * Fingerprints
 * Handprints
 * Iris Scan
 * Facial Recognition
 * Key Strokes Recognition
 * Walking Recognition
 * Voice Recognition

The biggest investors into biometric technology are those who concern themselves with sensitive information. In particular banks are embracing biometrics as a method of deterring fraud. It is estimated that bank and credit card fraud are in the hundreds of millions. By implementing an iris scan before withdrawal of funds would deter criminals and help reduce the enormous losses the banks and credit card companies face.

=Biometrics & Transaction Processing=

Once society comes to terms with biometrics for the purpose of security and identification, organizations of all types will be able to add another dimension of business intelligence – the capturing, processing, and storage of transactions in physiological context. The best way to understanding anything is by example, consider the following user story

//Example 1(a)// A woman uses an ATM machine to withdraw cash. This is no ordinary ATM machine, it is also equipped with iris scan capabilities. In the process of her interaction the ATM machine reveals the woman is pregnant ( research suggests it is possible to determine if a woman is pregnant from an iris scan - I know it sounds far fetched). Keeping this in mind, the ATM machine tells the woman on her printed receipt she will be having a girl and also prints out discount coupons for //Walmart -// whom RBC has considerable shares in.

The key point derived from the above example is that transaction processing system of the future will be integrated into biometrics. The ATM will function as normal, documenting the details of the transaction – when, by whom, where, and so forth. However, the biometrics processing system will capture and process the physiological characteristics of that person. Specifically, these details will and may include weight gain (from previous transaction), low blood sugar (notable changes?), presence of drugs (alert authorities?), alcohol level (advise no driving), hair loss (Rogaine), and even pregnancy (coupons). While biometrics makes it much easier and more convenient in terms of security it also allows us to be identified in ways never done before. When businesses begin to process and store this type of information, the possibilities of what you can do is almost surreal and most often unethical.

//Example 1(b)// The woman in the first example was recognized by the ATM machine and appropriate discount vouchers were printed. In addition the bank may offer financing for a minivan, evaluate the size of the family’s home and perhaps offer a special financing for a second mortgage so another room can be added, or establish a tuition account for the child – the possibilities seem endless. This realm of proactive identifications of possible needs and wants moves us ahead from the tradition pull economy to push.

=Biometrics encroaching on Campus=

[[image:af6a900039f8b628b06db3ca576a67b5.jpg]]+ [[image:students.jpg width="308" height="188"]]=?
The use of hand palm readers has existed for some time now, but for the most part has only existed in industries dealing with sensitive information. However thanks to CBORD and Ingersoll Rand Security Technologies biometric technology has now made it onto campus. CBORD supplies colleges and universities with "campus ID card privilege control, electronic security, meal plans, housing services, online ordering, foodservice, catering, nutrition services, and other institution-wide activities." Rand Security Technologies however provides industries with their state of the art Handkey II reader. The two companies have come together to integrate software with technology to bring biometrics to the campus. Students at Keene State University have had the hand readers for some time now which work in conjunction with their university identification cards. This has relative new technology has set the standard of what likely will be a regular means of identification. Problems are very prevalent among campuses, were students number in the thousands, and access and control technology is crucial in letting students access buildings, rooms, and work stations. By focusing on "who you are" the Handkey II makes it very convenient for student life. Consider this scenario:

//George has misplaced his wallet, and is running late for his exam. While searching for his room in an unfamiliar building he finally discovers it. To his dismay the exam has started and the door has closed, the RFID reader requires his student card to open the door. Lucky for him, this door is equipped with the HandKey II. George simply places his hand on the pad, the machine his hand geometry to what is stored in the database, his access to this room is granted and the door opens//.

Biometrics is efficient, simple, and most importantly accurate. It has the ability to eliminate the need for us to carry identification and memorizing memorize tedious information. In addition, it is a great way of adding convenience and simplicity to an increasingly demanding lifestyle. So why wouldn't we embrace this technology?

=Biometrics in Everyday Life=

Biometric technology has been experimented with and studied for many years now. In light of all of the new discoveries and advances in this particular technology, more and more people are starting to recognize its potential, and gaining confidence and acceptance in applying it to every day use. These days, a variety of business in range of different industries are starting to incorporate this technology into their very own interactive systems and personal technologies. Laptops are being re-designed to have a finger identification instrument installed in order to accurately identity the proper owner and user. If the wrong finger is read than the computer will refuse the user access and hence render itself useless to the imitator. Companies like Compaq, Toshiba, Sony, and many others already have laptops in the market that come equipped with this feature([|Click here to see example]. The identical technology is being used in some cars to successfully start the ignition, forget about keyless entry say hello to keyless ignition. How it works is simple, to successfully start the car a fingerprint of a scan must be taken to authenticate the driver. Audi, Cadillac, Volkswagon, and BMW have already taken the steps in designing for this technology([|Click here for reference]. These are merely a few of the vast array of technologies that are making use of this technological breakthrough.

= = = = = = = = = = = = = = = = =Sacrificing privacy for convenience=

We live in a world which is increasingly becoming more complex and demanding. Everyone is consumed within themselves; people must do certain things, all in the name of living or pursuing a lifestyle we desire. Technology has made our life less hectic and more convenient. However, how far can we go before we begin sacrificing too much of our privacy for convenience? As technology increases, privacy decrease, there is a negative correlation. This relationship is due to the inherent capabilities of technology and the ability it offers as means of surveillance, tracking, recording, and storing of our personal information. Already most of our purchases are being monitored by companies, every time you use your rewards card your purchases are recorded. When you surf the internet, your ISP records every website you visit and what you downloaded. Even when you enter into sweep stakes or prize draws, your information is recorded. In fact, at any point where you fill out any personal information, it is stored. Although these factors may seem small and insignificant, it does add up especially when you consider biometrics. Furthermore, who's to stop or regulate how this captured information is used?

Consider a society which becomes fully integrated into physiological interfaces. Video cameras have the ability to differentiate every individual on the basis of their face, posture, walk, and body characteristics. Normal daily transactions no longer require tangible ID; all that is required is you. People’s most identifiable characteristics become stored into industry wide databases, all for the purpose of identifying you, marketing products towards you, and making life more “convenient.” Money as we know will no longer exist. By identifying you in a database, banks can link yourself to digital cash or credit, purchases would simply be handled by your iris, palm, or finger and funds deducted electronically. Keep in mind companies are capturing, storing, and using this information to their advantage. For the most part, organizations will use this information to better serve you, but that can not be guaranteed. Biometrics opens the “can of worms” so to speak, into an eerily not too distant future of ultimate convenience and George Orwell’s //[|1984.]//

=Biometrics in regards to Usability Goals=

In respect to Usability Goals Biometrics makes it much easier for any product or service to be more efficient, effective, secure, and functional. By incorporating biometrics into a product you can eliminate the need of "what you have" and "need to know" which a much simpler "who you are," therefore increasing efficiency of product. Effectiveness is ultimately up to the product/service details, but biometrics can make anything more effective in regards to accuracy. The nuisance of fraud, miscommunication, and other ill factors will virtually be eliminated by biometrics authenticity. Lastly, the functionality of regular items such as the mentioned ATM machine will go far beyond simply extracting cash - it now has the ability to understand that customer and proactively identify user needs and wants. However, despite these glorious benefits the "ethical" component of usability is of great concern. Biometrics has the ability to distinguish between anyone on preferences which are indisputable, if that information is gathered, stored, and used against the well being of consumers it will prove more than problematic, but a complete change in how society operates - maybe for the good or the worst. It appears Biometrics is a technology serving as a double edge sword, one side offers convenience/security and the other concerns of ethics/security.

=References=

"Biometrics." __Wikipedia__. July 2006. 18 Nov. 2006 

"Multi-biometrics," http://www.morpho.com/multi_biometrics/Animations/Front_Image_animate_MB64.gif" "Handkey II," http://www.chronos.eu/photos/af6a900039f8b628b06db3ca576a67b5.jpg "Ohio Student, http://www.ohio.edu/graduate/international/images/students.jpg
 * Images Sources:**