Biometrics

Submitted by: Submitted by

Views: 314

Words: 1934

Pages: 8

Category: Business and Industry

Date Submitted: 05/16/2011 09:13 PM

Report This Essay

Biometrics

125 years ago, winter 1879, Paris First agency police prefecture clerk Alphonse Bertillion was sitting in dark cold corner of huge file-cabinet room, where there were stored files on all Parisian criminals. A.Bertillion was entering the criminals’ description. He found out that there is no classification system, since: a) Criminals could easily change their names, and attempts to try different systems (by age, criminal method) end up in failure. Bertillion, son of Lui Bertillion – president of the Anthropological society, came up with an idea to utilize anthropological parameters (height, length and volume of the head, length of the hands, fingers, etc.) to identify personality. This was a break-through in criminalistics.

With the development of electronics, Bertillioon’s theory was recalled and scientists realized that human beings have numerous unique characteristics beginning from the iris of the eye to the fingerprints and all these characteristics can be used in personality identification. With the rapid development of computer technologies, the concept of information security is becoming more and more important. Crime scene investigators have been using behavioral and physical characteristics for centuries in order to identify the criminals, nowadays; we have a great need for identification and authorization in information security.

Information Security is being understood as a protection of the information and informational infrastructure from the impacts, which could potentially end up in damage, loss of the information or informational infrastructure.

Information Security deals with the provision of information confidentiality, information integrity and availability. It’s obvious that the weakest place in provision of information security is the correct arrangement of the access rights to the information. Current methods of authentication have a number of disadvantages: password can be easily lost or given to different...