An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Personal Authentication Through Biometric Technologies
Published
Author(s)
Fernando L. Podio
Abstract
¿¿¿Biometric authentication technologies such as face, finger, hand, iris, and speaker recognition are commercially available today and are already in use. Recent advances in reliability and performance and recent cost drops make these technologies attractive solutions for access to many computers and networks, for the protection of digital content and for secure access to resources such as network appliances and personal network environments. Access control to doors and other enclosures done through a video camera and a face recognition system, access to a security or gun vault after an iris check or access to a computer granted by checking a fingerprint may soon be a reality. Will biometrics play a key role in personal authentication in the home? Do intelligent network appliances need strong personal authentication? That will depend on the value of the asset that is being protected, the consequence of malicious access to the data (e.g., impact of an unauthorized electronic financial transaction), or access to devices by unauthorized individuals. Examples of this need include restricted access to specific TV channels, cable set-top box access, access control to drug cabinets and logical access control to devices that would allow an individual to access financial data, medical records, and other private data. Strong security is encouraged, especially when home appliances can be remotely controlled. Unlike passwords, Personal Identification Numbers or smart cards, biometric characteristics cannot be shared, lost or stolen. How far we are from these scenarios in the world of network appliances? Are biometrics standards in place that would allow for easy biometric data interchange among devices and for interoperability of biometric-based network appliances from different providers? These topics, utilization scenarios in the home and an introduction to the state-of-the art will be discussed.
Proceedings Title
Proceedings of the 4TH IEEE International Workshop on Network Appliances
Volume
2002
Issue
4th
Conference Dates
January 1, 2002
Conference Title
IEEE International Workshop on Networked Appliances
Pub Type
Conferences
Keywords
authentication, biometrics, network access, network appliances, personal network environments, standards
Citation
Podio, F.
(2002),
Personal Authentication Through Biometric Technologies, Proceedings of the 4TH IEEE International Workshop on Network Appliances
(Accessed December 14, 2024)