The security situation is continuously undergoing profound and complicated changes all over the world. Traditional and non-traditional security threats remain serious challenges to security at all levels. In is in the wake of growing security concerns and fear of terrorism that biometric technology is emerging fast as a security beef up.
The word biometric - combination of two Latin words bio and metric - means life measurement. Biometric is a measurement of physical and morphological characteristics or behavioral traits, some time called biometric identifiers, of human beings for identification and authentication through comparison. Typical biometric identification methods include fingerprint, voice, iris, retina, hand, facial measurements and comparing them with the records already held. Handwriting and signature are not physical traits but are also being measured and compared using biometric techniques.
How biometric technology works? Any of the biometric identifiers of a person is measured. The sensing device checks all possible dimensions like length, width, thickness, and surface area of the identifier. Resultant unique characteristics are processed and stored on computers as a sample. A mathematical representation of the identifier is retrieved when the user’s identification is required and verified by comparison with the pre held records. In addition, the sensor updates the configurations every time identifiers of the same person are read. The results are automatically processed to cater for different changes over time. Database of biometric identifiers may be stored at a central location, or at place where it is to be used, or on electronic devices.
Most of the world is still using more traditional security means (passwords, pins and keys). While these basic methods have been working fine, they are not ideal for all situations. Biometrics, on the other hand, is convenient and reliable security for everyone.
Biometric in desktop computing has been around for some fifteen years now but it still is a relatively newer concept for the general users to grasp. The fingerprint scanning - a century old technology - is currently the leading biometrics computer usage supporting keyboard, mouse and touch screen monitors.
Fingerprint biometrics is the frontrunner in the biometrics arena and it continues to be adopted into new markets and applications at a rapid pace.
The second best widely used biometric technology in computing is hand geometry. “Millions of hand geometry units are being used in identification application throughout the world reading users’ hands each day.” More advanced and sophisticated gimmicks are on the horizon. Other industry standard biometric security hardware and software that enable biometric logon to isolated computers and networks systems are facial recognition devices and iris scanners.
Biometric identification and authentication systems make it easy for network administrators and individual users to access their systems through more secure and reliable methods. It also helps integrate and control various systems - computers, networks, LANs, WANs, and telephone systems - at multiple locations.
The age of new security measures is upon us and it is not very far when biometric inspired solutions, PCs and a whole new breed of tools may be found on sale in Pakistan market at an affordable price.
“Not yet,” Khalid Irfan, Pakistani studying computer science in the United States says, “Market scouting reveals that even in America it will take another decade before the use of biometric ware will be common at grass root level. It may be employed in other security sensitive areas sooner though.”
Sheikh Kamran Aziz, a local software developer, thinks, “Though the security awareness is picking up but local concerns are not ready to embrace biometrics yet. One reason is that return on IT investments has yet not made a strong case here.”
Beyond desktop computing, which remains the take off point for any computer related product, biometrics applications are in use at many places from airports checkpoints and counters to identify unauthorized persons to time offices to cut the administrative costs associated with managing the time offices overseas.
Biometrics is being effectively integrated into a wide range of common access control systems, such as home or office door locks, time and attendance systems and office buildings and at the airports and other entry points. Growing usage is already leading to rapid market expansion and adoption in recent years.
In present times, “Wall Street firm first used the finger print scanner to open its vaults in 1968. Biometric locks already guard the offices of US Vice President,” says a report. But what is getting harder and controversial is the use of biometrics identifiers in passports and visas. This decision to use biometrics identifiers in passports has more civil, political and diplomatic repercussions than just technological or industrial.
Still, biometric is a multi billion dollars industry today. Many industry giants are working to capture focused niches in the world market; spending a lot of money or products, software and services.
No wonders, given the threat perceptions of prevalent security situation in the world, reliable degree of accuracy and convenience combined together in biometric technology, there is a matching demand driven market for biometric solutions in public as well private sectors the world over.
In the past few years, biometric technologies have pushed through obstructions that had slowed their adoption in mainstream computing. Performance and sophistication have increased among all types of biometrics methods and prices have plunged making biometrics an attractive addition to security systems in the digital world.
The remaining challenges for biometrics are to address the requirements for large-scale commercial adoption and overcoming non-technical controversies in its employment.
The convergence of biometric technology with conventional computing is increasingly regarded as the next frontier for computer sciences, with potentially endless possibilities.
We are poised to see any other shift in digital lifestyle in about decade time. May be the users in our country will also self carry their own biometric identifications by then?
