Biometric Essay

1183 Words3 Pages

Background:
Biometric and encryption sounds are not too fresh, for most users, any of each technology alone is not enough to make you feel excitement. However, If we develop a new study or a new technology, which combine the biometrics and encryption. We can find that the technology combining these two techniques are very amazing.
It is easy to think of biometrics as the future science technology are always happened in some fictions, associated with solar car and clones together. In fact, it has long history that people understood the basic principle and application of the biometric. Thousands of years ago, the people of the Nile basin used the biometric in everyday transactions (such as scarring, skin tone, eye color, height, etc.) for identification. Of course, they had no any automatic electronic identification system, or computer network, but the principle is similar.
By the 19th century, the criminology research scholars have had a keen interest in biometric identification, they hope to combine physical characteristics with criminal tendencies, which resulting in a series of measuring devices, and also collected a large amount of data. Since then, the concept of measuring a person's physical characteristics are finalized, fingerprints also become the identification of international methodological standards for public security agencies. People often debate whether fingerprints have absolutely unique, and also thought that the different countries have the different standard for identifying fingerprints. So far, it is still the most widely methods of public security organs, and the process is also automated.
After entering the modern society, people living in a high information environment, a salient feature of it is that peopl...

... middle of paper ...

...nation without an idea way, it will lead the key to be the leader of the whole certification process, then the security system will be based on the key. Once the key is missing, the system will be collapsed. Based on the above analysis, while biometrics characteristics as an approximate random signal, people can consider to extract one key directly from such signals, instead of using the external inputs. In this way, we call it a key generation mechanism (key generation scheme).

Reference
Cavoukian, A., & Stoianov, A. (2007). Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy. Toronto: Information and Privacy Commissioner of Ontario.
Tomko, G. J., & Stoianov, A. (1998). Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques. N.p.: U.S. Patent.

More about Biometric Essay

Open Document