BIOMETRICS WHEN TRAVELING

Airports are using biometric technologies, such as iris (eye) scanning, to improve travel safety. Two of the first airports to begin scanning passengers' irises as part of an effort to streamline boarding and security processes were Charlotte Douglas International Airport (CLT) in North Carolina and Frankfurt Airport (FRA) in Germany in the year 2000. For more information, go to http://archives.cnn.com/2000/TECH/computing/07/19/iris.scan.idg/
index.html
.

BIOMETRICS AT WORK

Corporations are always faced with security issues such as employee identity theft, equipment theft, vandalism, and improper registering of hours worked. Additionally, they incur significant costs replacing lost or stolen building keys or access cards (badges) and correcting time and attendance issues. By implementing biometric systems, employers can develop an employee identification database to control access to particular locations and equipment based on specific clearance levels, prevent fraudulent time and attendance entries, and protect their assets from theft.

Biometric systems have advantages for employees as well. For instance, employees no longer have the need for access badges, keys, or parking passes. Additionally, their identity cannot be stolen and used by someone else.

Normally this technology is stored in a database as a mathematical template of a fingerprint and is perfectly secure. However, there are advanced systems that allow employees to retain control of their template. Instead of having the template stored in a company database, it is stored on a smart card's chip. When employees want to gain access to a facility, they present/use their smart card in addition to their fingerprint. The reader matches the fingerprint to the template stored on the card. This is a very secure system because even if a card is stolen, no one can gain access to a facility using it since his or her fingerprint will not match the template stored on the chip. Additionally, no one can modify the template because the information stored on the card is encrypted.

 

Want to download this topic in its entirety? Click here to download a PDF version.

You must have Adobe® Reader® to view PDF files.

Get Adobe Reader

last page | next page

 

Contact Us | Home | Legal | Site Map
© 2004–2015 Security & Risk Management Group, LLC