Accessing a social network, your bank account or email should be easy with the help of a password that still contains numbers, letters and, in some cases, special characters such as dots and lines.
In cell phones it is increasingly common to unlock with a digital gesture or by scanning your face in front of the camera, which is known as biometric data. These help us to have a greater control over the security of our accesses but also represent dangers in internet.
The biometrics is a branch of science that is dedicated to the analysis of physical characteristics and behavior. Derived from the words metrica which in Greek means measurement or measurement and of bio, prefijo related to the words life and the living beings. Literally, biometrics means the measurement of the human body.
The living creature has many characteristics in its body and the human being has many particular characteristics such as “the fingers of the hand, the iris, the shape of your face or even the shape of the tongue”, reported the consumer magazine.
These features are used by smart devices with the aim of authenticating your identity, offering greater protection, preventing robots and misuse of your data.
Which devices use biometric data?
Smartphone: Unlock the phone with your fingerprint or your face, you can even enter some applications with this same function.
Airport: Helping to identify the persons traveling and thus preventing the boletos from being cloned in an attempt to supplant the identity of the person who made the trip.
Games/toys: Some allow you to create characters that resemble you and interact virtually with others.
Laptop: Desbloqueo with commands by voice, using fingers or your face. Same situation as with smart phones.
Payment system: Allows identification of the account holder, usually with a fingerprint, detection of facial features and some patterns of writing or pulses in the firm.
Chain of houses: Here you are allowed to open establishments or houses and generally occupy the huella dactilar. Exist in the market locks with identifiers of iris, voice and facial rasgos to provide greater security.
Security cameras: help to identify people in specific places and times, with the identification of facial features and the iris in the case of more specialized cameras. These are also used in some homes as a security measure or for vigilante activities while found outside the home.
Automobiles: Open the different parts of the vehicle, generally, with the detection of fingerprints, geometry of the hand, detection of facial tears and reach the iris in some cases
Advantages and Disadvantages
As far as technological aspects are concerned, not everything is rosy and although this type of access offers many advantages, there are also opposite situations.
The privacy and greater protection against identity robots is the greater benefit that offers using biometric data instead of a common password of characters. The convenience of not having to remember a password and that no one else has “this data” makes it a very strong system against frauds.
However, the same situation arises in predicting the use of data when, for some reason of weight, a third person is required to access the account. Although not having the fingertip, the same iris or the voice, all the power of entry is given to a single person, without which he can delegate to another as much trust as exists.
Let’s take a look: what data should be delivered to the mobile phone companies after the creation of the new model?
The same risk exists when companies tend to be hacked or have digital failures that do not have an immediate solution. The physical change that humans suffer also affects the moment of wanting to use the face as an access key, for obvious reasons.