a
a

SECTION 3: QUESTIONS 27-40

READING PASSAGE 3

BIOMETRICS

A The term “biometrics’ is derived from the Greek words bio (life) and metric (to measure). It refers to technologies for measuring and analysing a person’s physiological or behavioural characteristics, such as fingerprints, irises, voice patterns, facial patterns and hand measurements, for identification and verification purposes. One of the earliest known examples of biometrics in practice was a form of fingerprinting used in China in the 14th century. Chinese merchants stamped children’s palm prints and footprints on paper with ink to distinguish the young children from one another. This method of biometrics is still being practised today.

B Until the late 1800s, identification largely relied upon ‘photographic memory.’ In the 1890s, an anthropologist and police desk clerk in Paris named Alphonse Bertillon sought to fix the problem of identifying convicted criminals and turned biometrics into a distinct field of study. He developed a method of multiple body measurements which was named after him – Bertillonage. Bertillon based his system on the claim that measurement of adult bones does not change after the age of 20. He also introduced a cataloguing system, which enabled the filing and checking of records quite quickly. His system was used by police authorities throughout the world, until 1903, when two identical measurements were obtained for two different persons at Fort Leavenworth prison. The prison switched to fingerprinting the following day and the rest of the world soon followed, abandoning Bertillonage forever. After the failure of Bertillonage, the police started using fingerprinting, which was developed by Richard Edward Henry of Scotland Yard, essentially reverting to the same methods used by the Chinese for years.

C In the past three decades biometrics has moved from a single method (fingerprinting) to more than ten different methods. Hundreds of companies are involved with this development and continue to improve their methods as the technology available to them advances. As the industry grows, however, so does the public concern over privacy issues. Laws and regulations continue to be drafted and standards are beginning to be developed. While no other biometric has yet reached the wide range of use of fingerprinting, some are beginning to be used in both legal and business areas.

D Identification and verification have long been in practice by presenting a personal document, such as a licence, ID card or a passport. It may also require personal information such as passwords or PINs. For security reasons, often two, or all three, of these systems are combined but as times progress, we are in constant need for more secure and accurate measures. Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of-sale applications. In addition to security, the driving force behind biometric verification has been convenience. Already, many European countries are introducing a biometric passport which will carry a paper-thin computer chip to store the facial image and at least one additional biometric identifier. This will help to counter fraudulent efforts to obtain duplicate passports and will verify the identity of the holder against the document.

E Identification and verification are mainly used today in the fight against crime with the methods of fingerprint and DNA analysis. It is also used in security for granting access rights by voice pattern recognition. Additionally, it is used for personal comfort by identifying a person and changing personal settings accordingly, as in setting car seats by facial recognition. Starting in early 2000, the use of biometrics in schools has become widespread, particularly in the UK and USA. A number of justifications are given for such practices, including combatting truancy, and replacing library cards or meal cards with fingerprinting systems. Opponents of school biometrics have raised privacy concerns against the creation of databases that would progressively include the entire population.

F Biometric devices consist of a reader or scanning device, software that converts the gathered information into digital form, and a database that stores the biometric data for comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. There are two types of biometrics: behavioural and physical. Behavioural biometrics are generally used for verification while physical biometrics can be used for either identification or verification.

G Iris-pattern and retina-pattern authentication methods are already employed in some bank automatic teller machines. Voice waveform recognition, a method of verification that has been used for many years with tape recordings in telephone wiretaps, is now being used for access to proprietary databanks in research facilities. Facial-recognition technology has been used by law enforcement to pick out individuals in large crowds with considerable reliability. Hand geometry is being used in industry to provide physical access to buildings. Earlobe geometry has been used to disprove the identity of individuals who claim to be someone they are not (identity theft). Signature comparison is not as reliable, all by itself, as other biometric verification methods but offers an extra layer of verification when used in conjunction with one or more other methods. No matter what biometric methodology is used, the identification verification process remains the same. A record of a person’s unique characteristic is captured and kept in a database. Later on, when identification verification is required, a new record is captured and compared with the previous record in the database. If the data in the new record matches that in the database record, the person’s identity is confirmed.

H As technology advances, and time goes on, more and more private companies and public utilities will use biometrics for safe, accurate identification. However, these advances will raise many concerns throughout society, where many may not be educated on the methods. Some believe this technology can cause physical harm to an individual using it, or that instruments used are unsanitary. For example, there are concerns that retina scanners might not always be clean There are also concerns as to whether our personal information taken through biometric methods can be misused, tampered with, or sold, eg. by criminals stealing, rearranging or copying the biometric data Also, the data obtained using biometrics can be used in unauthorised ways without the individual’s consent. Much still remains to be seen in the effectiveness of biometric verification before we can identify it as the safest system for identification.

HELLO LessonIntroCloseModal