biometrics
Nancy Palmquist
nlp at vss3.com
Mon Jun 7 09:17:13 PDT 2004
GCC Consulting wrote:
>
> As I stated earlier, no security system is fool-proof. All you can do is take
> reasonable precautions to protect what ever it is you want to protect.
>
> You can have the most ingenious locking system, steel reinforced doors,
> monitoring equipment, etc, but if the walls are thin or made from wallboard,
> avoid the problem and go through the wall.
>
> About 30 years ago in NY's Chinatown area a jewelry store on the second floor
> of a building had it's safe stolen at noon time on a work day. The thieves got
> someone in, they had a "cherry picker" parked below the store's window. They
> placed a cable around the 1 ton safe, pulled it across the floor and thru the
> wall. It crashed to the ground, using a small winch to get it on to a flat bed
> truck and drove off. People stood in the street watching the robbery
> transfixed.
>
> Even people working in "secure" areas can be lax in their security procedures.
> As I said, I ran base security checks while in the army and on quite a few
> occasions got passed armed security guards and alarm systems :). As a sgt I got
> dressed down more then once by officers in charge of the areas (:. What I had
> going of course, were orders from higher ranking officers.
>
> IBM on a number of their ThinkPad models have placed a fingerprint scanner to
> control access to the laptop.
>
> I am writing a system for an account where there is a requirement for password
> authentication for using many of the modules. Conceivably it may be easier to
> use a fingerprint scanner then have each person constantly type their login and
> password as currently required. Now, will the cost be worth it to my client,
> that is the question.
Might be worth it if they need that, but the application displays the
matching person. A database is loaded with id info, possibly a picture
and then matched with the biometric. You would have to check if the
call's could be used to return a valid/invalid or an identification code
that you could use to validate the access.
How can we tell you if that is "worth it"? Value is determined by need.
Nancy
>
> Richard Kreiss
> GCC Consulting
>
> _______________________________________________
> Filepro-list mailing list
> Filepro-list at lists.celestial.com
> http://mailman.celestial.com/mailman/listinfo/filepro-list
--
Nancy Palmquist
Virtual Software Systems
PHONE: (412) 835-9417 Web site: http://www.vss3.com
More information about the Filepro-list
mailing list