biometrics

Nancy Palmquist nlp at vss3.com
Mon Jun 7 09:17:13 PDT 2004


GCC Consulting wrote:
> 
> As I stated earlier, no security system is fool-proof.  All you can do is take
> reasonable precautions to protect what ever it is you want to protect.
> 
> You can have the most ingenious locking system, steel reinforced doors,
> monitoring equipment, etc, but if the walls are thin or made from wallboard,
> avoid the problem and go through the wall.
> 
> About 30 years ago in NY's  Chinatown area a jewelry store on the second floor
> of a building had it's safe stolen at noon time on a work day.  The thieves got
> someone in, they had a "cherry picker" parked below the store's window.  They
> placed a cable around the 1 ton safe, pulled it across the floor and thru the
> wall.  It crashed to the ground, using a small winch to get it on to a flat bed
> truck and drove off.  People stood in the street watching the robbery
> transfixed.
> 
> Even people working in "secure" areas can be lax in their security procedures.
> As I said, I ran base security checks while in the army and on quite a few
> occasions got passed armed security guards and alarm systems :). As a sgt I got
> dressed down more then once by officers in charge of the areas (:.  What I had
> going of course, were orders from higher ranking officers.
> 
> IBM on a number of their ThinkPad models have placed a fingerprint scanner to
> control access to the laptop.
> 
> I am writing a system for an account where there is a requirement for password
> authentication for using many of the modules.  Conceivably it may be easier to
> use a fingerprint scanner then have each person constantly type their login and
> password as currently required.  Now, will the cost be worth it to my client,
> that is the question.

Might be worth it if they need that, but the application displays the
matching person.  A database is loaded with id info, possibly a picture
and then matched with the biometric.  You would have to check if the
call's could be used to return a valid/invalid or an identification code
that you could use to validate the access.

How can we tell you if that is "worth it"?  Value is determined by need.

Nancy


> 
> Richard Kreiss
> GCC Consulting
> 
> _______________________________________________
> Filepro-list mailing list
> Filepro-list at lists.celestial.com
> http://mailman.celestial.com/mailman/listinfo/filepro-list


-- 
Nancy Palmquist 
Virtual Software Systems
PHONE: (412) 835-9417			Web site:  http://www.vss3.com



More information about the Filepro-list mailing list