Biometric technology is booming. Electronic records with attributes such as fingerprints or iris patterns allow you to quickly and accurately identify a person. Recent advances in this area allow you to scan the iris from a distance of 12 meters. Researchers at Carnegie Mellon University in the United States have demonstrated the ability to use their technology to recognize drivers through the side mirrors of a car.
Researchers hope that developed by themtechnology will help in resolving security issues. Biometric identification systems allow people to abandon the use of electronic keys or long passwords.
However, the new technology has a number of seriousproblems associated with the collection, processing and storage of sensitive personal data. According to the Daily Mail study, despite the convenience of identifying long-range, people are not yet ready to accept this innovation, preferring physical interaction with a biometric device.
Another obstacle is that adaptation toCCTV and security technologies are slow because they integrate gradually into the daily life of society. The hasty introduction of technology into life can lead to the fact that there will be much more of the amount that society is ready to accept.
For example, the implementation of biometric technologies insmartphones and other everyday devices, such as computers or cars, will allow people to see how useful and easy they are to use. The user gets used to technology and ceases to be afraid of them.
After this person can be introduced to moreinvasive technologies, such as a distance identification system. The technology can be widely used in large shopping centers and government offices. However, first it is necessary to ensure the protection of personal data and confidential information.
The fact that long-range iris scanners can independently read information, sometimes even without the knowledge of its owner, raises legal issues.
A person should be informed where, when, by whom, and for what purpose sensitive information was collected. Another issue is ensuring the security of the storage of such data.
In addition, researchers have yet to improve the accuracy and accuracy of the process of remote identification. Unfortunately, the technology is not perfect and it can still be tricked.