首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Many system can be deliberately fooled. A new study from Yokohama National University in Japan shows that phony fingers concocte
Many system can be deliberately fooled. A new study from Yokohama National University in Japan shows that phony fingers concocte
admin
2010-07-19
86
问题
Many system can be deliberately fooled. A new study from Yokohama National University in Japan shows that phony fingers concocted from gelatin, called "gummy dummies", easily trick fingerprint systems. Manufacturer of some systems claim to guard against such tactics by recording pupil dilation, blood flow in fingers, and other evidence that the biometric sample is "live". And although some makers assert that biometrics solves the problem of identity theft, no one can steal your iris(虹膜) or hands, after all many experts disagree. A hacker who broke into a poorly designed system might be able to steal other people’s digital biometric templates and use them to access secure networks. This trick, called "replay", could take identity theft to a whole new level. "Your fingerprint is uniquely yours, forever. If it’s compromised, you can’t get a new one", says Jackie Fenn, a technology analyst at the Gartner Group.
Privacy concerns—although they seem less pressing to many these days—may also slow public acceptance of the technology. Yet in some cases, biometrics can actually enhance privacy. A finger-scan system for controlling access to medical records, for example, would also collect an audit trail of people who viewed the data. But face scanning, with its potential for identifying people without their knowledge, has alarmed privacy advocates.
Last month, for example, Visionics Corp’s face-scanning system was redeployed as an anticrime measure in a Tampa, Fla., entertainment district. Detective Bill Todd says the system had been taken down two months into its 12-month trial because of a bug in the operating system, but it has been upgraded and is now back in use. The 36-camera system is controlled by an officer at the station, who can pan, tilt, and zoom the cameras to scan faces in the crowd so that the software can compare them with faces in a database.
While Todd says the database contains only photographs of wanted felons, runaways, and sexual predators, police department policy allows anyone who has a criminal record or might provide "valuable intelligence", such as gang members, to be included. So far, according to a report by the American Civil Liberties Union, the technology has produced many false matches and Todd confides that it hasn’t identified any criminals. "We have our limitations", says Frances Zelazny, spokesperson for Visionics. "It’s an enhancement to law enforcement, not a replacement."
At limes, the privacy problem is more perceptible than reality. The Lower Merion School district near Philadelphia had installed finger-scan devices for school lunch lines. Students would place their fingers on a pad to verify their identity, and money would be deducted from their account. The optional program was instituted to make lines move faster, and to spare embarrassment to students entitled to for discounted meals. But even though the system did not capture a full fingerprint image, but rather a stripped-down digital version, some parents felt that it came uncomfortably close to traditional fingerprinting. After a spate of bad press, the program was killed last year. Forty other school districts still use the system.
The passage mainly discusses ______.
选项
A、the face-scanning systems
B、fingerprint systems
C、how to identify a person
D、the problem of biometrics
答案
D
解析
本文第一段与最后一段主要讨论的是指纹检测技术的问题,其他几段讲的是面孔辨认系统的不完善之处。
转载请注明原文地址:https://kaotiyun.com/show/SvlO777K
0
专业英语八级
相关试题推荐
Mandarin,orPutonghua,isthestandardservicesectorlanguageinourcountry.Butrecently,employeesatabigcity’ssubways
ParagraphOneadvisestheworkingwifewhoismoresuccessfulthanherhusbandto______.Orwell’spictureofrelationsbetween
TheReader’sDigestinvestigationaskedAmericanswhichwasthebiggestthreattothenation’sfuture--bigbusiness,biglaboro
BeautyIsMeaningless Ayoungmanseesasunsetand,unabletounderstandorToexpresstheemotionthatitraisesinhint,he
Thatevolvingunderstandingcanhaveimplicationsfordiagnoses.Forexample,in1973,theAmericanPsychiatricAssociationdrop
Islanguage,likefood,abasichumanneedwithoutwhichachildatacriticalperiodoflifecanbestarvedanddamaged?Judgin
IntheUS,pollafterpollhasshownamajorityintavourofanimalexperimentation,evenwithoutstatementsaboutitsvalue.Wh
HenryFielding,thefamousnovelistwhowasalsoaLondonmagistrate,oncemadeanightraidto【M1】_
JobworrieshelpedpushconsumerconfidencedowninSeptemberforthesecondconsecutivemonth.TheConsumerConfidenceIndexfe
随机试题
A.命火衰微型阳痿B.湿热下注型阳痿C.阴虚火旺型遗精D.肾虚不藏型遗精金锁固精丸可用于治疗
对一般精神障碍患者,护理人员多长时间巡视1次【】
陈染小说《空的窗》叙述“我”和一位退休老人重拾生活信念的故事所采用的方式是()
合成胆碱时所需要的氨基酸是
A、1天~2天B、2天~3天C、3天~7天D、7天~10天E、10天~14天新生儿出生后脐带脱落时间是()
某油田2015年2月生产原油16万吨,加热、修井用2万吨,当月销售14万吨,取得不含税收入1500万元;开采天然气1000万立方米,当月销售800万立方米,取得含税销售额166.4万元。则该油田本月应纳资源税为()万元。
对可能因债务人一方的行为或者其他原因,使判决不能执行或者难以执行的案件,人民法院根据债权银行的申请裁定或者在必要时不经申请自行裁定采取的财产保全措施属于()。
如果申请人对行政复议决定不服,可以依法提起行政诉讼,但诉讼期间()行政复议决定的执行。
用人单位违反《就业促进法》的规定,实施就业歧视的,劳动者可以()。
在传统的DoS攻击基础上产生的,使许多分布式的主机同时攻击一个目标,从而导致目标瘫痪,这种攻击属于()。
最新回复
(
0
)