11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIOS 49interest in biometrics. For example, a pilot program in theUnited Kingdom has used iris scanning to replace the PIN(personal identification number) as a means <strong>of</strong> verifyingATM users.The general advantage <strong>of</strong> biometrics is that it does notrely on cards or other artifacts that can be stolen or otherwisetransferred from one person to another, <strong>and</strong> in turn,a person needing to identify him or herself doesn’t haveto worry about forgetting or losing a card. However, whileworkers at high-security installations can simply be requiredto submit to biometric scans, citizens <strong>and</strong> consumers havemore choice about whether to accept techniques they mayview as uncomfortable, intrusive, or threatening to privacy.Recent heightened concern about the stealing <strong>of</strong> personalidentification <strong>and</strong> financial information (see identitytheft) may promote greater acceptance <strong>of</strong> biometric techniques.For example, a built-in fingerprint reader (alreadyprovided on some laptop computers) could be used tosecure access to the hard drive or transmitted to authenticatean online banking customer.Of course every security measure has the potential forcircumvention or misuse. Concerns about the stealing <strong>and</strong>criminal use <strong>of</strong> biometric data (particularly online) mightbe addressed by a system created by Emin Martinian <strong>of</strong> theMitsubishi Electric Research Laboratories in Cambridge,Massachusetts. The algorithm creates a unique code basedon a person’s fingerprint data. The data itself is not stored,<strong>and</strong> the code cannot be used to re-create it, but only tomatch against the actual finger.The growing use <strong>of</strong> biometrics by government agencies(such as in passports <strong>and</strong> border crossings) is <strong>of</strong> concernto privacy advocates <strong>and</strong> civil libertarians. When combinedwith surveillance cameras <strong>and</strong> central databases, biometrics(such as face analysis <strong>and</strong> recognition) could aidpolice in catching criminals or terrorists, but could alsobe used to strip the anonymity from political protesters.The technology is thus double-edged, with the potentialboth to enhance the security <strong>of</strong> personal information <strong>and</strong> toincrease the effectiveness <strong>of</strong> surveillance.Further ReadingAshborn, Julian D. M. Biometrics: Advanced Identity Verification,the Complete Guide. New York: Springer-Verlag, 2000.“Biometrics Overview.” Available online. URL: http://www.biometricgroup.com/a_bio1/_technology/research_a_technology.htm.Accessed April 20, 2007.Biometrics Research Homepage at Michigan State University. Availableonline. URL: http://biometrics.cse.msu.edu/. AccessedApril 24, 2007.“Biometrics: Who’s Watching You?” Electronic Frontier Foundation.Available online. URL: http://www.eff.org/Privacy/Surveillance/biometrics/.Accessed April 24, 2007.Harreld, Heather. “Biometrics Points to Greater Security.” Federal<strong>Computer</strong> Week, July 22, 1999. Available online. URL:http://www.cnn.com/TECH/computing/9907/22/biometrics.idg/index.html.Jain, Anil, Ruud Bolle, <strong>and</strong> Sharath Pankanti. Biometrics: PersonalIdentification in Networked Society. Norwell, Mass.: KluwerAcademic Publishers, 1999.Woodward, John D., Nicholas M. Orlans, <strong>and</strong> Peter T. Higgins.Biometrics: Identity Assurance in the Information Age. NewYork: McGraw-Hill, 2002.BIOS (Basic Input-Output System)With any computer system a fundamental design problemis how to provide for the basic communication between theprocessor (see cpu) <strong>and</strong> the devices used to obtain or displaydata, such as the video screen, keyboard, <strong>and</strong> parallel<strong>and</strong> serial ports.In personal computers, the BIOS (Basic Input-OutputSystem) solves this problem by providing a set <strong>of</strong> routinesfor direct control <strong>of</strong> key system hardware such as diskdrives, the keyboard, video interface, <strong>and</strong> serial <strong>and</strong> parallelports. In PCs based on the IBM PC architecture, theBIOS is divided into two components. The fixed code isstored on a PROM (programmable read-only memory) chipcommonly called the “ROM BIOS” or “BIOS chip.” Thiscode h<strong>and</strong>les interrupts (requests for attention) from theperipheral devices (which can include their own specializedBIOS chips). During the boot sequence the BIOS coderuns the POST (power-on self test) <strong>and</strong> queries variousdevices to make sure they are functional. (At this time thePC’s screen will display a message giving the BIOS manufacturer,model, <strong>and</strong> other information.) Once DOS is running,routines in the operating system kernel can accessthe hardware by making calls to the BIOS routines. In turn,application programs can call the operating system, whichpasses requests on to the BIOS routines.The BIOS scheme has some flexibility in that part <strong>of</strong>the BIOS is stored in system files (in IBM PCs, IO.SYS <strong>and</strong>IBMIO.COM). Since this code is stored in files, it can beupgraded with each new version <strong>of</strong> DOS. In addition, separatedevice drivers can be loaded from files during systemstartup as directed by DEVICE comm<strong>and</strong>s in CONFIG.SYS,a text file containing various system settings.For further flexibility in dealing with evolving devicecapabilities, PCs also began to include CMOS (complementarymetal oxide semiconductor) chips that allow for thestorage <strong>of</strong> additional parameters, such as for the configuration<strong>of</strong> memory <strong>and</strong> disk drive layouts.In modern PCs the BIOS setup screen also allows usersto specify the order <strong>of</strong> devices to be used for loading systemstartup code. This, for example, might allow a potentiallycorrupted hard drive to be bypassed in favor <strong>of</strong> a bootableCD or DVD with disk repair tools. Another scenario wouldallow users to boot from a USB memory stick (see flashdrive) <strong>and</strong> use a preferred operating system <strong>and</strong> workingfiles without disturbing the PC’s main setup.The data on these chips is maintained by a small onboardbattery so settings are not lost when the main systempower is turned <strong>of</strong>f.Additionally, modern PC BIOS chips use “flash memory”(EEPROM or “electrically erasable programmable read-onlymemory”) to store the code. These chips can be “flashed” orreprogrammed with newer versions <strong>of</strong> the BIOS, enabling thesupport <strong>of</strong> newer devices without having to replace any chips.Beyond the BiosWhile the BIOS scheme was adequate for the earliest PCs,it suffered from a lack <strong>of</strong> flexibility <strong>and</strong> extensibility. Theroutines were generic <strong>and</strong> thus could not support all thefunctions <strong>of</strong> newer devices. Because BIOS routines for

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!