07.05.2013 Views

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

details, which involved the electronic conversion of 50 million index cards. This then allowed<br />

the computerisation of the processes of applying for and issuing the document, which today<br />

is complete.<br />

Internationally, the identity document that is used for entering other countries is the passport.<br />

Some countries have made provision for a single identification document; but those all meet<br />

the standards for passports, in order to be recognised in other countries.<br />

In summary, a person who has not been identified by the State does not exist from a legal point<br />

of view. The implementation of substantive public policies, especially of a social nature, require<br />

correct identification of individuals for their implementation. And in the second decade of the<br />

21st century, that is not possible without the help of technology, specifically, existing biometric<br />

technology which meets accepted international standards.<br />

Biometrics and Identification<br />

The process of identification of a person is based on a comparison of characteristics with data.<br />

Today there is technology that allows this comparison of data to be automated, speeding up<br />

the processes of issuing documentation and verifying identity.<br />

Even for paper-based documentation – in other words, for face-to-face identification –<br />

automated biometric technology has been incorporated which, since it observes international<br />

standards, facilitates the traceability of data.<br />

Biometric technology allows identification based on an individual’s physical characteristics:<br />

DNA, fingerprints, facial features or the characteristics of the iris, details which are personal and<br />

unique to a particular individual.<br />

Today there is biometric technology in multiple public and private applications. For example<br />

in social networks, the application automatically assigns a name to a person when his or her<br />

photo is uploaded which, depending on the facial recognition information available, the system<br />

interprets as correct. Some have questioned this application, since it identifies individuals<br />

without authorisation and with a high degree of error, and could affect the right to privacy.<br />

In the public realm, biometry is used both for the identification of individuals and for the<br />

authentication of identity in computerised systems, the strengthening of public security at airports<br />

and in cities, and the restriction of access to secure sites (both in the physical sense – buildings<br />

– and the virtual – computer systems and applications). Recognition is conducted using physical<br />

characteristics (fingerprints, features of the face or hand, and iris patterns) or learned or acquired<br />

behavioural characteristics (voice patterns, handwriting and keystroke patterns).<br />

There are various devices for housing biometric technology and identifying individuals. These<br />

devices rely on various factors, depending on the level of security the application requires.<br />

Typically, authentication factors will be something we know (a password, for example),<br />

something we have (such as a smart card) and something we are (in other words, some biometric<br />

detail). The use of the three factors for authentication makes the process secure.<br />

280

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!