07.05.2013 Views

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Governments rely on biometrics to identify people, authenticate their identity in information systems,<br />

to strengthen public security in airports and cities, and to restrict the access to secure places, both<br />

physical (buildings) and virtual (information systems and applications).<br />

Recognition systems that use biometric technologies recognize a person based on physical<br />

characteristics (fingerprints, facial and hand characteristics, iris patterns) or behavioural characteristics<br />

learned or acquired (voice, holographic signature and keyboard typing patterns)<br />

The use of biometric techniques for individuals’ identification is supported on the use of devices that<br />

contain their information and scanners-readers of it. These devices can be intelligent cards that store<br />

biometric data in a Integrated Circuit Chip (ICC), in turn protected by public key technologies (used<br />

by the authority that delivers the personal identification device to sign the ICC) and by asymmetric<br />

key technologies (a PIN – Personal Identification Number), e.g., the access to information systems or<br />

computing centres.<br />

This device is a physical artefact (for example an identity card, an intelligent card) issued to an<br />

individual by a competent authority that contains data stored that prove that individual’s identity<br />

(for example a portrait photo, fingerprints, etc.) so that the identity of the holder of that document<br />

can be compared against the information stored by other person (i.e., they have to be accessible for a<br />

person to be read) or by an automated system (i.e., that can be accessed or compared electronically).<br />

Authentication factors currently used are three, based on:<br />

- Something that I know: the individual is authenticated by means of something that he or she knows:<br />

a key, an identification number– PIN, a phrase or an answer to a security question.<br />

- Something that I have: the person is authenticated using something that he or she has: a token, a<br />

smart card, a digital certificate.<br />

- Something that I am: the individual is authenticated based on an own characteristic, i.e., biometric<br />

data.<br />

The factors based on knowledge and ownership require that the individual that is going to be<br />

identified by a system has to remember to carry the device. Instead, when biometric technologies are<br />

applied, that data is in that individual and it is almost impossible to be falsified, i.e., be used by other<br />

individual for identity impersonation. It is said that in the first two factors, the relationship between<br />

the data and its verification is weak, what makes identity impersonation easier, as the system cannot<br />

distinguish between the legitimate possessor of the device and someone who had stolen it; the same<br />

applies for a key.<br />

The main function of applied biometrics is referred to the identification of individuals, both in the<br />

real and the virtual environment.<br />

Electronic Identity Document<br />

The identification of persons who are born in their territory is one of the State’s basic functions in<br />

some countries, what in general is responsibility of the Civil Registry. In our region, governments have<br />

introduced a state modernization process which considers the possibility of incorporating ICTs to<br />

accomplish such identification function.<br />

But apart from fulfilling this individuals’ identification function, the use of biometrics in national<br />

electronic documents brings about the deployment of additional functionalities. In this context,<br />

the use of biometrics for this purpose will enable the creation of a unified database with individuals’<br />

identification information. The availability of this information will make the accomplishment of other<br />

506

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!