Book contents
- Frontmatter
- Contents
- Foreword by Kevin Gillick
- Acknowledgements
- Part I Introduction
- Part II Technology
- 4 Biometrics
- 5 Security and cryptography
- 6 Card technology
- 7 Readers and terminals
- 8 Application selection: the ISO 7816 family
- 9 JavaCard and GlobalPlatform
- 10 Multos
- 11 Other operating systems
- 12 Card management systems
- Part III Business requirements
- Part IV Implementation
- Appendix A Glossary
- Appendix B Further reading
- Appendix C Standards
- Index
- References
4 - Biometrics
from Part II - Technology
Published online by Cambridge University Press: 11 August 2009
- Frontmatter
- Contents
- Foreword by Kevin Gillick
- Acknowledgements
- Part I Introduction
- Part II Technology
- 4 Biometrics
- 5 Security and cryptography
- 6 Card technology
- 7 Readers and terminals
- 8 Application selection: the ISO 7816 family
- 9 JavaCard and GlobalPlatform
- 10 Multos
- 11 Other operating systems
- 12 Card management systems
- Part III Business requirements
- Part IV Implementation
- Appendix A Glossary
- Appendix B Further reading
- Appendix C Standards
- Index
- References
Summary
We must now digress from our discussion of the technology of cards and readers to cover another two sets of technologies that have a major impact on cards, and are likely to grow in importance in the coming years: biometrics and cryptography. This chapter will cover biometrics and Chapter 5 will address cryptography and the security of cards.
In most smart-card applications, the card is associated with a person; it represents a key to that person's details in a database. It is, therefore, very important to be able to identify the person who is using the card and to ensure that he or she is the person whose details are being unlocked. Often (for example in an access control or passport application), this is the main purpose of the card or application. In other cases the purpose is to allow access to data stored about that person.
In most card-based systems we need to do this automatically, although sometimes there is a human element as well (for example, inserting the card could call up an image of the card-holder, which can be checked while the user is entering his or her password or verifying a fingerprint).
Many people feel that a human check is better than any automatic check, however this is definitely not true when the population being checked is large.
- Type
- Chapter
- Information
- Multi-application Smart CardsTechnology and Applications, pp. 31 - 38Publisher: Cambridge University PressPrint publication year: 2007