Home / Publications / Digest / Финансы и Кредиты / Biometric identity verification in banks

Biometric identity verification in banks

Финансы и Кредиты
Biometric identity verification in banks

The introduction of innovative technologies and related options is becoming more and more ubiquitous. To activate a mobile gadget today, you do not need to remember a password. It is enough to put a finger and the software will check its fingerprint with the data entered. Facial recognition is no longer a novelty. But, is such a biometrics in banks necessary, where security systems must be especially reliable. The daily experience that many people have will help to figure it out.

Fingerprint scanner

Most of the users who installed this option on their phone faced problems such as:

  1. Wet after washing their hands - the scanner refuses read a fingerprint.
  2. The need to put your finger first and only then get access to answer a call is very inconvenient if you are driving or your hands are full of burdens.

Many owners gadgets equipped with this feature have already abandoned its use.

Face scanner

Many fitness centers and office buildings have installed turnstiles equipped with face scanners to obtain entry permits. Setting up and testing such equipment takes months. The “tortured” guard “manually” lets everyone through who was denied access by the automatic system. A banal change of hair and make-up can cause a person to not be recognized.

A sad conclusion

The biometric automatic pass has not yet received the necessary technical parameters for guaranteed identification of a person and exclusion of unauthorized access. Why spend money and “break” schemes that have been worked out for decades:

  1. Checking a client’s passport.
  2. Personal chip key or card from the office space for employees.
  3. Full-scale surveillance video without dead zones.
  4. Alarm button.

Supplementing all of the above with biometric control simply does not make sense. The development of such an imperfect, but expensive system will take a lot of time, and attackers will certainly take advantage of this chance.

Сomments
Add a comment
Сomments (0)
To comment
Войти с ВК Войти с ФБ Войти с Яндекс
Sign in with:
Войти с ВК Войти с ФБ Войти с Яндекс