首页
登录
职称英语
Many system can be deliberately fooled. A new study from Yokohama National Un
Many system can be deliberately fooled. A new study from Yokohama National Un
游客
2023-12-17
70
管理
问题
Many system can be deliberately fooled. A new study from Yokohama National University in Japan shows that phony fingers concocted from gelatin, called "gummy dummies", easily trick fingerprint systems. Manufacturer of some systems claim to guard against such tactics by recording pupil dilation, blood flow in fingers, and other evidence that the biometric sample is "live". And although some makers assert that biometrics solves the problem of identity theft, no one can steal your iris(虹膜) or hands, after all many experts disagree. A hacker who broke into a poorly designed system might be able to steal other people’s digital biometric templates and use them to access secure networks. This trick, called "replay", could take identity theft to a whole new level. "Your fingerprint is uniquely yours, forever. If it’s compromised, you can’t get a new one", says Jackie Fenn, a technology analyst at the Gartner Group.
Privacy concerns—although they seem less pressing to many these days—may also slow public acceptance of the technology. Yet in some cases, biometrics can actually enhance privacy. A finger-scan system for controlling access to medical records, for example, would also collect an audit trail of people who viewed the data. But face scanning, with its potential for identifying people without their knowledge, has alarmed privacy advocates.
Last month, for example, Visionics Corp’s face-scanning system was redeployed as an anticrime measure in a Tampa, Fla., entertainment district. Detective Bill Todd says the system had been taken down two months into its 12-month trial because of a bug in the operating system, but it has been upgraded and is now back in use. The 36-camera system is controlled by an officer at the station, who can pan, tilt, and zoom the cameras to scan faces in the crowd so that the software can compare them with faces in a database.
While Todd says the database contains only photographs of wanted felons, runaways, and sexual predators, police department policy allows anyone who has a criminal record or might provide "valuable intelligence", such as gang members, to be included. So far, according to a report by the American Civil Liberties Union, the technology has produced many false matches and Todd confides that it hasn’t identified any criminals. "We have our limitations", says Frances Zelazny, spokesperson for Visionics. "It’s an enhancement to law enforcement, not a replacement."
At limes, the privacy problem is more perceptible than reality. The Lower Merion School district near Philadelphia had installed finger-scan devices for school lunch lines. Students would place their fingers on a pad to verify their identity, and money would be deducted from their account. The optional program was instituted to make lines move faster, and to spare embarrassment to students entitled to for discounted meals. But even though the system did not capture a full fingerprint image, but rather a stripped-down digital version, some parents felt that it came uncomfortably close to traditional fingerprinting. After a spate of bad press, the program was killed last year. Forty other school districts still use the system. [br] "The technology" in the second paragraph refers to ______.
选项
A、face-scanning systems
B、fingerprint systems
C、gummy dummies
D、biometrics
答案
D
解析
第一段从指纹检测系统人手,提出了生物测定学中的问题。而且在下句中,作者又接着说“Yet in some cases,biometrics can actually enhance privacy”,由此可见,这里的“the technology”就是指“biometrics”。
转载请注明原文地址:https://www.tihaiku.com/zcyy/3282130.html
相关试题推荐
TheoriginoftheAmericanpartysystemcanbetracedto______.A、thestruggleb
Itisn’texpectedtostartnibblingawayatcomputerdatasystemsuntilthed
Itisn’texpectedtostartnibblingawayatcomputerdatasystemsuntilthed
Itisn’texpectedtostartnibblingawayatcomputerdatasystemsuntilthed
Itisn’texpectedtostartnibblingawayatcomputerdatasystemsuntilthed
Thesystemic-functionalgrammaroriginatedwith____________.A、FirthB、LeechC、M
1 "Internationalcommunication"iscommunicationbetweenmembersofdiff
Beguninthelate1960sbyPentagonweaponsresearchersasasystemforeasin
Beguninthelate1960sbyPentagonweaponsresearchersasasystemforeasin
Beguninthelate1960sbyPentagonweaponsresearchersasasystemforeasin
随机试题
Whyisthecallbeingmade?[br][originaltext]Hello,thisisJackintechn
各种慢性疾病(chronicdiseases)已经成为影响中国人健康的主要隐患。随着钱包越来越鼓,中国人的生活方式也发生了巨大的变化,其中包括饮食上的
Forthefirsttwo-thirdsofthe20thcentury,chemistrywasseenbymanyast
在ISO的OSI模型中,提供流量控制功能的层是(1); 提供建立、维护
室内空气快速消毒的最佳方法是A.熏蒸消毒 B.擦拭消毒 C.粉剂喷洒消毒
对喉麻痹的描述,不正确的是A.单侧喉返神经麻痹最为多见 B.右侧喉返神经麻痹的
"财政补助结转"科目年末应无余额。()
法的本质是( )A.法体现统治阶级意志是统一的和整体的 B.法是被奉为法律的
下列各项中,不符合内部牵制的要求的是()。A、出纳人员管票据 B、出纳人员
矩形基础底面尺寸3.0m×3.6m,基础埋深2.0m,相应于作用的准永久组合时上
最新回复
(
0
)