·Biometrics is technology that automatically authenticates, identify, or verify an individual based on physiological or behavioural characteristics.
·This process is accomplished by using computer technology in a non-invasive way to match patterns of live individuals in real time against enrolled records.
Example:products that recognizefaces, hands, fingers, signatures, irises or irides, voices, and fingerprints.
PART OF BIOMETRICS IN VARIOUS FIELDS AND APPLICATIONS:
·Biometrics are most commonly used to enhance computer network security, protect financial transactions, safeguard international borders, control access to secured work sites, verify time and attendance, and prevent benefits fraud.
·Biometrics work well as stand-alone safeguards in many applications and complement other means of security in other applications.
·To verify e-commerce transactions, protect networksecurity, and authenticate online access, biometric technologies are particularly well suited to work in conjunction with other technologies to create a multi-layered security infrastructure
BIOMETRICS:
·The word biometrics comes from the Greek words bio and metric, meaning ``lifemeasurement''.
·By measuring something unique about an individual and using that to identify them, we can achieve a dramatic improvement in security of the key store.
·Newer biometric measurements include DNA from tissue samples, voice pattern, face pattern or even the arrangement of blood vessels in the retina or pattern of coloration in the cornea of the eye.
·The oldest and most widely accepted biometric is the fingerprint.
·The tip of every finger has a characteristic called ``friction ridges''.
·While generally similar, no two friction ridges are exactly the same.
·By imaging the ridges of the fingertips, we get the fingerprint.
SECURITY LEVEL:
·Integrating smart cards, biometrics and public key cryptography provides a solid foundation for developing secure applications and communications.
The highest level of security uses three-factor authentication:
1.Something you know (password or PIN)
2.Something you have (smart card, magnetic stripe card or a physical key)
3.Something you are (your fingerprint, retina scan or voice pattern)
AUTHENTICATION PATTERNS:
·An individual gains three-factor authentication by combining a smart card, biometric and PIN.
·If the user loses the smart card, the card is inoperable without the biometric.
·Forged fingerprints are weeded out with use of the PIN.
·In a smart-card-secure world, you are not locked into one form of authentication, such as a password or key.
BIOMETRIC SYSTEMS:
Biometric systems are :
·Automated.
·Mostly computerized systems.
·Used in Physio-biological measurements.
·Designed for detection of human body.(UNIQUE INDICATOR)
This is the 15 digit identification number specific to your handset. Every mobile phone has a different unique IMEI number. By pressing *#06# on the phone’s keypad will display the IMEI number or alternatively take a look behind the battery compartment where the IMEI number printed.
2. How do I find out my Firmware Version?
Press *#0000# on your phone's keypad to find out your firmware version. This is only a requirement we would need for technical issues.
3.What is a Pre-defined number and is it possible to change the number?
The pre-defined number must be a mobile number where all the information from the target phone is forwarded to. The spy software allows you to change the predefined number remotely at any time without any indication to the target phone.
4. When the spy mode is in operation, what are the coverage area/range restrictions?
The coverage area will be the same as any other standard GSM mobile phone, it depends on the coverage provided by the network provider. As for the range while using the spy mode - you can call it from anywhere in the world.
5. When in spy mode, how sensitive is the microphone and how far from the phone can people hear?
The microphone is that used to make a normal conversation located in the mouth piece of the phone. Though the microphone is very sensitive there is no way to know how far can you hear, the general rule is that you can hear the same as if someone 'forgot' to press the END button on the keypad.
6. Can people call from the spy phone to any other cell phone and listen to anyone's conversation?
No, if this is your understanding we suggest that you read our spy software description again. This is technically impossible.
7. Can the target phone be used for everyday use as a normal mobile phone?
Yes absolutely! spy software operates in its own environment and does not conflict in any way with the normal workings of the phone. You can make and receive calls and texts as normal, it will ring normally and perform according to the original manufacturer specifications. There is no way to tell by holding or using the spyphone that it is packed with 'Extra' superb features.
8. Can hackers install the software on other phones? No. We generate the software file based on the unique IMEI (serial) number of your cell phone, therefore, the software will not work on other mobile phone.
9.Who pays for the forwarded texts? The target phone SIM card will be charged by the network provider for any forwarded texts sent to the pre-defined number. If the network offers free text bundles(booster cards) then no charge will applys.
READ PATIENTLY ITS MUST TO KNOW THIS ,SINCE ALL ARE USING MOBILE PHONES FREQUENTLY AND MANY PEOPLE EVEN SAY THAT THEIR BEST PARTNER IS HIS/HER OWN MOBILES.
The North American Brain Tumor Coalition (NABTC) has for a number of years carefully monitored the research related to the potential adverse effects associated with cell phone use.The NABTC urges these precautions in absence of definitive studies regarding the risks of cell phones.
·The Coalition urges the most expeditious possible completion of research studies, including one sponsored by the World Health Organization (WHO), to provide consumers better information about the risks created by their use of cell phones.
·In the absence of conclusive studies, we urge that individuals take simple precautions to limit their cell phone use and that they impose restrictions on the use of cell phones by children.
Background
It is estimated that almost 220 million Americans and nearly 2 billion people worldwide regularly use cell phones.If cell phones are convenient tools that have become an accepted way of life in the United States, they are the only reliable means of telephone communication in many parts of the world.Cell phone usage is expected to continue to grow worldwide.
Those who use cell phones are exposed to the radiofrequency (RF) energy, a non-ionizing form of radiation, emitted by the phones.Because of the widespread use of this relatively new technology, there is understandable concern about the health implications of use.When the WHO published a fact sheet on cell phones in 2000, it stated, “Given the immense numbers of mobile phones, even small adverse effects on health could have major public health implications.”
Research on Risks Associated with Cell Phone Use
Studies have been undertaken to determine whether RF exposure may increase the risk of cancer.To date, many of the studies have focused on whether RF energy can cause malignant or benign brain tumors.
A “Cell Phone Facts,” document for consumers developed by the Food and Drug Administration (FDA) and Federal Communications Commission (FCC) reviews the research on cell phones that has been completed to date.The document states:
·However, many of the studies that showed increased tumor development used animals that had been genetically engineered or treated with cancer-causing chemicals so as to be pre-disposed to develop cancer in the presence of RF exposure
·There isassociation between the use of wireless phones and primary brain cancer, glioma, meningioma, or acoustic neuroma, tumors of the brain or salivary gland, leukemia, or other cancers.
Recommended Precautions for Use
Many of the health agencies that have issued warnings note that the evidence does not necessarily support limitations on use but that the uncertainty regarding safety of cell phones and their widespread use support action.
In its 2000 Fact Sheet on cell phones, WHO stated:
“Present scientific information does not indicate the need for any special precautions for use of mobile phones.If individuals are concerned, they might choose to limit their own or their children’s RF exposure by limiting the length of calls, or using “hands-free” devices to keep mobile phones away from the head and body”.
The United Kingdom in 2000 urged that cell phone use among children be limited and undertook a leafleting campaign to distribute information about limiting use by children.
In 2006, the Canadian governmenturged adults to moderate their cell phone use and the cell phone use of their children until the science regarding the risks of cell phones is clear.
The FCC and FDA in the United States say:
“If you must conduct extended conversations by wireless phone every day, you could place more distance between your body and the source of the RF, since the exposure level drops off dramatically with distance.For example, you could use a headset and carry the wireless phone away from your body or use a wireless phone connected to a remote antenna”.
The US agencies state that the precautions that are employed by adults may also be adopted by children.
Dr. Herberman said that release of the ten “prudent and simple precautions” to reduce exposure was based on the recommendations of an international panel of experts convened by the University of Pittsburgh.Those experts stated that, “…electromagnetic fields emitted by cell phones should be considered a potential human health risk.”
SO PLEASE BE CAUTIOUS ABOUT THIS ISSUE OF MOBILES.