Some of the traditional methods of logon have been in the form of the user name, password authentication system. Token based id card systems have been used, alongside single sign on services which enables ease of sign on for the user. These forms of identification primarily came into existence for ensuring that the person using a system is the person who is authorized to use it. However these forms of identification are only surrogate representations. They can be compromised easily or the user by themselves might lose the username or password (Jain et al, 2008). Furthermore the user identity parameters would need to be changed regularly in order to ensure that the parameters cannot be lost.
(c) Financial Transactions
Financial systems in particular will benefit because of this biometric authentication. Financial systems such as online banking modules, ATMs are some forms of conducting financial transactions were a password is required. For an online banking it is a secure banking logon password, for credit debit card transactions, a onetime password OTP might be generated, in ATM style transactions a PIN umber would be used as password. However such forms of passwords are heavily compromised because of the data that can be reproduced (except for the one time password). There are skimmers used for PIN hacking, similarly online passwords are hacked because of their combinations either not being fool proof in the making or because of the use of key loggers and other malicious softwares. Some financial institutions have already resorted to using a form of palm vein authentication system wherein a validity of the customer will be determined by their palm veins (Jain et al, 2008). The financial transaction will go through only when the vein pattern of the customer read through an infrared lighting source can be matched to the existing infrared patterns. In the context of financial transactions for business it has been noted that employees forgetting their passwords or losing the devices in which these pass are stored such as their PDAs results in problems. Businesses have to hire external consultants or work around the authentication system in order to conduct transactions and this results in security issues. Already businesses are resorting to using biometric authentication such as the palm vein reader and the voice recognizer for the authentication processes because of the convenience of use, the greater uniqueness and security that is generated and the commercial gain that could be gathered.