May 15, according to foreign reports, for the fear of identity theft of users, here is a good news, there is a bad news. The good news is that the traditional cryptographic encryption system is ready to leave the stage of history. Because it is easy to crack hackers, leading to frequent data intrusion.
However, the bad news is that biometric security systems, which are about to replace traditional passwords, also present a big security risk.
Biometric security systems are designed to allow users to prove their identity using obvious physical characteristics such as fingerprints, iris, or heart rate. This feature is common in many current devices. For example, the Apple iPhone allows users to authorize a payment activity by fingerprinting.
The beauty of the biometric security feature is that these physical features are hard to copy, and users do not have to bother remembering them. This is in stark contrast to the traditional method of password encryption. Hackers can easily crack the password because many users are still using very simple passwords, such as "12345", but also because hackers borrow powerful computers to guess and test passwords.
Unfortunately, biological data can also be stolen by hackers. There are many security intrusion events that have stolen user bio data. For example, in 2015, fingerprints of 5.6 million employees saved by the U.S. Federal Government Personnel Management Office were stolen by hackers.
What's worse is that it can cause permanent damage after biological data is stolen. After the data is stolen, you can change your password, but you can not change your fingerprints.
More and more organizations, including corporations and government agencies, are now building a database of employee biometrics to easily identify them. However, such a database places employees in a very dangerous position because of the risk of these databases being stolen by hackers.
A recent report from PricewaterhouseCoopers notes that different countries have very different privacy laws that target the collection and dissemination of biological data. Any company that owns the data, whether it is directly owned or indirectly owned by a third-party cloud computing service provider, is equivalent to entering a "minefield": if it is found to be improperly used, or these Data is stolen by hackers, then these companies will be prosecuted by the law, give yourself untold trouble.
However, these risks of biometric security systems are not insurmountable. Now people are becoming more aware of the company's way of protecting employee biological data by not having these sensitive information right from the start. PwC's report recommends that companies keep these biological data only on the user's device instead of on the company's server.
In practice, a user may save one or more biometric features, such as thumbprints and voice messages, to a personal cell phone or computer. Then, as the user processes the business on a third-party service such as PayPal Payment Service or other website, the service or website exchanges confirmation with his or her personal device to confirm the identity.
For example, Apple Pay, an Apple payment service on the iPhone, works like this. Apple does not actually send a copy of the user's thumbprint to the merchant; instead, it only provides a one-time confirmation to authorize the payment. Similar payment authentication and authorization methods have been standardized by the FIDO protocol. The FIDO protocol is a security agreement signed by device manufacturers and companies in the technology and financial industries.
As governments and companies begin to adopt biometric security systems, they should at least resist the temptation to centrally store employee biological data in a consolidated database, thereby avoiding exposing employees to greater dangers than traditional passwords.
Metakaolin can give the effective pozzolanic reactivity at earlier stage, so it can gives higher reaction rate for hydrated lime and improve a lot of performance for mortar or concrete. The use of metakaolin can significantly improve the strength, especially early strength within 28d, and reduce efflorescence or whitening effect for cementitious applications.
Metakaolin Uses,Metakaolin Pozzolan,High Reactive Metakaolin,High Reactivity Metakaolin
Shanghai Na Long Tech Co., Ltd , https://www.na-long.com