|
Contactless Technologies for Smart Cities: Big Data, IoT, and Cloud InfrastructuresBog'liq asosiy 2 MTA Majmua(2021), 1, 4-Karno kartadan foydalanib mantiqiy ifodalarni minimallash, Kalendar reja algoritm, Ishchi dastur(Dasturlash I) 24.11.2021, 1 -amaliyot, 4-Lab, Yurtimiz mustaqillikga erishishidan oldin milliy urf odat, 7-8-mavzuDT larni sertifikatlashtirish, Axborotlarni izlash va ajratib olish fanidan mustaqil ish Mavzu, Abdulla Oripov O\'zbekiston (qasida), 2 lab Yarashov Diyorbek, TATU NF Hemis axborot tizimi, Algo 1-299, prezentatsiyaBiometrics in National Security
Contactless biometric techniques are also employed by
National Security organizations around the world. Many
countries have already implemented such schemes since
2014 in their government facilities and during the COVID-
19 crisis, contact tracing, entrance/exit systems, immigra-
tion, and medical records were all operating using biometric
verification and analysis. In more detail, some countries have
implemented strict border control and immigration rules to
protect their citizens and inhibit the virus spread. In addi-
tion, biometric authentication mechanisms have been widely
used for the verification of security personnel who work in
mission-critical positions (e.g., army, central intelligence,
etc.) [
43
]. The United States has mandated the record reten-
tion of military personnel biometrics for identification and
verification before granting entrance to the nation’s military
facilities. Likewise, North Korea has integrated AI features
along with biometric and facial recognition software in their
homemade smartphone ‘Jindallae’. AnyVision, an AI-based
security company based in Israel, and supported by Micro-
soft, has established its business in 40 different countries
around the globe. AnyVision builds key-based authentica-
tion, identification, and access control systems using cus-
tom built API and software development kits. Thus, pro-
tecting the privacy leveraging facial recognition, iris scan,
and thumb impression mechanism. As a result, confidential
data can be accessed by authorized personnel providing reli-
able and trust-based real-time authentication [
44
]. Different
policies and practices are implemented by countries when
handling biometric methods to protect their military infra-
structure [
13
].
As connectivity continues to spread across the globe,
the use of touchless technologies is also expanding to more
applications. From nuclear warhead management to fighter
jet missile launching, soldiers are identified and authorized
based on their personal biometrics. Data obtained from
sensors in battle tanks are used to analyze the identity and
current status of the operating personnel during military
missions [
45
]. Battleship and submarine captains are also
authorized only using their personal biometric scans. Thus,
with contactless big data biometric strategies, nations can
identify potential terrorists and criminals before they arrive
on their borders sourcing their criminal records from the
national databases [
46
].
|
| |