"We live in a crazy world." Some scientists say, "In this world, in order to prove to our computer who we are, we have to remember a long list of letters and numbers."

However, with the “Z generation” growing up in the 1990s, the cumbersome passwords are no longer popular, and they are becoming more and more accustomed to the convenient life brought by the Internet, which has become the direction of the joint efforts of the technology giants.

Retired firefighter Todd Mayor of North Carolina, USA, visited the emergency room twice last summer because of his son's condition. In an interview with Fortune Magazine, he described the situation when he first arrived in the emergency room: employees at the Claremont Medical Center asked for a photo of a little boy.

The high quality image captures the texture of his son's eye iris. The purpose of doing this is to prevent medical fraud, or the misinformation of other people's information. Mayor is pleased that he does not have to worry about the use of his son's information and medical records.

Like medical records, we live in a locked world, from personal computers to bank accounts to residences. But passwords made up of numbers, letters, and symbols are facing more and more hacking, leaking, and remote manipulation events, and new technologies that protect users from harm are emerging.

The experience of Mayor is one of the empirical ones. In ancient times, people used knots to make notes. Nowadays, as the living space is getting closer to the network, the knot becomes a part of the human body, from fingerprints to irises, or to electrocardiograms and even tears. The way in which the memory is recorded, the biometrics firmly protects the individual. The secret world. Everyone no longer has to work hard to remember the password, and even the key and wallet are not carried with you. Similar to the light Internet life pursued by the “Z Generation” born in the 1990s, biometrics has also entered its own “Z era”.

Drive away dangerous letter combinations

The Claremont Medical Center, where the son of Mayor, is part of the Novant Medical Network's four centers, is one of many hospitals that switch medical systems to electronic health record systems. About 80% of hospitals have taken similar measures in 2013 because of government incentives. However, this paperless office also exposes security issues such as data being easily attacked by hackers.

The most recent example comes from Anthem, one of the largest health insurers in the United States, who has been hacked. According to cybersecurity experts, medical identity theft is on the rise, as the value of personal medical information is extremely high. In the black market, the price of a complete personal medical record is even several times higher than credit card data.

According to data from the Identity Theft Resource Center, hacking attacks on the health care industry accounted for 43% of all industries last year. Under the sly attack, passwords composed of characters such as numbers have been criticized. The Wall Street Journal once commented that passwords have a fundamental problem, and only when they are long, complex, and often replaced, can their protection be maximized. In other words, the password that employees are most unlikely to remember is the best.

In order to solve these problems, medical companies have begun to look for alternatives, and a series of biometric security systems have received more attention. They use the patient's fingerprint, iris, vein or facial data to identify the patient's identity.

Cincinne Mani, senior vice president of Equifax, a US credit counseling firm, said the company is focusing its attention on the online entry of medical records. “We embed technology that enables sound biometrics. Patients need to provide a selfie and compare it with an online ID card. You need to make sure that the two are consistent to prevent identity tampering.”

Fingerprint recognition is one of the first biometric technologies that people think of and has been adopted by many companies. For example, the Saratoga Hospital in New York uses a fingerprint reader instead of a password. Fingerprint recognition has become a frequent visitor at Apple and Samsung's new product launches. 2013 Apple released the smartphone iPhone 5S, which uses Touch ID fingerprint recognition technology.

However, fingerprint readers sometimes fail, and fingerprint readers cannot be used when people wear gloves or their fingers are too dry. In fact, it is not 100% safe.

Mark Rogers, a security expert at San Francisco's information security startup Lookout, had a reputation for successfully cracking the fingerprint recognition capabilities of the iPhone 5S. In a blog he described his experience in deciphering fingerprints – extracting fingerprints directly from the phone screen. However, he also said, "In fact, this kind of attack is still like the plot in John Lecare's novels. It is certainly not something that ordinary street novels can do." But for the sake of insurance, he still suggested that if it is With the combination of safety technology, the fingerprint sensor can greatly improve the safety of the device.

Brine Peeled Garlic

Brine Peeled Garlic,Fresh Garlic,Brine Peeled Garlic Packet,Brine Peeled Garlic 5 Lbs

shandong changrong international trade co.,ltd. , https://www.changronggarliccn.com