Английский язык: Аннотирование и реферирование текста
216 keyed in to use it. This method currently is the one most widely used for identifying computer users. For a long time, fingerprints have provided a method of positive identification. But they suffer from two problems, one technical and one psychological. The technical problem is that there is no simple system for com- paring fingerprints electronically. Also, most methods of taking finger- prints are messy. The psychological problem is that fingerprints are strongly associated in the public mind with police procedures. Because most people associate being fingerprinted with being arrested, they al- most surely would resist being fingerprinted for routine identification. Voiceprints may be more promising. With these, the user has only to speak a few words into a microphone for the computer to ana- lyze his voice. There are no psychological problems here. And techni- cally it's easier to take and analyze voiceprints than finger prints. Also, for remote computer users, the identifying words could be transmitted over the telephone. However, voiceprints still require more research. It has yet to be proved that the computer cannot be fooled by mimics. Also, technical difficulties arise when the voice is subjected to the noise and distortion of a telephone line. Even lip prints have been suggested. But it's doubtful that kissing computers will ever catch on. To date, the most reliable method of positive identification is the card with the magnetic stripe. If the technical problems can be worked out, however, voiceprints may prove to be even better. Data Encryption . When sensitive data is transmitted to and from remote terminals, it must be encrypted (translated into a secret code) at one end and decrypted (translated back into plain text) at the other. Files also can be protected by encrypting the data before storing it and decrypting it after it has been retrieved.
Made with FlippingBook
RkJQdWJsaXNoZXIy MTY0OTYy