Today’s guest post is brought to you by Monique Jones.
Do you remember those science fiction movies, where people don’t carry ID cards anymore, but are verified through other means? Well, our mobile world is bringing that world closer to reality.
There are two categories of identification right now that are leading how we protect ourselves. One is based on biometrics, which is about identifying unique biological aspects of your body, such as your fingerprint, retinal scans or even your voice. Others, however, are based on passwords and identification based on technology that is either with you, on you, or in you. Yep, that’s right; soon enough, you could become your ID. Here are just some of the identification systems that we’ll all soon be familiar with.
Your Mobile Device
Nearly everyone these days has at least one mobile device, and that fact has made it a good idea to use mobile devices in conjunction with biometric data to confirm our access. After all, you may be exactly who you say you are, but you may not exactly have access to where you want to go.
Your mobile device may be tagged with a unique serial number or passcode. Thus, if your mobile device is “swiped” near a reader, you’ll be allowed access. Another way is that you have entered a passcode into a specific app, and the app then is used to identify you. As mentioned before, this will probably be in conjunction with biometric security measures.
Access by Communication
It’s a bit old-school, but calling someone up through a mobile line or VoIP (read more about VoiP service) to ask for access still works, but with an added layer of security – again, your mobile device is identified, and don’t be surprised if your call will have video as well.
This has the distinct advantage of providing a visual and audio confirmation, combined with a mobile device confirmation as well. However, the idea of using a mobile device for identification and security does have problems as well.
Even though mobile devices can act like key cards and as portable audio and video confirmation devices, there are still inherent problems.
The very fact that a mobile device is portable can lead to at least two problems. The first one is if the person accidentally forgets his or her mobile device. This would probably mean that the security measures should have alternatives – but then, doesn’t that complicate what should have been simplified?
Another problem is well, having your mobile device stolen. This is the reason why, when you do use your own mobile device for identification, you should make sure that your own mobile device has its own security system. The last thing you need is to be accused of being lax with security – why give you the opportunity to use a mobile device identification system, if you’re going to let it be stolen?
But is it feasible?
As stated before, many people find the very nature of a portable or mobile device a big target for theft or forgetfulness. However, this sort of system should be seen as a way to shorten confirmation for security – and that the alternate measures are actually the “standard.” Still, the threat of not being with your mobile device will always be the question with these systems.
On the other hand, imagine if, instead of standing in line to get into your secure workspace, or waiting for someone in the IT department to give you access to secure files while you’re working from home, you can just call up, and have the proper security confirmations done, by the book? It would shorten what would be time-sucking security processes that can be very frustrating.
In the end, the use of mobile devices as identification and security systems are definitely on the way to reality, but will probably never be a stand-alone system.
Monique J is an Engineer. She also is a Freelance Writer who concentrates on making articles about social networking, technology, business and general topics. On her leisure time, you can find Monique at her fashion boutique. Learn more about Monique on Google+.