Probability of a false match claimed by one mobile device in conjunction with fingerprint recognition software.
Number of fingerprints processed by one government agency in a year. A number of additional states require that if a company collects fingerprints it take steps to prevent the fingerprint from being acquired when in the process of being destroyed. In addition, if an organization stores or “possesses” a fingerprint then it must limit its disclosure to third parties, enact measures to secure the fingerprint from unauthorized access, and limit its retention of the fingerprint after it is no longer needed. Those statutes generally require that if an organization “captures” a fingerprint it must provide the consumer with notice and obtain their consent. At least two states have also enacted statutes that govern the private sector’s use of the technology outside of specific fields and applications. Numerous states have enacted statutes concerning the collection of fingerprints by government agencies, by accreditation boards, or in certain regulated industries (e.g., childcare and education). Nonetheless, the FTC, which has authority to prevent unfair and deceptive practices, may proceed against companies that misrepresent the function of the technology, or how they use, secure, or disclose captured fingerprints or fingerprint geometry. There is currently no federal statute that expressly regulates private-sector use of fingerprint recognition software. Some employers are also using fingerprint recognition technology to increase the accuracy and efficiency of employee timekeeping systems. For example, some mobile devices have integrated fingerprint recognition technology to replace, or supplement, passwords or passcodes.
The technology has been used by law enforcement agencies for decades, and dozens of statutes regulate when government agencies may collect fingerprints, how they are permitted to use them, and with whom they can be shared.Īdvances in fingerprint recognition software have lead some private entities to begin using the technology to authenticate consumers. This paves the way for natural fingerprints to be used to track the CO2 once it is injected underground for storage.Fingerprint identification technology uses fingerprints to uniquely identify individuals. Our study shows that natural fingerprints in the captured CO2 are unique and depend on the capture technologies being used. The study, published in Environmental Science and Technology, was supported by the Engineering and Physical Sciences Research Council.ĭr Stuart Gilfillan, of the University of Edinburgh's School of GeoSciences and the study co-ordinator, said: "There has been a pressing need to identify a means to distinguish CO2 to be stored from that already in the subsurface to help CCS deployment. Researchers found that the natural fingerprint of captured CO2 depends on the fuel producing the gas - such as coal, oil, natural gas or biomass - and the technology being used to capture it before it is injected for underground storage.īy comparing the chemical fingerprints in the captured CO2 with those in geological storage reservoirs and drinking water aquifers, they have been able to show that the fingerprints can be easy to identify and distinguishable from natural sources of CO2. This means that CO2 being injected deep underground does not need to have expensive chemical tracers added, in order to monitor that it is effectively contained. This allows it to be distinguished from other CO2 present near storage sites, such as groundwater or naturally occurring CO2 given off by plants and bacteria.
The study discovered that CO2 captured from power stations and industrial sites will have a distinctive chemical fingerprint, depending on its source.
Researchers from the University of Edinburgh have said the findings will help push forward the development of Carbon Capture and Storage (CCS) technology. Scientists have found an inexpensive way to help monitor the safe storage of carbon dioxide captured from power stations and industrial sources. Search our library and digital resources.