Sunday, June 2, 2019

Biometric Systems :: Essays Papers

Biometric Systems As defined in Computer Security fundamental principle by OReilly & Associates, Inc.Biometrics is the use of a persons unique physiological, behavioral, andmorphological characteristics to provide positive personal designation.Biometric systems that are currently avaiable today examine reproduces,handprints, and retina patterns. Systems that are reason to biometrics just now arenot classified as such are behavioral systems such as voice, signature andkeystroke systems. They test patterns of behavior not parts of the body.It seems that in the world of biometrics that the more effective thedevice, the less willing people will be to accept it. Retina pattern devicesare the intimately reliable but most people hate the idea of a laser shooting intotheir eye. Yet something such as monitoring keystroke patters people dont mind,but its not nearly as effective.Biometric verification is forecast to be a multibillion dollar market inthis decade. There is no doubt that financial confidence and debit cards are goingto be the biggest part of the biometric market. There are also manysignificant niche markets which are growing rapidly. For example, biometricidentification cards are being utilize at a university in Georgia to allow studentsto get their meals, and in a Maryland day contend center to ensure that the rightperson picks up the right child. In Los Angeles, they are using fingerprints tostop welfare fraud. And theyre also being used by frequent business travellersfor rapid transit through immigration and customs in Holland, and now at JFK andNewark airports in the United States. It could also be used to simply preventone employee from punching in for some one else, or to prevent someone fromopening up an account at a intrust using a false name. Then there is also thesecurity access market, access to computer databases, to premises and a varietyof other areas.The finder program made by Fingerprint Technologies uses several devic esat once. The system first prompts for a user name and password. Then they musthave their fingerprint scan match what is on record. They can also use a videocamera for real time video to capture photographs which can be incorporated intothe data base. The time to scan and gain entrance to the building take from 6to 10 seconds depending on what other information the operator wishes the user

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.