Finger print and retinal identification are being used in many places
now and even facial recognition systems are starting to be introduced.
Special devices are needed to capture the biometric data which is then
passed onto the computer for processing and identification.
Biometric authentification methods can be used to identify you at ATMs
to withdraw cash, in computer networks to allow you to log on and many schools
are now introducing 'fingerprint registration'!
A face recognition system captures a live
face image and compares it with a stored image to determine if the person is a
legitimate user. Some buildings use face recognition systems to secure access
to rooms. Law enforcement, surveillance systems, and airports use face
recognition to protect the public. Some notebook computers use this security
technique to safeguard a computer. The computer will not start unless the user
is legitimate. These programs are becoming more sophisticated and can recognize
people with or without glasses, makeup, or jewelry, and with new hairstyles.
Biometric devices measure the shape and size of
a person's hand using a hand geometry system. Some large companies use
this system as time and attendance devices or as security devices. Day-care
centers use this system to verify parents who pick up their children.
A voice
verification system compares a person's live speech with their stored
voice pattern. Some larger organizations use voice verification systems as time
and attendance devices.
Many companies also use this technology for
access to sensitive files and networks.
Some financial services use voice verification systems to secure
telephone banking transactions. These systems use speaker-dependent voice
recognition software. That is, users train the computer to recognize their
inflection patterns.
A signature
verification system recognizes the shape of your handwritten
signature, as well as measures the pressure exerted and the motion used to
write the signature. Signature verification system uses a specialized pen and
tablet.
High security areas use iris recognition
systems. The camera in an iris recognition system uses iris recognition
technology to read patterns in the iris of the eye. These patterns are as
unique as a fingerprint. Iris recognition systems are used by government
security organizations, the military, and financial institutions that deal with
highly sensitive data. Some organizations use retinal scanners, which
work similarly but instead scan patterns of blood vessels in the back of the
retina.
Sometimes, fingerprint, iris, and other
biometric data are stored on a smart card. A smart card, which is
comparable in size of a credit card or ATM card, stores the personal data on a
thin microprocessor embedded in the card. Smart cards add an extra layer of
protection. For example, when a user
places a smart card through a smart card reader, the computer compares a
fingerprint stored on the card with the one read by the fingerprint scanner.
Some credit cards are smart cards; that is, the microprocessor contains the
card holder's information instead of a magnetic stripe.
No comments:
Post a Comment