Biometric Devices

There is an increasing trend towards using biometric data from people in order to identify them.
Finger print and retinal identification are being used in many places now and even facial recognition systems are starting to be introduced.
Special devices are needed to capture the biometric data which is then passed onto the computer for processing and identification.
Biometric authentification methods can be used to identify you at ATMs to withdraw cash, in computer networks to allow you to log on and many schools are now introducing 'fingerprint registration'!
 
A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition to protect the public. Some notebook computers use this security technique to safeguard a computer. The computer will not start unless the user is legitimate. These programs are becoming more sophisticated and can recognize people with or without glasses, makeup, or jewelry, and with new hairstyles.
 
Biometric devices measure the shape and size of a person's hand using a hand geometry system. Some large companies use this system as time and attendance devices or as security devices. Day-care centers use this system to verify parents who pick up their children.
A voice verification system compares a person's live speech with their stored voice pattern. Some larger organizations use voice verification systems as time and attendance devices.
 
Many companies also use this technology for access to sensitive files and networks.  Some financial services use voice verification systems to secure telephone banking transactions. These systems use speaker-dependent voice recognition software. That is, users train the computer to recognize their inflection patterns.
A signature verification system recognizes the shape of your handwritten signature, as well as measures the pressure exerted and the motion used to write the signature. Signature verification system uses a specialized pen and tablet.
High security areas use iris recognition systems. The camera in an iris recognition system uses iris recognition technology to read patterns in the iris of the eye. These patterns are as unique as a fingerprint. Iris recognition systems are used by government security organizations, the military, and financial institutions that deal with highly sensitive data. Some organizations use retinal scanners, which work similarly but instead scan patterns of blood vessels in the back of the retina.
Sometimes, fingerprint, iris, and other biometric data are stored on a smart card. A smart card, which is comparable in size of a credit card or ATM card, stores the personal data on a thin microprocessor embedded in the card. Smart cards add an extra layer of protection. For  example, when a user places a smart card through a smart card reader, the computer compares a fingerprint stored on the card with the one read by the fingerprint scanner. Some credit cards are smart cards; that is, the microprocessor contains the card holder's information instead of a magnetic stripe.

Comments

Popular posts from this blog

Pen Input

Laptop, Tablets and Palmtop Computers

Measuring Memory