Biometrics technology solution biometric authentication system

Post on 15-Jul-2015

198 views 3 download

Tags:

Transcript of Biometrics technology solution biometric authentication system

BIOMETRICS TECHNOLOGY

SOLUTION &

BIOMETRIC AUTHENTICATION

What is a Biometric?

Biometrics

Biometrics" is derived from the Greek words 'bios' and 'metric which

means “life measurement" in other way , Biometry = Bio(life)+ Metry

(to measure).• Is the term given to the use of

biological traits

OR

behavioral characteristics

to identify an individual.

Biometrics: “bio”means life and “metrics”– to measure.

Characteristic of

Biometrics Biometric Technology

measuring and analyzing biological data that analyze automatically method of recognizing an individual is based on two main characteristics :

1. Physical characteristics

2. Behavioral characteristics

Mode of Biometric System

Identification

One-to-many comparison

It search for a sample against a database of templates

It identifies an unknown individual.

For e.g.: who is “x”?

Verification

One-to-one comparison

It compares a sample against a single stored template

It verifies that the individual is who he claims to be

For e.g.: is this “x”?

Biometrics is a method of *direct* human identification

as opposed to identifying humans by their possession

of keys or remembering passwords.

• Discourages fraud

• Enhances security

Fingerprint

Identification

Fingerprint recognition is amethod of biometricauthentication that usespattern-recognitiontechniques based onimages of human fingervein patterns beneath theskin's surface. Finger veinrecognition is one of manyforms of biometrics used toidentify individuals andverify their identity.

Door Locks

Access Control

Computer work

stations

Time Clocks

In room safes

Payment Systems

Hand Geometry

Person identification using hand geometry utilizes handimages to extract a number of features such as fingerlength, width, thickness, finger area etc. Scan hand surfacearea-to verify that the person using the device is really whohe or she claims to be.

The user places the palm of his hand on a metal surface which has guidance pegs on it.

the device can reads the hand attributes.

The device then checks its database for verification of the user.

The process usually takes less than 5 seconds.

Facial recognition systems are built on computer programs that analyze images of human faces for the purpose of identifying them. These include the position/size/shape of the eyes, nose, cheekbones and jaw line.

Voice Recognition

Works

Voice recognition system Ituses the pitch, pattern,tone, frequency, rhythm ofspeech for identificationpurposes.

A telephone or microphonecan act as a sensor.

Speaker recognition is oftenused where voice is theonly available biometricidentifier, such astelephone.

There are two different types of eye scans: retinal andiris, It measures the iris pattern of the eye i.e. thecolored part of the eye that surrounds the pupil.

The iris canner analyzes features like rings, furrows, andfreckles existing in the colored tissue surrounding thepupil.

Signature verification

Signature recognition is a behavioral biometric.

Signature to identify note the angle at which the pen isheld, and count number of times the pen is lifted andhow much time it takes to write the entire signature

Actual signature recognition is carried out by writing on apressure sensitive pad with a pen or stylus.

Conclusion

Biometric Solution read Biological factor anddigitally identify human nature

Biometric Technology is very inexpensive andeasy to use for many application area.

Criminal identification

Prison security

ATM

Aviation security

Border crossing controls

Database access

Home/Office

AshtopusTechnologies