Biometrics technology solution biometric authentication system
-
Upload
ashtopustech -
Category
Technology
-
view
198 -
download
3
Transcript of Biometrics technology solution biometric authentication system
BIOMETRICS TECHNOLOGY
SOLUTION &
BIOMETRIC AUTHENTICATION
What is a Biometric?
Biometrics
Biometrics" is derived from the Greek words 'bios' and 'metric which
means “life measurement" in other way , Biometry = Bio(life)+ Metry
(to measure).• Is the term given to the use of
biological traits
OR
behavioral characteristics
to identify an individual.
Biometrics: “bio”means life and “metrics”– to measure.
Characteristic of
Biometrics Biometric Technology
measuring and analyzing biological data that analyze automatically method of recognizing an individual is based on two main characteristics :
1. Physical characteristics
2. Behavioral characteristics
Mode of Biometric System
Identification
One-to-many comparison
It search for a sample against a database of templates
It identifies an unknown individual.
For e.g.: who is “x”?
Verification
One-to-one comparison
It compares a sample against a single stored template
It verifies that the individual is who he claims to be
For e.g.: is this “x”?
Biometrics is a method of *direct* human identification
as opposed to identifying humans by their possession
of keys or remembering passwords.
• Discourages fraud
• Enhances security
Fingerprint
Identification
Fingerprint recognition is amethod of biometricauthentication that usespattern-recognitiontechniques based onimages of human fingervein patterns beneath theskin's surface. Finger veinrecognition is one of manyforms of biometrics used toidentify individuals andverify their identity.
Door Locks
Access Control
Computer work
stations
Time Clocks
In room safes
Payment Systems
Hand Geometry
Person identification using hand geometry utilizes handimages to extract a number of features such as fingerlength, width, thickness, finger area etc. Scan hand surfacearea-to verify that the person using the device is really whohe or she claims to be.
The user places the palm of his hand on a metal surface which has guidance pegs on it.
the device can reads the hand attributes.
The device then checks its database for verification of the user.
The process usually takes less than 5 seconds.
Facial recognition systems are built on computer programs that analyze images of human faces for the purpose of identifying them. These include the position/size/shape of the eyes, nose, cheekbones and jaw line.
Voice Recognition
Works
Voice recognition system Ituses the pitch, pattern,tone, frequency, rhythm ofspeech for identificationpurposes.
A telephone or microphonecan act as a sensor.
Speaker recognition is oftenused where voice is theonly available biometricidentifier, such astelephone.
There are two different types of eye scans: retinal andiris, It measures the iris pattern of the eye i.e. thecolored part of the eye that surrounds the pupil.
The iris canner analyzes features like rings, furrows, andfreckles existing in the colored tissue surrounding thepupil.
Signature verification
Signature recognition is a behavioral biometric.
Signature to identify note the angle at which the pen isheld, and count number of times the pen is lifted andhow much time it takes to write the entire signature
Actual signature recognition is carried out by writing on apressure sensitive pad with a pen or stylus.
Conclusion
Biometric Solution read Biological factor anddigitally identify human nature
Biometric Technology is very inexpensive andeasy to use for many application area.
Criminal identification
Prison security
ATM
Aviation security
Border crossing controls
Database access
Home/Office
AshtopusTechnologies