This chapter describes system administration responsibilities and tasks. It explains the process of acquiring computer hardware and system software.
ITE 221 – Chapter 14 –
Blog
Types of Biometric
Security
There are various types of biometric security in use
today. Some of these are listed below:
·
Fingerprint Identification – this type of
biometric security is based on the ridges on a person’s finger. These ridges are created in the womb and the
actual fingerprints are created by the fourth month of fetal development. As
people get older the fingers do get larger but the relationship between the
ridges stays the same.
·
Hand Geometry – this is the measurement and
comparison of the different physical characteristics of the hand. This type is
still in use today.
·
Palm Vein Authentication – this system uses an
infrared beam to penetrate the person’s hand as it is waved over the system;
the veins in the palm are returned as black lines. This sytem has a high level
of authentication accuracy. It’s pretty
hard to fake. Is used in public places.
·
Retina Scan – this method provides an analysis
of the capillary blood vessels in the back of the eye. This pattern remains the
same throughout life.
·
Iris Scan – this provides an analysis of the
rings, furrows and freckles in the colored ring that surrounds the eye. There
are more than 200 points used for comparison.
Some of the other types of biometric security is use today
include: facial recognition, signature and voice analysis.
No comments:
Post a Comment