Sunday, December 16, 2012

ITE 221 - Fall 2012 - Chapter 14

PURPOSE:

This chapter describes system administration responsibilities and tasks. It explains the process of acquiring computer hardware and system software.


ITE 221 – Chapter 14 – Blog

 

Types of Biometric Security

 


 

There are various types of biometric security in use today.  Some of these are listed below:

 

·         Fingerprint Identification – this type of biometric security is based on the ridges on a person’s finger.  These ridges are created in the womb and the actual fingerprints are created by the fourth month of fetal development. As people get older the fingers do get larger but the relationship between the ridges stays the same.

·         Hand Geometry – this is the measurement and comparison of the different physical characteristics of the hand. This type is still in use today.

·         Palm Vein Authentication – this system uses an infrared beam to penetrate the person’s hand as it is waved over the system; the veins in the palm are returned as black lines. This sytem has a high level of authentication accuracy.  It’s pretty hard to fake.  Is used in public places.

·         Retina Scan – this method provides an analysis of the capillary blood vessels in the back of the eye. This pattern remains the same throughout life.

·         Iris Scan – this provides an analysis of the rings, furrows and freckles in the colored ring that surrounds the eye. There are more than 200 points used for comparison.

 

Some of the other types of biometric security is use today include: facial recognition, signature and voice analysis.

No comments:

Post a Comment