Preview

Biometric Paper

Good Essays
Open Document
Open Document
325 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometric Paper
Teddy Bailey
Ms. Pedro
English 101
October 15, 2014
Access Granted
Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint readers and face recognition systems.
A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer (Rossi, 2014). External fingerprint readers usually plug into a USB port. To save on desk space, some laptops include built-in fingerprint readers.1
A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and which new hairstyles (Allensmith, n.d.).
Home and business users alike are using biometric security. Through a biometric identifier, such as a fingerprint, biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.

Works Citied
Allensmith, S. C. (n.d.). Understanding Face Recognition Systems . (Course Technology ) Retrieved Sept. 16, 2014
Marcell, R. (n.d.). Understanding How to Use Fingerprint Readers. Digital

You May Also Find These Documents Helpful

  • Satisfactory Essays

    9.07 Lab

    • 367 Words
    • 2 Pages

    2. Computers are used in finger print analysis to look for specific character traits in the print such as loops, dots, forks, or islands.…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer (Rossi). External fingerprint readers usually plug into a USB port. To save on desk space, some laptops include built-in fingerprint readers1.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    - Computers hold hundreds of fingerprint samples that have been recorded through time. When a fingerprint is found, it can be run through the system to try and find an identical fingerprint and determine the owner.…

    • 645 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1984 Pros And Cons Essay

    • 631 Words
    • 3 Pages

    Since 9/11 and other tragedies such as the Boston Marathon bombing surveillance in many ways has increased significantly. One of the most significant ways is through the use and implementation of high-tech security systems, "As the volume and quality of cameras and sensors increases, cities are turning to more advanced face and object recognition software to make sense of the data"(CNN2). One of…

    • 631 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer.. External fingerprint readers usually plug into a USB port 1to save on desk space, some laptops include build-in fingerprint readers.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This system alone has improved the speed and exactness of the very popular 10 point process of prints. A fingerprint sent by graphic conduction from a crime scene to another place within a state can be processed instantly. This then allows officials to issue all point bulletins with in ample time of a crime being committed. This kind of technology opens up communication with the population to catch a criminal fast and proficiently.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Autopsy at a Crime Scene

    • 532 Words
    • 3 Pages

    * Computers are used in fingerprint analysis because they scan the fingerprints found and they see if they can find the exact match on the computer.…

    • 532 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The new technologies of future policing provide a number of invaluable uses. Facial recognition would allow law enforcement to identify criminals in real time through facial recognition matched criminal databases, wanted posters,…

    • 673 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Human beings can be uniquely recognized based upon one or more intrinsic physical traits. According to the Oxford Concise English Dictionary, Biometrics is the application of statistical analysis to biological data. However, the concern is with technologies that analyze human characteristics for automatically recognizing or verifying identity in a context where the biometrics is measurable. The biometric characteristics of…

    • 4494 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Fingerprint Security

    • 5677 Words
    • 23 Pages

    These days, hot products like mobile phones, GPS and computers can be secured at the touch of a fingerprint. Designing in security at the start of a new product development process is more effective than adding it on later. Unlocking your mobile phone by scanning your fingerprint is not a thing of science fiction. It’s an everyday reality for millions of mobile phone users, the greatest proportion of who live in Asia. But designing-in security to mobile phones can be difficult. PIN codes and passwords take too long to enter and users often disable them. Since everyone has a unique fingerprint, biometric technology companies have shown that security at the touch of a fingerprint can be an alternative for portable electronic products. Fingerprint recognition can be implemented in essentially all mobile devices and has the right combination of security, cost and convenience for the end-user. It has the potential to be the single personal identifier that can work with every element of your IT security solution, from the mobile device to the PC, the network, servers, applications and whatever else might be required today, or tomorrow. Fingerprint recognition technology for mobile devices is poised to become the preferred user authentication solution mobile device security. Fingerprint tech is a standard security feature around the world. It works because no - two people not even identical twins have the same fingerprints. Believe it or not, fingerprinting is actually pretty old. It began in eighth-century in Japan. But this ancient approach to security is about to get a big upgrade. Since many smartphones have touch-sensitive screens, by definition, they work with your fingertips. All we need to do is convert that screen into a scanner that takes the place of a password. That way, it only works for you. If you lose your phone or someone steals it, the device goes dead.…

    • 5677 Words
    • 23 Pages
    Powerful Essays