Preview

Biometrics, an Effective Security Technology

Good Essays
Open Document
Open Document
264 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometrics, an Effective Security Technology
Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems.
A fingerprint reader captures the curves and indentations of a fingerprint. Fingerprint readers can be set up to perform different functions for different fingers. For example, the index finger could start a program, and the ring finger could shut down the computer (Jenkins). Fingerprint readers usually cost less than $100, making it easy for people to use them in personal and business environments. Newer computer models include internal fingerprint readers for added security. External fingerprint readers usually are connected to a USB port on the computer (Parlor).
A biometric security device used in high security areas is an iris recognition system. Iris recognition systems read patterns in the iris of the eye. These patterns are as unique as a fingerprint. Iris recognition systems are quite expensive and are used by government security organizations, the military, and financial institutions that deal with highly sensitive data (Doe).
Biometric technology is a very effective way to keep information secure. Biometric technology is used in several different ways. Two widely known biometric devices are fingerprint readers and iris recognition systems. With biometric technology, the world can be more secure.

Works Cited

--------------------------------------------
[ 1 ]. Some organizations use retinal scanners, which work similarly but instead scan patterns of blood vessels in the back of the



Cited: -------------------------------------------- [ 1 ]. Some organizations use retinal scanners, which work similarly but instead scan patterns of blood vessels in the back of the retina.

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Good Essays

    IAFIS is the largest biometric database in the world. This system houses on average more than 70 million criminal files of subject along and around 34 million if not more civil prints. This system has more than 73,000 known terrorist that are suspected terrorist crimes against the United States. ("The fbi: Federal,2008”).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric element, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint readers and face recognition systems.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    • Biometrics – Considered the most secure way to authenticate users, biometrics utilizes the biological factors of a user. Examples include retinal eye scan and fingerprints.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Head to Toe Exam

    • 1250 Words
    • 5 Pages

    Inspect clarity of cornea, anterior chamber, lens, and vitreous Inspect optic disc Inspect retinal vessels…

    • 1250 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristics code, the computer grants access. Example of biometric devices include fingerprint readers and face recognition systems.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Special Senses

    • 417 Words
    • 2 Pages

    When a fundascopic exam of the eye is performed, one looks at structures lying in the innermost aspect of the globe, collectively known as the eyegrounds: retina, retinal blood vessels, optic nerve head (disk), and to a limited degree, subjacent choroid. (Schneiderman, 1990) The benefit of being able to visualize the retinal blood vessels and optic nerve…

    • 417 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Biometric data is being used to identify an individual nowadays because identity theft is a common fear, but this data could also be collected…

    • 1144 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Technology is on an up rise, as is the act of terrorism and other various crimes. Countries such as the United States are taking many precautions to prevent these heinous crimes. One prevention technique that the United States has started using is facial recognition. The freedictionary.com website defines facial recognition as: "biometric identification by scanning a person 's face and matching it against a library of known faces," (The Free Dictionary, 2012) "they used face recognition to spot known terrorists." This paper will help one understand what facial recognition is, who uses facial recognition, and when they use it. This paper will take a look into a couple of cases where facial recognition has been used. Also, it will look into the controversies that happen with the of the facial recognition software. Facial recognition may not be on the top tier of criminal investigations, but it certainly has come a long way since its inception.…

    • 2694 Words
    • 11 Pages
    Better Essays

Related Topics