These days, hot products like mobile phones, GPS and computers can be secured at the touch of a fingerprint. Designing in security at the start of a new product development process is more effective than adding it on later. Unlocking your mobile phone by scanning your fingerprint is not a thing of science fiction. It’s an everyday reality for millions of mobile phone users, the greatest proportion of who live in Asia. But designing-in security to mobile phones can be difficult. PIN codes and passwords take too long to enter and users often disable them. Since everyone has a unique fingerprint, biometric technology companies have shown that security at the touch of a fingerprint can be an alternative for portable electronic products. Fingerprint recognition can be implemented in essentially all mobile devices and has the right combination of security, cost and convenience for the end-user. It has the potential to be the single personal identifier that can work with every element of your IT security solution, from the mobile device to the PC, the network, servers, applications and whatever else might be required today, or tomorrow. Fingerprint recognition technology for mobile devices is poised to become the preferred user authentication solution mobile device security. Fingerprint tech is a standard security feature around the world. It works because no - two people not even identical twins have the same fingerprints. Believe it or not, fingerprinting is actually pretty old. It began in eighth-century in Japan. But this ancient approach to security is about to get a big upgrade. Since many smartphones have touch-sensitive screens, by definition, they work with your fingertips. All we need to do is convert that screen into a scanner that takes the place of a password. That way, it only works for you. If you lose your phone or someone steals it, the device goes dead. 1.2 BACKGROUND OF THE STUDY:
The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutiae points, which are unique features found within the patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. Fingerprint technology uses a person's fingerprints to identify him through fingerprint scanning. This technology is used not only in security systems, but also in the field of forensic and crime scene investigations. It can even be found on gadgets found in the home, such as certain laptop computers. Each individual has a different set of fingerprints from every other individual in the world. This is often referred to as a biometric fingerprint. Biometrics is the study of how humans differ from each other based on biological factors, such as how each person's fingerprints form differently. Even identical twins do not share the exact same set of fingerprints. A person's fingerprints are like an identification card. To use a fingerprint scanner, the person places his hand or finger onto the scanner. The machine then scans the fingertips to generate a picture of the tiny lines and ridges that make up the fingerprint. It puts together a detailed image of this fingerprint and stores it for later use. The fingerprint is connected to the name of the person for future reference. Optical fingerprint scanners use small points of light, much like a home video camera does, to record the fingerprint. A capacitive scanner uses an electrical current to create the image. Both send out a certain type of signal, light or electrical, which records a tiny part of the fingerprint. After the entire fingerprint is recorded, all the tiny parts are put together to form a whole picture. Pantech was the first to put fingerprint scanning technology on its GI100 mobile phone, but phones aren’t the only application for biometrics....
Please join StudyMode to read the full document