.


:




:

































 

 

 

 


Biometric security technology




 

Read the following words and word combinations and use them for understanding and translation of the text:

 

to forge -

retina -

iris ()

gait -

moire fringe patterns

ultrasonics

optical coupler

pupil -

template-matching

scam artist -

frequent-flyer

lock-down ,

sensitive data

to enlist

covert surveillance

template -

 

Biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. There are a number of biometrics and different applications need different biometrics.

Biometric is the most secure and convenient authentication tool. It can not be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individual's unique physical or behavioral characteristics to recognize or authenticate their identity. Common physical biometrics include fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. Of this class of biometrics, technologies for signature and voice are the most developed.

There are many biometric technologies to suit different types of applications. Here comes a list of biometrics:

Fingerprints - A fingerprint looks at the patterns found on a fingertip. There are a variety of approaches to fingerprint verification, such as traditional police method, using pattern-matching devices, and things like moire fringe patterns and ultrasonics. This seems to be a very good choice for in-house systems.

Hand geometry. This involves analyzing and measuring the shape of the hand. It might be suitable where there are more users or where users access the system infrequently. Accuracy can be very high if desired, and flexible performance tuning and configuration can accommodate a wide range of applications. Organizations are using hand geometry readers in various scenarios, including time and attendance recording.

Retina. A retina-based biometric involves analyzing the layer of blood vessels situated at the back of the eye. This technique involves using a low intensity light source through an optical coupler to scan the unique patterns of the retina. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point.

Iris. An iris-based biometric involves analyzing features found in the colored ring of tissue that surrounds the pupil. This uses a fairly conventional camera element and requires no close contact between the user and the reader. Further, it has the potential for higher than average template-matching performance.

Face. Face recognition analyses facial characteristics. It requires a digital camera to develop a facial image of the user for authentication. Because facial scanning needs extra peripheral things that are not included in basic PCs, it is more of a niche market for network authentication. However, the casino industry has capitalized on this technology to create a facial database of scam artists for quick detection by security personnel.

Signature. Signature verification analyses the way user signs his name. Signing features such as speed, velocity, and pressure are as important as the finished signature's static shape. People are used to signatures as a means of transaction-related identity verification.

Voice. Voice authentication is based on voice-to-print authentication, where complex technology transforms voice into text. Voice biometrics requires a microphone, which is available with PCs nowadays. Voice biometrics is to replace the currently used methods, such as PINs, passwords, or account names. But voice will be a complementary technique for finger-scan technology as many people see finger scanning as a higher authentication form.

Uses of Biometrics

For decades, many highly secure environments have used biometric technology for entry access. Today, the primary application of biometrics is in physical security: to control access to secure locations (rooms or buildings). Biometrics permit unmanned access control. Biometric devices, typically hand geometry readers, are in office buildings, hospitals, casinos, health clubs and lodges. Biometrics are useful for high-volume access control. There are several promising prototype biometric applications. One of them, EyeTicket, links a passenger's frequent-flyer number to an iris scan. Some of the US airports use a sort of hand geometry biometric technology for performing citizen-verification functions.

It is also expected that virtual access is the application that will move biometrics for network and computer access. Physical lock-downs can protect hardware, and passwords are currently the most popular way to protect data on a network. Biometrics can increase a company's ability to protect its sensitive data by implementing a more secure key than a password. Using biometrics also allows a hierarchical structure of data protection, making the data even more secure. Biometric technologies further help to enhance security levels of access to network data.

E-commerce developers are exploring the use of biometrics and smart cards to more accurately verify a trading party's identity. Banks are bound to use this combination to better authenticate customers and ensure non-repudiation of online banking, trading and purchasing transactions. Point-of-sales (POS) system vendors are working on the cardholder verification method, which would enlist smart cards and biometrics to replace signature verification. Biometrics can help to obtain secure services over the telephone through voice authentication..

The last interesting application is for covert surveillance. Using facial and body recognition technologies, researchers hope to use biometrics to automatically identify known suspects entering buildings or traversing crowded security areas such as airports.





:


: 2016-11-02; !; : 663 |


:

:

.
==> ...

1337 - | 1285 -


© 2015-2024 lektsii.org - -

: 0.011 .