Biometrics: Biometrics and Fingerprint Software Quality Essay
Submitted By mushele
Words: 878
Pages: 4
“Biometrics is the measurement and analysis of unique physical or behavioral characteristics (such as fingerprint or voice patterns), especially as a means of verifying personal identity”. (Merriam-Webster Encyclopedia, 2013) Other characteristics include face, hand geometry, vein, and iris recognition. The trait needs to be something that doesn’t change a lot over time. Other methods of authentication still in use is what the user knows, such as a password, or answers to secret questions personalized to that user, or what the person has, such as a key, pin number, or a keycard.
Since the beginning of civilization, there have been thieves. As the World Wide Web has grown to store so much personal information, security has been an issue for users and website developers who need to protect sensitive information from hackers. These criminals use this information to steal names addresses, dates of birth, social security numbers and credit card numbers for use in illegal purchases and identity theft.
Controlling access to databases and user accounts requires protection of aspects such as identification, authentication and authorization. This protection is performed through the use of programming languages that encrypt unique user IDs and secret passwords that ideally include numbers, capital letters, and symbols to be considered ‘strong’. (Baldwin, 2012, p. 28)
Database intrusion using PHP or MySQL databases can provide hackers with these passwords, even though they are encrypted.
Biometrics can simplify this process, eliminating the need to store passwords in the browser, or memorization of them for each account you access. Once this information is accessed, criminals can create bogus identities, creating billions of dollars in fraudulent debt. “Identity theft cost Americans $1.52 billion in 2011, FTC says“(Simpson, 2012).
Biometrics can secure entire hard drives and replace passwords with fingerprints, voice commands, or iris and face recognition. The technology lets users connect to their laptops, enter buildings, or log into accounts seamlessly with the swipe of a finger, voicing a statement, or looking at a camera. The camera can scan the iris or the face and recognize the user, authenticate them and grant access. Face and iris recognition methods are the most expensive available today, and are used for access to top secret buildings like you see in the movies. Fingerprint scanning and voice recognition are the most commonly used physical attributes for the PC and smartphones used today. “Over the past decade there has been a huge increase in fingerprint authentication as the quality of scanning hardware has improved, the price has decreased. This decrease in price has now allowed the technology to be used on personal computers.” (Jackson, 2012)
There are two separate parts needed to use fingerprint software: Scanning hardware, and fingerprint matching and storage software. There are four main features in al finger print software programs: Image storage, relational databases, image compression logic, and access logs. The difference between fingerprint software quality is in its image quality and the ability to store significant header data that can be quickly accessed by the program. The more details stored in each fingerprint, the larger the file-size, which increases the need for storage capacity. Each dataset holds the fingerprint image and security profile. A key is then linked to the image data, allowing connections to be made in the database. (Jackson, 2012, p. 36)
Finally, for computers within a large network with
Related Documents: Biometrics: Biometrics and Fingerprint Software Quality Essay
to make technological systems more secure, biometric security measures are being established. There are two types of biometrics, physiological, such as fingerprints or facial recognition, and behavioral, such as keystrokes or signatures (BiometricSolutions, 2013). Many organizations are placing systems that rely on biometrics rather than passwords to allow access to databases, physical areas, or just logging onto a system. There are many different types of biometrics that are being used and all hav…
History and uses of Biometrics HISTORY AND USES OF BIOMETRICS By Marie C. Smith Gerard Beatty SEC310 March 10, 2014 1 Table of Contents I. First uses of Biometrics Handprint recognition---------------------------------------------------------------------------3 Facial recognition-------------------------------------------------------------------------------3 Ancient finger prints-----------------------------------------------------------------------------4 II. Types of Biometrics A. Physiologica…
by preventing access to potentially dangerous websites. Richman can protect itself by training our employees in internet user monitoring and filtering policy. In conjunction, we will start using Pearl Echo. Suite web filtering and internet control software to enforce the policy. A. Employee Internet Use Monitoring and Filtering Policy 1.0 Purpose The purpose of this policy is to define standards for systems that monitor and limit web use from any host within Richman Investments' network. We need to…
of surveillance and biometrics and the resultant slippage between the individual, the type and the stereotype. The stereotype emerges from between the general and the individual as a coherent, simplified, easily readable idea. There have been many attempts to find a particular characteristic that is unique to an individual that enables absolute identification. Alphonse Bertillon sought it in a combination of body measurements. Later this was superseded with fingerprints which are now in doubt…
of Using Computers violation of privacy, public safety (victim to crimes), impact on labor force, health risks, impact on environment, Network is a collection of computers and devices connected together and share resources, such as hardware, software, data, and information Online successful connection to a network Internet is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals B:IP address is a number that…
offering advanced features e.g. the ability to send emails, surf the internet. Multifunctional- having ability to do many different things using the same devise. Picture resolution – refers to the quality and detail that can be shown on the screen of the mobile. Higher the resolution, the better the quality of the image displayed on screen. It’s measured in pixels. Camera resolution – The amount of detail that the camera picks up in one picture. The higher the resolution the more detail the camera…
About Lenovo While the Lenovo brand came into existence only in 2004, the company has a much longer history. In 1984, Legend Holdings was formed with 25,000 RMB in a guard house in China. The company was incorporated in Hong Kong in 1988 and would grow to be the largest PC company in China. Legend Holdings changed its name to Lenovo in 2004 and, in 2005, acquired the former Personal Computer Division of IBM, the company that invented the PC industry in 1981. Today, Lenovo is a US$30 billion personal…
Winter 2012 Study Guide – Comprehensive Exam (in reverse order) BUS 391 Chapter 7 Networks, Telecommunications, and Wireless Networks and Telecommunications Network Basics • Telecommunication system - enable the transmission of data over public or private networks • Network - a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together • The three types of networks…