Preview

acu si tina

Powerful Essays
Open Document
Open Document
1458 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
acu si tina
Maria Concepcion S. Tinapay December 10, 2014
BS Entrep 1-2 Mr. CJ Hingpit

Biometrics Biometrics refers to metrics related to human characteristics and traits. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.
More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information.

Biometric functionality
Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication. The selection of a particular biometric for use in a specific application involves a weighting of several factors. Jain et al. (1999)

You May Also Find These Documents Helpful

  • Powerful Essays

    Bus615 Midterm

    • 951 Words
    • 4 Pages

    9. Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.…

    • 951 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    3. Describe the biological features that are considered to be unique to an individual’s identity.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Biology 3201

    • 431 Words
    • 2 Pages

    Trait - distinguishing characters or phenotypic features of an individual. (e.g. Blue eyes, black hair, etc.)…

    • 431 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Home and occupational users alike are using biometric security. Through a biometric element, such as a fingerprint, devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    • Biometrics – Considered the most secure way to authenticate users, biometrics utilizes the biological factors of a user. Examples include retinal eye scan and fingerprints.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Biological measures such as heart rate, blood, pupil dilation and physique are pretty useful when it comes to assessing personality. When your heart beat increases or decreases it could mean a number of things such as nerves or being scared. Pupil dilation can also be caused by emotions such as sad or love. Yet it is obvious that these are not concrete measurements of personality and in order to assess a person’s personality correctly one must have experiments and tests.…

    • 259 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Home and business user alike are using biometric security. Through a biometric identifier, such as a fingerprint biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 4 Midtern

    • 2572 Words
    • 11 Pages

    Graphology or handwriting analysis, uses precise measurements in order to determine personality characteristics from a sample of one's handwriting. However, there is little empirical evidence to suggest that graphology is accurate in determining one's personality from a handwriting sample. Graphology is an example of ______________.…

    • 2572 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    However the American National Standards Institute (ANSI) and National Institute for Science (NIST) standards were routinely required for new systems. The Biometric Standards were what elucidated the limitations of demographic based searches. The substituting of data was crucial for standards and Interoperability. All the standards have limits in images and minutiae M-1 is strictly 1:1, the interoperability is based upon images and all major automatic fingerprint identification system (AFIS) venders have deployed complaints with those standards and the venders have all delivered standards complaint images. The standards are not the complete solution for interoperability, automatic fingerprint identification system (AFIS) technology balances on three main areas. The first one is reliability, which is to find the culprit, the automatic fingerprint identification system (AFIS) requirement for this is 95%. The second one is the selectivity of misidentifying, which was set at as requirement of 1%. Finally, filter or penetration rate, this is how much of the data is search biometrically, automatic fingerprint identification system (AFIS) was 2% of this fingerprint database. With these three criteria’s, a system performance was measured in speed, accuracy, transaction volume and flexibility. The systems performance requirements evolve so the system must adopt to that evolution and the…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Personal information is vital and important resources for each person in the world. Our personal identification or information as important as an account information for a company exists. How personal information gets affected on web? Well, In this decade we are totally depend on the Internet and we can not live a single day without Internet. So somehow we have to share our personal identification in online to satisfy our daily needs and requirements without even concerning what will going be happen next if my personal information goes in wrong hands.…

    • 409 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Biometrics is where facial recognition can categorized. According to the Criminal Investigation text book, biometrics is: "the statistical study of biological data and means to positively identify an individual by measuring the person 's unique physical or behavioral characteristics"…

    • 2694 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Gives individuals the right to know what information is held about them and provides a framework to ensure the personal information is handled properly.…

    • 475 Words
    • 2 Pages
    Good Essays