Ms. Pedro
English 101
October 15, 2014
Access Granted
Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristics code, the computer grants access. Example of biometric devices include fingerprint readers and face recognition systems. A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer.. External fingerprint readers usually plug into a USB port 1to save on desk space, some laptops include build-in fingerprint readers. A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognitions systems to protect the public. Some mobile devices us face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles . Home and business user alike are using biometric security. Through a biometric identifier, such as a fingerprint biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.
Works Cited
Allensmith, Samantha Clare. Understanding Face Recogniton Systems. n.d. Course Technology. Web. 16 Sept. 2014.
Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.
Rossi, Marcell
Cited: Allensmith, Samantha Clare. Understanding Face Recogniton Systems. n.d. Course Technology. Web. 16 Sept. 2014. Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print. Rossi, Marcell Enrico. "How to Use Fingerprint Readers." Digital Security Review Aug. 2014: n. pag. Web. 3 Oct. 2014.