Preview

Biometric Devices Paper

Good Essays
Open Document
Open Document
301 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometric Devices Paper
Teddy Bailey
Ms. Pedro
English 101
October 15, 2014
Access Granted
Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristics code, the computer grants access. Example of biometric devices include fingerprint readers and face recognition systems. A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer.. External fingerprint readers usually plug into a USB port 1to save on desk space, some laptops include build-in fingerprint readers. A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognitions systems to protect the public. Some mobile devices us face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles . Home and business user alike are using biometric security. Through a biometric identifier, such as a fingerprint biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.

Works Cited
Allensmith, Samantha Clare. Understanding Face Recogniton Systems. n.d. Course Technology. Web. 16 Sept. 2014.
Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.
Rossi, Marcell



Cited: Allensmith, Samantha Clare. Understanding Face Recogniton Systems. n.d. Course Technology. Web. 16 Sept. 2014. Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print. Rossi, Marcell Enrico. "How to Use Fingerprint Readers." Digital Security Review Aug. 2014: n. pag. Web. 3 Oct. 2014.

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Wilson , T. V. (2005, November 11). How Biometrics Works. Retrieved November 29, 2013, from HowStuffWorks.com: http://science.howstuffworks.com/biometrics.htm…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer (Rossi). External fingerprint readers usually plug into a USB port. To save on desk space, some laptops include built-in fingerprint readers1.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The CIA/Foreign policy.

    • 4668 Words
    • 19 Pages

    Request fingerprint records by visiting this webpage. And see our overview of fingerprints and how we take them.This white paper was prepared by the Counterintelligence Strategic Partnership Unit of the FBI. This paper is unclassified in its entirety.…

    • 4668 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    References: Dunston, T. & Yager, N. (2008), “Biometric System and Data Analysis: Design, Evolution and Data Mining”, Springer…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This system alone has improved the speed and exactness of the very popular 10 point process of prints. A fingerprint sent by graphic conduction from a crime scene to another place within a state can be processed instantly. This then allows officials to issue all point bulletins with in ample time of a crime being committed. This kind of technology opens up communication with the population to catch a criminal fast and proficiently.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Huopio, Simo 1998; Biometric Identification, Network Security 1998: Biometric Identification; Helsinki University of Technology; http://www.tml.tkk.fi/Opinnot/Tik-110.501/1998/papers/12biometric retrieved 07/15/06…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer (Rossi, 2014). External fingerprint readers usually plug into a USB port. To save on desk space, some laptops include built-in fingerprint readers.1…

    • 325 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Aliahmed

    • 660 Words
    • 3 Pages

    identification and the verification of identity claims. It brings together the promise of other biometric systems, which…

    • 660 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Fast Haar Transform

    • 13040 Words
    • 53 Pages

    In many real-world applications, uni-modal biometric systems often face significant limitations due to sensitivity to noise, interclass variability, data quality, non universality, and other factors. Attempting to improve the performance of individual matchers in such situations may not prove to be highly effective. Multi-biometric systems seek to alleviate some of these problems by providing multiple pieces of evidence of the same identity. These systems help achieve an increase in performance that may not be possible using a single-biometric indicator.…

    • 13040 Words
    • 53 Pages
    Powerful Essays