Not yet registered? Create a OverBlog!

Create my blog

The facts about biometric authentication

Have you always been intrigued by biometric authentication devices, but not quite known how they work? This article will discuss all of the basics of the different types of biometric devices. You will get a topical understanding of the basic science behind it, and why these devices are practical in today's world.

Basic biometrics

What does biometric mean? Biometrics are exactly what they sound like: Bio is a word root that always refers to something having to do with life (think about Biology), while metric means measurement. In other words, biometrics uses biological features to "measure" authenticity. When were biometrics invented? The very first biometric system was most likely used tens of thousands of years ago, in a very basic form. What was the first type of biometric? The first type of biometrics was the fingerprint scanner, which is still commonly used by many law enforcement agencies.

Types of biometrics

Using the eye to prove identity One very common method of authentication in high security areas involves using the eye to prove identity. It works by first scanning your retina, and then looking through a retina pattern catalogue. It then attempts to match it to a previous existing entry. Once it does, it is mechanically wired to something, like a door, or it is electronically transmitted to a computer that allows one to gain access.
Facial recognition Similarly, facial recognition works in the same way. For the system to operate correctly, it must first detect the different features on one's face, and record facial distinctions, which does include moles, birth marks, and slight imperfections. Obviously, while this does not scan the retina as closely as retina scanners would, it still records the basic information about the retina. These can be more expensive than retina scanners, as it is more memory intensive. Fingerprint Another common type of biometric identification is the fingerprint. In the mid-twentieth century, the FBI ordered experiments done with this type of biometrics. While this type is used also for logging users into computers, it can easily be spoofed in this regard. It is therefore more commonly used for criminal investigations, where cameras were not present. Fingerprints can also be used as evidence in courts in some countries.

Same category articles Computers

Worldview Technology Partners: The facts

Worldview technology partners: the facts

Worldview technology partners is a leading capital investment firm which focuses on investing in and building leading u.s. technology companies. they have invested in a number of successful companies across a wide range of i.t markets including communications, software and enterprise. this article provides you with an overview of worldview technology partners.
What is the history of Linux?

What is the history of linux?

Linux is the family of unix-like computer operating systems that uses the linux kernel. linux can be installed on a wide variety of computer hardware systems, ranging from mobile phones, tablet computers, routers and video game consoles, to desktop computers, mainframes and supercomputers. this article looks at the history of the company, and provides you with an overview on how it has developed to become the company that it is today.
How to secure a wireless router

How to secure a wireless router

Generally, a brand new wireless router is not yet fully secure and if its default configuration and security settings are not changed by a user, unauthorized parties maybe able to steal confidential information such as passwords and personal files. manufacturers intentionally do not pre-program the configuration to allow users to set up the router by themselves. it is important though that router security is established in order to protect a user's internet and computer system.