Not yet registered? Create a OverBlog!

Create my blog

The facts about biometric authentication

Have you always been intrigued by biometric authentication devices, but not quite known how they work? This article will discuss all of the basics of the different types of biometric devices. You will get a topical understanding of the basic science behind it, and why these devices are practical in today's world.

Basic biometrics

What does biometric mean? Biometrics are exactly what they sound like: Bio is a word root that always refers to something having to do with life (think about Biology), while metric means measurement. In other words, biometrics uses biological features to "measure" authenticity. When were biometrics invented? The very first biometric system was most likely used tens of thousands of years ago, in a very basic form. What was the first type of biometric? The first type of biometrics was the fingerprint scanner, which is still commonly used by many law enforcement agencies.

Types of biometrics

Using the eye to prove identity One very common method of authentication in high security areas involves using the eye to prove identity. It works by first scanning your retina, and then looking through a retina pattern catalogue. It then attempts to match it to a previous existing entry. Once it does, it is mechanically wired to something, like a door, or it is electronically transmitted to a computer that allows one to gain access.
Facial recognition Similarly, facial recognition works in the same way. For the system to operate correctly, it must first detect the different features on one's face, and record facial distinctions, which does include moles, birth marks, and slight imperfections. Obviously, while this does not scan the retina as closely as retina scanners would, it still records the basic information about the retina. These can be more expensive than retina scanners, as it is more memory intensive. Fingerprint Another common type of biometric identification is the fingerprint. In the mid-twentieth century, the FBI ordered experiments done with this type of biometrics. While this type is used also for logging users into computers, it can easily be spoofed in this regard. It is therefore more commonly used for criminal investigations, where cameras were not present. Fingerprints can also be used as evidence in courts in some countries.

Same category articles Computers

The pros and cons of ultra portable laptops

The pros and cons of ultra portable laptops

Ultra portable laptops are trending products and are here to stay. there are a variety of reasons to opt for an ultra portable but the truth is that these new laptops vary greatly in quality. a good knowledge of the pros and cons of these machines will help you make the right purchasing decision.
Where to get a free spyware blocker

Where to get a free spyware blocker

If you have ever had your pc infected with spyware, you know how devastating it can be. there is always uncertainty as to whether you must reformat your computer because there are still traces of the virus, or that you have completely removed the spyware. this article will show you how to block spyware in the first place so that it (hopefully) will never even get on your computer. in this article, find out where to get a free spyware blocker.
Website analysis for SEO

Website analysis for seo

Keywords are important in search engine optimisation (seo), allowing computer browsers to find information that is needed and relevant to the quest for information. discover how you can do a website analysis for seo in this article.
All about: PC specialist

All about: pc specialist

Qualified computer specialists are in demand. regardless of which part of the world you travel to, if you pick up a newspaper and look into the advertisement section under job employment, you will find them flooded with demands for pc specialists. with rapid globalisation, they are a treasured commodity, and their salary demands are very seldom denied. this article details all about pc specialists.