Not yet registered? Create a OverBlog!

Create my blog

The facts about biometric authentication

Have you always been intrigued by biometric authentication devices, but not quite known how they work? This article will discuss all of the basics of the different types of biometric devices. You will get a topical understanding of the basic science behind it, and why these devices are practical in today's world.

Basic biometrics

What does biometric mean? Biometrics are exactly what they sound like: Bio is a word root that always refers to something having to do with life (think about Biology), while metric means measurement. In other words, biometrics uses biological features to "measure" authenticity. When were biometrics invented? The very first biometric system was most likely used tens of thousands of years ago, in a very basic form. What was the first type of biometric? The first type of biometrics was the fingerprint scanner, which is still commonly used by many law enforcement agencies.

Types of biometrics

Using the eye to prove identity One very common method of authentication in high security areas involves using the eye to prove identity. It works by first scanning your retina, and then looking through a retina pattern catalogue. It then attempts to match it to a previous existing entry. Once it does, it is mechanically wired to something, like a door, or it is electronically transmitted to a computer that allows one to gain access.
Facial recognition Similarly, facial recognition works in the same way. For the system to operate correctly, it must first detect the different features on one's face, and record facial distinctions, which does include moles, birth marks, and slight imperfections. Obviously, while this does not scan the retina as closely as retina scanners would, it still records the basic information about the retina. These can be more expensive than retina scanners, as it is more memory intensive. Fingerprint Another common type of biometric identification is the fingerprint. In the mid-twentieth century, the FBI ordered experiments done with this type of biometrics. While this type is used also for logging users into computers, it can easily be spoofed in this regard. It is therefore more commonly used for criminal investigations, where cameras were not present. Fingerprints can also be used as evidence in courts in some countries.

Same category articles Computers

How to use pre wrap tags in CSS

How to use pre wrap tags in css

Html provides the tag pre (which needs both opening and ending tags) to indicate that the wrapped text will maintain all the included character spaces and the line breaks. when not used, html will ignore all such spaces and texts will be presented in a continuous line. this article will present the way in which to apply this in cascading style sheets (css).
Basics of VOIP technology

Basics of voip technology

Voice over internet protocol is the abbreviated form of voip or voice over ip. some of the abbreviated terms used for internet telephony include ip telephony, internet telephony, broadband telephony, and broadband phone.
Where to buy a Canon SLR lens

Where to buy a canon slr lens

Do you own a canon camera? are you wondering where you can find slr lenses for your canon camera? if that is the case, you don’t have to spend your time searching, visiting retail stores and browsing through hundreds of magazines and websites. read the following article and find out all the interesting facts that you need to know about buying canon slr lenses.
Blackberry cell phones: A Review

Blackberry cell phones: a review

The blackberry is a smartphone manufactured by rim (research in motion). it enables users to access email, internet access and other services that are designed to make people more efficient in their daily work. however, deciding to change your current phone to a blackberry should be done with careful considerations of the pros and cons of the blackberry phone.