Not yet registered? Create a OverBlog!

Create my blog

The facts about biometric authentication

Have you always been intrigued by biometric authentication devices, but not quite known how they work? This article will discuss all of the basics of the different types of biometric devices. You will get a topical understanding of the basic science behind it, and why these devices are practical in today's world.

Basic biometrics

What does biometric mean? Biometrics are exactly what they sound like: Bio is a word root that always refers to something having to do with life (think about Biology), while metric means measurement. In other words, biometrics uses biological features to "measure" authenticity. When were biometrics invented? The very first biometric system was most likely used tens of thousands of years ago, in a very basic form. What was the first type of biometric? The first type of biometrics was the fingerprint scanner, which is still commonly used by many law enforcement agencies.

Types of biometrics

Using the eye to prove identity One very common method of authentication in high security areas involves using the eye to prove identity. It works by first scanning your retina, and then looking through a retina pattern catalogue. It then attempts to match it to a previous existing entry. Once it does, it is mechanically wired to something, like a door, or it is electronically transmitted to a computer that allows one to gain access.
Facial recognition Similarly, facial recognition works in the same way. For the system to operate correctly, it must first detect the different features on one's face, and record facial distinctions, which does include moles, birth marks, and slight imperfections. Obviously, while this does not scan the retina as closely as retina scanners would, it still records the basic information about the retina. These can be more expensive than retina scanners, as it is more memory intensive. Fingerprint Another common type of biometric identification is the fingerprint. In the mid-twentieth century, the FBI ordered experiments done with this type of biometrics. While this type is used also for logging users into computers, it can easily be spoofed in this regard. It is therefore more commonly used for criminal investigations, where cameras were not present. Fingerprints can also be used as evidence in courts in some countries.

Same category articles Computers

Where to download a free adware remover

Where to download a free adware remover

Adware belongs in the same sort of group as other horrible things such as viruses, trojans, malware etc. etc. which do nothing but cause your pc problems, be it from slowing it down to a crawl to not even starting up. here, we will show you some places to get hold of free adware remove software.
Where to buy computer memory sticks

Where to buy computer memory sticks

With the easy transfer of computer files and data becoming increasingly important in modern society, not to mention the fact that file sizes are becoming increasingly too large and too impractical to fit on optical media, then the use of memory sticks is becoming ever more important. this article shall be looking at where to buy computer memory sticks.
What is phishing and how can it be avoided?

What is phishing and how can it be avoided?

Phishing is the name given to a particular type of internet scam that is used primarily by criminals and hackers in order for them to try and obtain personal and valuable information about people that can then be used in various different ways. i shall be discussing what phishing is and how best to avoid it.
A guide to CD labelling

A guide to cd labelling

Whilst labelling disks may sometimes seem like a laborious process, it is nonetheless a very important one. when one has too many disks that aren’t labelled, it can be difficult, if not impossible, to sort through them and to find the needed information. here is a brief guide on the different ways in which to efficiently label cds for personal organsation and use.