Greek words Bios and Metron are the origin of the word biometrics. Bios in Greek mean life and Metron signifies measurement. Now every individual have their own inbuilt behavioral and physical features. These features can be mixed to spot and confirm the individual in a specific manner. The study of the techniques and strategies to uniquely identify and confirm the person by validating his intrinsic features is perceived as biometrics security.
The biometric system is more often used in the software and info technology sector. It is used as an identity access management technology. This system can also identify a particular individual from the group.
Biometric systems are broadly classified as behavior and physiological. Physical means related to our body. It ranges from fingerprints, face recognition, DNA, iris recognition, smell, hand and palm recognition and so on. Typing rhythm, voice recognition are the features of behavior part of the individual. Both of the traits can be used together to prepare a biometric security system.
The human characteristics on certain parameters are used by the biometric system. The parameters are permanence, uniqueness, collectability, universality, acceptability, circumvention and acceptability.
Verification and identification are the 2 methods by which the system works. The person is signed up to the biometric system when he employs it for the 1st time. This is regarded as enrolment. During this process the biometric specimen are picked up and stored as template in the biometric database. When the person uses the system in future, the biometric information is caught and determined with the information that is already there in the biometric database during the time of enrolment. The person is then authorized in the secured area after the data matches. The storage and the retrieval technology should be kept highly protected. These are the two exposed points in the biometric system. The interface between the system and the individual is thought of as the sensor. The sensor identifies and acquires all the data needed for verification and pass on the information to the subsequent processor. This next processor then filters out the pointless information accumulated in the process by the sensor. This improves the standard of the content required by the system. Then the features required by the system are extracted. A template if formed with the extracted info. This template is then coupled with the template that is kept in the database during the enrolment. Once the info matches the person is allowed access to the restricted sector or item.
Different analytical methods are used to measure the performance of the biometric system. They're fake reject rate or false non-match rate, false match rate or fake accept rate, crossover error rate or equal mistake rate, failure to capture rate, failure to enroll rate, template capacity and receiver operating characteristics. To have an ideal biometric security system, you want to have the right sensitivity of the device. For this we want to have minimum false accept rate and minimum fake reject rate. Security system, you want to have the right sensitivity of the device. For this we want to have minimum false accept rate and minimum fake reject rate.
Biometric systems should be employed in such a way that there shouldn't be any discrimination and bad use of the info stored in the database of the individuals.
Biometric system can pose danger to the owners of the secured items. The intention to get the secured access can end up in an irreversible damage to the owner by the miscreant. There are incidents of owner's fingers being cut off for gaining access to the secured sector determined by fingerprint scan.
Biometric system is the future of security mechanisms in the times ahead.
The biometric system is more often used in the software and info technology sector. It is used as an identity access management technology. This system can also identify a particular individual from the group.
Biometric systems are broadly classified as behavior and physiological. Physical means related to our body. It ranges from fingerprints, face recognition, DNA, iris recognition, smell, hand and palm recognition and so on. Typing rhythm, voice recognition are the features of behavior part of the individual. Both of the traits can be used together to prepare a biometric security system.
The human characteristics on certain parameters are used by the biometric system. The parameters are permanence, uniqueness, collectability, universality, acceptability, circumvention and acceptability.
Verification and identification are the 2 methods by which the system works. The person is signed up to the biometric system when he employs it for the 1st time. This is regarded as enrolment. During this process the biometric specimen are picked up and stored as template in the biometric database. When the person uses the system in future, the biometric information is caught and determined with the information that is already there in the biometric database during the time of enrolment. The person is then authorized in the secured area after the data matches. The storage and the retrieval technology should be kept highly protected. These are the two exposed points in the biometric system. The interface between the system and the individual is thought of as the sensor. The sensor identifies and acquires all the data needed for verification and pass on the information to the subsequent processor. This next processor then filters out the pointless information accumulated in the process by the sensor. This improves the standard of the content required by the system. Then the features required by the system are extracted. A template if formed with the extracted info. This template is then coupled with the template that is kept in the database during the enrolment. Once the info matches the person is allowed access to the restricted sector or item.
Different analytical methods are used to measure the performance of the biometric system. They're fake reject rate or false non-match rate, false match rate or fake accept rate, crossover error rate or equal mistake rate, failure to capture rate, failure to enroll rate, template capacity and receiver operating characteristics. To have an ideal biometric security system, you want to have the right sensitivity of the device. For this we want to have minimum false accept rate and minimum fake reject rate. Security system, you want to have the right sensitivity of the device. For this we want to have minimum false accept rate and minimum fake reject rate.
Biometric systems should be employed in such a way that there shouldn't be any discrimination and bad use of the info stored in the database of the individuals.
Biometric system can pose danger to the owners of the secured items. The intention to get the secured access can end up in an irreversible damage to the owner by the miscreant. There are incidents of owner's fingers being cut off for gaining access to the secured sector determined by fingerprint scan.
Biometric system is the future of security mechanisms in the times ahead.
About the Author:
Modern day security can be very challenging. Before you invest in expensive security systems, go to Access Security, to get more information on biometric security system and provides integrated security systems. Visit us today!
No comments:
Post a Comment