Greek words Bios and Metron are the origin of the word biometrics. Bios in Greek mean life and Metron signifies measurement. Now each individual have their own inbuilt behavior and physical traits. These traits can be mixed to spot and verify the individual in a specific manner. The study of the strategies and techniques to uniquely identify and verify the person by validating his inbuilt characteristics is regarded as biometrics security.
Biometric system is sometimes used by the information technology and the software sector. It's used by them mostly as an identity access management system. This system is capable of identifying the allotted individual in a group.
The biometric systems are split into 2 strategies. The strategies are behavior and physiological. Your voice pitch, typing rhythm, voice recognition, and hand movement are examples of behaviour methods. DNA, iris recognition, face recognition, fingerprints, smell, palm and hand geometry authentication etc are examples of physical methods. Both these methods are used in conjunction as per duty to prepare an appropriate biometric system as required.
The human characteristics on certain parameters are utilised by the biometric system. The parameters are permanence, uniqueness, collectability, universality, acceptability, circumvention and acceptability.
Verification and identification are the 2 techniques by which the system works. The person is joined up to the biometric system when he uses it for the first time. This is known as enrolment. During this process the biometric specimen are picked up and stored as template in the biometric database. When the person uses the system in future, the biometric info is caught and verified with the information that's already there in the biometric database in the time of enrolment. The person is then authorized in the secured area after the info matches. The storage and the retrieval technology should be kept highly protected. These are the 2 exposed points in the biometric system. The interface between the system and the individual is perceived as the sensor. The sensor identifies and acquires all the information required for verification and pass on the information to the next processor. This next processor then filters out the unnecessary info accumulated in the process by the sensor. This improves the quality of the content needed by the system. Then the features required by the system are extracted. A template if formed with the extracted info. This template is then matched with the template that is held in the database during the enrolment. Once the information matches the person is allowed access to the prohibited sector or item.
Different analytical strategies are used to determine the performance of the biometric system. They're false reject rate or fake non-match rate, false match rate or false accept rate, crossover mistake rate or equal mistake rate, failure to capture rate, failure to enroll rate, template capacity and receiver operating characteristics. To have an ideal biometric security system, you must have the right sensitivity of the device. For this we need to have minimum fake accept rate and minimum fake reject rate. Security system, you want to have the right sensitivity of the device. For this we want to have minimum fake accept rate and minimum false reject rate.
Discrimination and hacking of the data of the biometric database are the major risks that need to be sorted. The information in the database should be protected.
There is a risk to security for the owner of the biometric system and the secured items. There are possibilities of irrevocable damage cased to the owner by the miscreants.
Biometric system is the way forward for security mechanisms in the times ahead.
Biometric system is sometimes used by the information technology and the software sector. It's used by them mostly as an identity access management system. This system is capable of identifying the allotted individual in a group.
The biometric systems are split into 2 strategies. The strategies are behavior and physiological. Your voice pitch, typing rhythm, voice recognition, and hand movement are examples of behaviour methods. DNA, iris recognition, face recognition, fingerprints, smell, palm and hand geometry authentication etc are examples of physical methods. Both these methods are used in conjunction as per duty to prepare an appropriate biometric system as required.
The human characteristics on certain parameters are utilised by the biometric system. The parameters are permanence, uniqueness, collectability, universality, acceptability, circumvention and acceptability.
Verification and identification are the 2 techniques by which the system works. The person is joined up to the biometric system when he uses it for the first time. This is known as enrolment. During this process the biometric specimen are picked up and stored as template in the biometric database. When the person uses the system in future, the biometric info is caught and verified with the information that's already there in the biometric database in the time of enrolment. The person is then authorized in the secured area after the info matches. The storage and the retrieval technology should be kept highly protected. These are the 2 exposed points in the biometric system. The interface between the system and the individual is perceived as the sensor. The sensor identifies and acquires all the information required for verification and pass on the information to the next processor. This next processor then filters out the unnecessary info accumulated in the process by the sensor. This improves the quality of the content needed by the system. Then the features required by the system are extracted. A template if formed with the extracted info. This template is then matched with the template that is held in the database during the enrolment. Once the information matches the person is allowed access to the prohibited sector or item.
Different analytical strategies are used to determine the performance of the biometric system. They're false reject rate or fake non-match rate, false match rate or false accept rate, crossover mistake rate or equal mistake rate, failure to capture rate, failure to enroll rate, template capacity and receiver operating characteristics. To have an ideal biometric security system, you must have the right sensitivity of the device. For this we need to have minimum fake accept rate and minimum fake reject rate. Security system, you want to have the right sensitivity of the device. For this we want to have minimum fake accept rate and minimum false reject rate.
Discrimination and hacking of the data of the biometric database are the major risks that need to be sorted. The information in the database should be protected.
There is a risk to security for the owner of the biometric system and the secured items. There are possibilities of irrevocable damage cased to the owner by the miscreants.
Biometric system is the way forward for security mechanisms in the times ahead.
About the Author:
Security can be very challenging. Before you invest in an expensive biometric security system, go to Access Security to get more information on access control biometric readers and card access control systems. Visit us today!
No comments:
Post a Comment