How biometric security systems is workable in verifying personal identity
In Internet savvy environment and with the upsurge of
e-commerce applications, there is a pressing need to install effective security
controls in order to shield customer and financial data from unauthorized
access. Biometrics security system is
gaining huge popularity in providing security for organization, end users, and
IT vendors. Biometric security devices have vital role to verify a person's
identity by implementing access control techniques through their irreplaceable
biological traits.
Biometric data comprise of fingerprint scanners, iris
scanners and facial recognition systems. Retina scanners use the blood vessels
in the back of the eye for authentication. The blood vessel pattern in the back
of the eye is unique to the person. Retinal pattern are highly unique as the
eyes of identical twins are distinct. But this technique is not commonly accepted
for commercial use because it breaks a person's medical secrecy.
The iris scanner, which measures a person's iris pattern,
is non-intrusive. Every individual has a different colour pattern in the iris,
and therefore, the iris scanner is used to measure these features. There are
some basic steps in iris recognition. The first step involves capturing or
acquiring an image of the iris. This step is fulfilled by person standing in
front of camera
The versatility of Iris technology lends itself to
virtually any application where identity authentication is required to enhance
security. This includes service, purging of fraud.
Facial recognition is also a biometric technique to
verify person’s identity. This is an automated way to identify people through
their distinct individual facial features. There are some basic steps in facial
recognition. First step is to capture a raw biometric by sensing devise. The
second step is to extract the distinguishing characteristics from a raw
biometric sample and convert into a processed biometric identifier record. The
third step is to store or register the processed sample for comparison later
for authentication. Last step is to match the sample against a record. The
facial recognition software has many applications such as elimination of voter
fraud, check chasing identity verification and computer security.
Finger print based identification is the conventional
technique. Each person has unique, immutable fingerprints. Installation of
fingerprint based biometric security devices in any business company or government
organizations can considerably increase the security of electronic devices such
as business computers. There are fundamentally two types of finger scanning
technologies. One is optical method which begins with visual image of finger.
Second technology uses a semiconductor generated electric field to image a
finger.
Finger print technology has wide range of applications.
It is used by people to access computer network, to enter restricted area and
authorized transactions.
Merits of biometrics over other security devices such as
passwords and tokens is that it cannot be lost, stolen or faked. Biometrics
successfully provides authentication, non-repudiation, confidentiality and
integrity. Other major advantages of installing biometric security systems are
that these are efficient and provide accurate results. Additionally, these
security system are convenient to use and manageable. The return on investment
on a biometric security system is very high. To safeguard the person and
company, biometric are used. This system resolves several privacy issues. But
it also creates new privacy concern. In order to overcome such problems,
positive biometric policies needs to be created. In such policy statements,
employer commits to employee to follow through its statement. On the contrary,
employee needs to be aware of his/her responsibilities. The employee will
provide authentications and moments of recognition to discharge his duties for
the employer.
Appraising key facts, it is settled that biometric
security systems is progressively popular viable security option which
accurately validate the personnel. Validation process through biometric
security systems is based on array of biometric features such as facial and
iris recognition, fingerprint scans, and vascular pattern recognition.
Biometric security systems offers effectual security alternative for public and
private offices.
Comments
Post a Comment