How biometric security systems is workable in verifying personal identity


In Internet savvy environment and with the upsurge of e-commerce applications, there is a pressing need to install effective security controls in order to shield customer and financial data from unauthorized access.  Biometrics security system is gaining huge popularity in providing security for organization, end users, and IT vendors. Biometric security devices have vital role to verify a person's identity by implementing access control techniques through their irreplaceable biological traits.


 Fundamentally, Biometrics technology uses a physical or psychological traits that can be measured, recorded and quantified. These are used for identification or authentication of person. Biometrics have their own nomenclature and acronyms.


Biometric data comprise of fingerprint scanners, iris scanners and facial recognition systems. Retina scanners use the blood vessels in the back of the eye for authentication. The blood vessel pattern in the back of the eye is unique to the person. Retinal pattern are highly unique as the eyes of identical twins are distinct. But this technique is not commonly accepted for commercial use because it breaks a person's medical secrecy.






The iris scanner, which measures a person's iris pattern, is non-intrusive. Every individual has a different colour pattern in the iris, and therefore, the iris scanner is used to measure these features. There are some basic steps in iris recognition. The first step involves capturing or acquiring an image of the iris. This step is fulfilled by person standing in front of camera


 The camera then takes a picture of the iris using visible or infrared light. The second step is to convert the image to iris code. In this step, the digital image is filtered by an algorithm to map segments of iris into hundreds of vectors called phasors.

The versatility of Iris technology lends itself to virtually any application where identity authentication is required to enhance security. This includes service, purging of fraud.


Facial recognition is also a biometric technique to verify person’s identity. This is an automated way to identify people through their distinct individual facial features. There are some basic steps in facial recognition. First step is to capture a raw biometric by sensing devise. The second step is to extract the distinguishing characteristics from a raw biometric sample and convert into a processed biometric identifier record. The third step is to store or register the processed sample for comparison later for authentication. Last step is to match the sample against a record. The facial recognition software has many applications such as elimination of voter fraud, check chasing identity verification and computer security.



Finger print based identification is the conventional technique. Each person has unique, immutable fingerprints. Installation of fingerprint based biometric security devices in any business company or government organizations can considerably increase the security of electronic devices such as business computers. There are fundamentally two types of finger scanning technologies. One is optical method which begins with visual image of finger. Second technology uses a semiconductor generated electric field to image a finger.
  


  
Finger print technology has wide range of applications. It is used by people to access computer network, to enter restricted area and authorized transactions.

Merits of biometrics over other security devices such as passwords and tokens is that it cannot be lost, stolen or faked. Biometrics successfully provides authentication, non-repudiation, confidentiality and integrity. Other major advantages of installing biometric security systems are that these are efficient and provide accurate results. Additionally, these security system are convenient to use and manageable. The return on investment on a biometric security system is very high. To safeguard the person and company, biometric are used. This system resolves several privacy issues. But it also creates new privacy concern. In order to overcome such problems, positive biometric policies needs to be created. In such policy statements, employer commits to employee to follow through its statement. On the contrary, employee needs to be aware of his/her responsibilities. The employee will provide authentications and moments of recognition to discharge his duties for the employer.

 Appraising key facts, it is settled that biometric security systems is progressively popular viable security option which accurately validate the personnel. Validation process through biometric security systems is based on array of biometric features such as facial and iris recognition, fingerprint scans, and vascular pattern recognition. Biometric security systems offers effectual security alternative for public and private offices. 




Comments

creative writing

Never forget me: High level suspense drama (Sensational film story for shoot)

Invisible supersonic transforming power of PM Narendra Modi to revamp human life

Solar storm: Dreaded warning from space