Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Biometric Systems - College Essays

Biometric Systems


As defined in Computer Security Basics by O'Reilly & Associates, Inc.
Biometrics is the use of a persons unique physiological, behavioral, and
morphological characteristics to provide positive personal identification.
that are currently avaiable today examine fingerprints,
handprints, and retina patterns. Systems that are close to biometrics but are
not classified as such are behavioral systems such as voice, signature and
keystroke systems. They test patterns of behavior not parts of the body.
It seems that in the world of biometrics that the more effective the
device, the less willing people will be to accept it. Retina pattern devices
are the most reliable but most people hate the ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

to allow students
to get their meals, and in a Maryland day care center to ensure that the right
person picks up the right child. In Los Angeles, they are using fingerprints to
stop welfare fraud. And they're also being used by frequent business travellers
for rapid transit through immigration and customs in Holland, and now at JFK and
Newark airports in the United States. It could also be used to simply prevent
one employee from "punching in" for some one else, or to prevent someone from
opening up an account at a bank using a false name. Then there is also the
security access market, access to computer databases, to premises and a variety
of other areas.
The Sentry program made by Fingerprint Technologies uses several devices
at once. The system first prompts for a user name and password. Then they must
have their fingerprint scan match what is on record. They can also use a video
camera for real time video to capture photographs which can be incorporated into
the data ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Biometric Systems. (2005, December 21). Retrieved November 30, 2024, from http://www.essayworld.com/essays/Biometric-Systems/38316
"Biometric Systems." Essayworld.com. Essayworld.com, 21 Dec. 2005. Web. 30 Nov. 2024. <http://www.essayworld.com/essays/Biometric-Systems/38316>
"Biometric Systems." Essayworld.com. December 21, 2005. Accessed November 30, 2024. http://www.essayworld.com/essays/Biometric-Systems/38316.
"Biometric Systems." Essayworld.com. December 21, 2005. Accessed November 30, 2024. http://www.essayworld.com/essays/Biometric-Systems/38316.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 12/21/2005 01:52:54 AM
Category: Computers
Type: Premium Paper
Words: 484
Pages: 2

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Iris Recognition An Emerging Bi...
Computer Protection
Computer Security
Protecting A Computer
Computer Security
Security 2
Computer Security
Computer Security
Fingerprints
Domestic Surveillance
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved