Wednesday, 20 April 2011

biometrics

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.  Among the

features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.   Biometric

technologies are becoming the foundation of an extensive array of highly secure identification and personal verification

solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and

personal verification technologies is becoming apparent. 
Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for

biometrics can be found in federal, state and local governments, in the military, and in commercial applications.

Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial

transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies.

Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application

logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic

transactions is essential to the healthy growth of the global economy. Utilized alone or integrated with other technologies

such as smart cards, encryption keys and digital signatures, biometrics are set to pervade nearly all aspects of the economy

and our daily lives. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate

than current methods (such as the utilization of passwords or PINs). This is because biometrics links the event to a

particular individual (a password or token may be used by someone other than the authorized user), is convenient (nothing to

carry or remember), accurate (it provides for positive authentication), can provide an audit trail and is becoming socially

acceptable and cost effective. More information about biometrics, standards activities, government and industry organizations

and research initiatives on biometrics can be found through out this website.

Biometrics Integrated has specialization in following technologies :

    * Fingerprint Recognition
    * Face Recognition
    * Iris Recognition
    * Voice Recognition
    * Smart Cards
    * Encryption Systems
    * Security Tokens

Fingerprint Recognition is one of the most used and familiar biometric methods. Fingerprint Recognition Technology or

Fingerprint Authentication is a technique of verifying a match between two human fingerprints. In biometrics technologies,

fingerprints are one of many forms of biometrics used to identify an individual and verify their identity. Fingerprint

Recognition Technology has many security application in real world like it can be used in -

    * Network/PC Login Security
    * Web Page Security
    * Employee Recognition Systems
    * Time and Attendance Systems
    * Voting Solutions

Face Recognition is a biometric technique for automatic identification or verification of a person from a digital image or a

video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a

facial database. Face Recognition System is typically used in security systems and can be compared to other biometrics such

as fingerprint or eye iris recognition systems.

Iris Recognition is another biometric authentication method that uses pattern recognition techniques based on high-resolution

images of the irides of an individual's eyes. Converted into digital templates, these images provide mathematical

representations of the iris that yield unambiguous positive identification of an individual. Iris recognition technology has

become popular in security applications because of its ease of use, accuracy, and safety. Its most common use is controlling

access to high-security areas. Iris recognition technology is currently used at physical access points demanding high

security, such as airports, government buildings, and research laboratories.

Voice Recognition or Speaker Recognition is a biometric process of of validating a user's claimed identity using

characteristics extracted from their voices. Thus voice recognition can be an effective technique in user authentication and

identification.

Smart Cards are digital security pocket-sized cards with embedded integrated circuits which can process data. Thus smart

cards can be used for identification, authentication, and data storage. It can also be used as a medium to provide a means of

effecting business transactions in a flexible, secure, standard way with minimal human intervention. Smart card can provide

strong authentication for single sign-on or enterprise single sign-on to computers, laptops, data with encryption, enterprise

resource planning platforms such as SAP, etc...

Encryption Systems on the other hand, use an encryption technique for transforming information (referred to as plaintext)

using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually

referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text).

Encryption Systems can be used to protect data in transit, for example data being transferred via networks (e.g. the

Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank

automatic teller machines. Encryption has long been used by militaries and governments to facilitate secret communication.

Encryption is now commonly used in protecting information within many kinds of civilian systems.

Security Tokens (or sometimes a hardware token, hard token, authentication token, USB token, cryptographic token, or key fob)

are biometric devices which eases authentication for authorized user of computer services. These tokens are also known as

Software Tokens. Security tokens are used to prove one's identity electronically (as in the case of a customer trying to

access their bank account). The token is used in addition to or in place of a password to prove that the customer is who they

claim to be. The token acts like an electronic key to access something.

No comments:

Post a Comment