Bio HDD

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

BIOMETRICS

The term biometrics is derived from the Greek word bio (life) and metrics ( to measure). A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity. It was first started in 1858 by Sir William Herschel, working for civil service of India, for first systematic capture of hand images identification purposes. Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. BioEnable is India's largest Biometric company with more than 20000 installations, channel network that reach top 100 cities and exports to over 50 countries worldwide.

COMMONLY USED BIOMETRICS


Fingerprint Face Retina Iris Palm print Voice Signature DNA Infrared thermogram Gait Keystroke Odor Ear Hand geometry

MODES OF BIOMETRICS

There are two modes of biometric systems:

VERIFICATION:
Compare a sample against a single stored template This is a method of comparison in which an individual is identified by the system with comparing the current input and an existing database.

IDENTIFICATION:
Search a sample against a database of templates. In this the comparison is in the form of one to many, where any new user comes into the system, the database in updated with the required information.

CHARACTERISTICS OF USEFUL BIOMETRICS


Universality: Every person should possess this characteristic. Uniqueness: No two individuals possess the same characteristic. Permanence: The characteristic does not change in time, that is, it is time invariant. Collectability: The characteristic can be quantitatively measured.

BIOMETRICS CHARACTERISTS CAN BE DIVIDED IN TWO CLASSES. Physiological:


Physiological means related to the shape of the body. The oldest traits, that have been used for more than 100 years, are fingerprints. Other examples are face recognition, hand geometry and iris recognition.

Behavioral:
Behavioral means related to the behavior of a person. The first characteristic to be used, still widely used today, is the signature. More modern approaches are the study of keystroke dynamics and of voice.

BIOMETRIC APPLICATION

IT Security Network-systems of organizations Internet/Intranet

Financial Institutes ATM, Validation of credit and debit cards

Physical Access Control Buildings, Airports, Hospitals, Schools

Law Enforcement Automated Fingerprint Identification System Surveillance

Consumer Market

PC Applications (Mouse, Keyboard, Laptop, etc.) Time and Attendance Monitoring Home Appliances (Door locks, Safes, etc.)

BIOMETRIC SYSTEMS

Biometric systems can seem complicated, but they all use the same three steps:

Enrollment: The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific characteristic.

Storage: Biometric systems analyze your trait and translate it into a code or graph. Some systems also record this data onto a smart card that you carry with you. Because of sensitive nature of this information, this coded information is almost always encrypted and stored.

Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be.

AUTHENTICATION
Definition:
To positively verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system.

There are 3 ways to protect

physical or data access:

1. What you know 2. What you have 3. Who you are

THE THREE FACTORS OF AUTHENTICATION

What you know


Passwords / PIN / Codes

What you have


Smart Cards / Tokens / Keys

Who you are


Biometrics Fingerprint etc

THE THREE WAYS TO PROTECT INFORMATION


Biometrics is the only true protection since the user will be UNIQUELY identified! Smart Cards and Tokens can still be lost, stolen or passed on and the user can not be identified or held responsible Password are historically accepted to attempt protecting computer systems They offer limited protection and no identity management at all !!!

USAGE OF BIOMETRICS.

POSITIVE ATTITUTES ABOUT USING BIOMETRICS


It will be much more difficult for thievesto steal your identity. The use of biometrics for a government issued national I.D. card would make them more secure It will make it much harder for terrorists to operate within the country No memorization of passwords by user. Non transferable.

NEGATIVE ATTITUDES ABOUT USING BIOMETRICS Criminals will find a way around this technology It will be very expensive There is a high potential for government to misuse the information. It will greatly reduce personal privacy because the government will be able to track your movements.

FUTURE OF BIOMETRICS DNA matching National Biometric Database Nat l database of citizens Auto Security No more keys! Active Advertisement Advertisements based on who you are

CONCLUSION
Technology is growing rapidly, but at the same time security breaches and transaction frauds are also in the increase world over. All agencies including Libraries who are in need of security, surveillance and safety have to adopt biometrics.
THE FUTURE DEPENDS ON WHAT WE DO IN THE PRESENT -MAHATMA GANDHI

Let us hope for a safe and secure future!

You might also like