Bio metric authentication - Onlineassignmenthelp.com.au

Page 1

Bio metric Authentication Privacy Implications Executive Summary

Security

And

Weak and frequently used passwords are quite unfashionable now for any of the social sites or the payment gateway system because of the ease in cracking these passwords by the hackers. They find cracking the passwords an easy task for any site or account. The effectiveness of the password security system has outlived its life and has given origin to the biometric authentication system, which simply relies on the physical identification system, which cannot be tracked or duplicated in any way by the intruders. This full proof approach for the security solutions has impressed all the industries in the market.

Introduction Biometric authentication is related to the human identification metrics, which is derived from the biological and behavioral characteristics of the human. Some of the commonly used biological characteristics are fingerprint scan, palm veins pattern, voice recognition, face pattern recognition, iris recognition. The biometric sensor authenticates the device with the identification metric method. Most of the people rely on the biological identification features rather than the behavioral as they are more unique and secured form of protocols. This verification system matches the current data of the biometrics to the stored one in the database to authenticate the user. Once the authentication is confirmed, the user can gain the access over the data.

Background The bio metric authentication came in to being in 1891 when Juan Vucetich started taking fingerprints of the criminals for the better research of the case. Fingerprinting is the oldest method of verification initially used by the China for the identification purposes. Further, in 1892, Galton proposed a theory for the classification of fingerprints based on the pattern of all fingers. After various researches, in 1974, the first hand geometry system came in the market for three main purposes as physical identification, physical access control and time and attendance.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.