Biometrics News and Events, Travel BioMetrics - News Alerts, BioSpace News for Pacific Biometrics, Wired News-Learning to Live With Biometrics
Time attendance and Security news, Time attendance News and Events,Time attendance - News Alerts, Time attendance News for Pacific , Time attendance news - Learning to Live With Time attendance

biometrics news, Biometrics and Security news,Biometrics News and Events, Travel BioMetrics - News Alerts, BioSpace News for Pacific Biometrics, Wired News- Learning to Live With Biometrics, Biometrics News, Biometrics Case Studies and Biometrics Events, Access control news, Time attendance news, Time attendance and Security news, Time attendance News and Events,Time attendance - News Alerts, Time attendance News for Pacific , Time attendance news - Learning to Live With Time attendance, Time attendance News, Time attendance Case Studies and Time attendance Events, Access control News and Events, Access control - News Alerts, Access control News for Pacific , Access control news - Learning to Live With Access control, Access control News, Access control Case Studies and Access control Events, news media, news, fox news, yahoo news, newport news, bbc news, cnn news, abc news, daily news, dallas morning news, sporting news, cbs news, aol news, top news, naked news, detroit news, world news, local news, new york daily news, nbc news, us news, wrestling news, science news, breaking news, google news, buffalo news, news server, san jose mercury news, health news, rocky mountain news, the journal news, haiti news, weird news, ny daily news, dayton daily news, sports news, san antonio express news, sky news, business news, news and observer, news photo, bargain news, medical news, birmingham news, political news, us news and world report, funny news, msnbc news, good news, sri lanka news, florida news, msn news, entertainment news, deseret news, dallas news, india news, taiwan news, the news herald, 5 channel news, kenya news, pensacola news journal, latest news, tacoma news tribune, headline news, international news, aint it cool news, cnn headline news, environmental news, philadelphia daily news, anchorage daily news, boxing news, israel news, music news, news 12, hockey news, bangor daily news, viet nam news, 9 bay news, news wwe, religious news, springfield news leader, bbc world news, china news, chicago news, cbc news, hemmings motor news, national news, houston news, mercury news, mtv news, amarillo globe news, duluth news tribune, nfl news, news magazine, malaysia news, knoxville news sentinel, arab news, pakistan news, hawaii news, 4 channel news

 
   Home |  About Us |  Services |  Products |  Solutions |  Support  | Partners |  News |  Contact Us

 
Home News
     
   
 Articles published on websites
  Date: 22 Mar. 2004

Determining which biometric technology is right for you

Biometrics, a security technology that uses some human physical feature for identification purposes, stands (or falls) on four legs: hardware, security level, integration with applications or operating systems, and user acceptance. Unless biometrics can meet your minimum requirements in all four areas, you should reject it.

Of the four criteria, hardware is probably the simplest to grant a passing grade. There are many kinds of biometric hardware that are inexpensive and interface fairly easily with various software platforms.

In choosing to go with a form of biometrics, you must balance the freedom from the much-hated (and often misused) password with the extra cost associated with adding hardware to the desktop (or perhaps many desktops).

It's fairly simple to integrate biometric software with development platforms, but the details vary so much depending on the application and operating environment that itís difficult to go into specifics here. Before you begin, you need to check to see if the appropriate APIs are available.

You also need to look at user acceptance. If a particular technology canít provide a high degree of security with low error rates, you can't use it anyway. Too many calls to the help desk wonít win biometric technology any friends in management or among users.

Now let's look at a few biometric technologies, keeping these four criteria in mind. But first, you need to learn two terms commonly used in biometrics: FAR (False Acceptance Rate) and FRR (False Rejection Rate). FAR is a measure of how secure the system is (i.e., how often an imposter will be accepted as legitimate), and FRR is a measure of how often a legitimate user is not authenticated properly.

Face and voice recognition
Face recognition and voice recognition are the most popular biometrics technologies with users. However, face recognition requires expensive hardware and a complex physical setup, while voice recognition scores poorly on both FAR and FRR.
In the real world, face recognition is very processor-intensive and requires an expensive camera with special lighting and careful installation to work really well.

Iris scanning
The most secure and commonly available biometric system is based on the unique pattern of a personís iris (for an example of this technology, see the James Bond movie Never Say Never Again). Users often strongly resist this very invasive technology; it's also expensive and takes up a lot of space. Therefore, iris scanning technology is best suited for physical-access control rather than software-access control.
Fingerprint recognition
Fingerprint recognition has been around longer than any other biometric technology. (I actually evaluated PC-access fingerprint systems more than a decade ago, and they were usable even then.)

Today, USB ports and ever-increasing processor speed make this the best choice for most application or hardware access control. Fingerprint recognition is by far the most cost-effective, reliable, easiest to implement, and the best overall choice for the majority of applications where desktop-level user authentication is required. The only time that fingerprint recognition isn't the clear choice is when extremely high security is required.

Remember to remind administrators to have users ďenrollĒ a minimum of two fingers (although registering all ten is best) on different hands to minimize lockouts from such minor problems as paper cuts.

Users are sometimes reluctant about fingerprint recognition technology, primarily because law enforcement uses fingerprints. This may be easy to overcome by reminding users that their fingerprints are all over their workstation already if someone really wants to capture them. If that fails, tell them that the best alternative is the regularly changing password. There are so many objections to the use of passwords that it makes biometric technology a very attractive authentication alternative.

One final point to remember is that most biometric technology can be adjusted at the software level to tweak both the FAR and FRR, depending on the required security level.

Recommended reading
Paul Reidís Biometrics and Network Security explains the various factors in choosing a biometric technology. This book may be useful for planning a new project, although developers should be aware that this text deals with costs, reliability, and user acceptance rather than how to interface with your applications.
 
Content in this page has been taken from IBGweb, Find Biometrics and other resources, the copyrights are owned by the respective owners.
 
 
   

Home |  About Us |  Services |  Products |  Solutions |  Support  | Partners |  News |  Contact Us

     
   

:: Useful Links ::

 Biometrics  Fingerprints  Fingerprint Scanners USB  Biometrics Time Attendance
 Access Control  Biometric Security  OEM Fingerprint Sensors  Software Development Kit
 Biometric solutions  Biometrics services  Fingerprints Readers  Fingerprints Standalone  Modules
 Biometric Product  Fingerprints products  Time Recorders  Biometrics Fingerprints Software
 Time Attendance  Fingerprints Time Attendance  Biometrics Access control  Fingerprints Access Control

Chip Silicon IC Semiconductors BioEnable Biometrics Biometrics India
Access controllers Biometrics Resources Time Attendance Recorders Wireless Security

 

Sitemap | © Bioenable Technologies Pvt. Ltd. 2004-2005