07-07-2012, 01:13 PM
Seminar On Biometric
biometrics report.pptx (Size: 559.4 KB / Downloads: 48)
Introduction
The term "biometrics" is derived from
the Greek words bio (life) and metric
(to measure). The biometric provides most secure level of authorization.
Identification
Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power and some time if the database is very large. It is often used in determining the identity of a suspect from crime scene information .
Verification
Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information.
How It Works
Biometric devices consist of a reader or scanning device, software that converts the gathered information into digital form, and a database that stores the biometric data for comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database .
biometrics report.pptx (Size: 559.4 KB / Downloads: 48)
Introduction
The term "biometrics" is derived from
the Greek words bio (life) and metric
(to measure). The biometric provides most secure level of authorization.
Identification
Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power and some time if the database is very large. It is often used in determining the identity of a suspect from crime scene information .
Verification
Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information.
How It Works
Biometric devices consist of a reader or scanning device, software that converts the gathered information into digital form, and a database that stores the biometric data for comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database .