Biometric Security Systems
Access Control, Fingerprint, Biometric Security
Biometric security (identification) systems identify a human from
a measurement of a physical characteristic or behavioral trait (for
example, hand geometry, retinal scan, iris scan, fingerprint patterns,
facial characteristics, DNA sequence characteristics, voice prints,
and hand written signature) to determine or verify an identity. There
is typically an enrollment process in which the biological information
is taken and stored in a database for future identification or verification
purposes. Because biometric security technology relies on biological information
about a person, it is typically thought of as more reliable than other
identification methods. There are several different types of biometric
- Facial Recognition technology identifies individuals
by analyzing certain facial characteristics such as the distance
between the eyes, the length of the nose, and the angle of the
jaw. Facial recognition works for both verification and identification
and is often used for surveillance purposes.
- Fingerprint Recognition is the most widely
used method of biometric authentication. Fingerprint recognition
is based on features found in the impressions made by unique ridges
and valleys on the surface of a human's fingertips.
- Hand Geometry is based on the measurement and
analysis of the shape of a person's hand. Unlike fingerprints,
the human hand is not descriptive enough for identification. However,
it can be used for verification by combining various individual
features, such as width, height, and length of the fingers, or
distance between joints.
- Iris Recognition is the process of recognizing
a person by analyzing the distinctly colored ring that surrounds
the pupil of the eye. With more than 250 unique characteristics,
the iris is believed to go unchanged throughout a person's lifespan.
This technology is typically used for access control into a facility.
- Voice Recognition technology is a biometric
security technology used to uniquely identify individuals based
on the different characteristics in their voice such as tone,
pitch, cadence, etc. The system captures samples of the individual's
speech and then converts them to an electronic format to create
a biometric template.
©2006 Seenex Inc. All rights reserved. Biometric Security
, Biometric Security