Está en la página 1de 18

Biometrics

Identity Access Management style Click to edit Master subtitle

4/13/12

Contents
1. 2. 3. 4. 5. 6. 7. 8.

Introduction History Characteristics Factors Modes Working Scope Applications 4/13/12

1. Introduction

Biometrics is a method to uniquely recognize humans on the basis of essential physical and behavioral traits. is the science and technology of measuring and analyzing biological data.
4/13/12

It

2. History
The

history of biometrics dates back to a long time. Possibly the most primary known instance of biometrics in practice was a form of finger printing being used in China in the 14th century, as reported by explorer Joao de Barros. in the recent

Biometric history 4/13/12

3. Characteristics of Biometrics
Universality Uniqueness

each person should have the characteristic. is how well the biometric separates individuals from another. measures how well a biometric resists aging and other variance over time. ease of 4/13/12 acquisition for measurement.

Permanence

Collectability

4. Factors governing Biometrics


1.

Physiological factors
a. b. c. d.

Finger print Face recognition Iris scanning DNA

1.

Behavioral factors
a. b.

Typing speed Voice


4/13/12

5. Modes of Biometrics
1.

Verification A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smart card, username or ID number. Identification A one to many 4/13/12 comparison of the captured

1.

6. Working
The first time an individual uses a biometric system is called an enrollment. During the enrollment, biometric information from an individual is stored. In subsequent uses, biometric information is detected and compared with the information stored at the time of enrollment.
4/13/12

7. Scope
Identity

Access Management

Identity Access Management (IAM) encapsulates people, processes and products to identify and manage the data used in an information system to authenticate users and grant or deny access rights to data and system resources. The goal of IAM is to provide appropriate access to enterprise resources.
4/13/12

Access

Control

Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computerbased information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure.
4/13/12

8. Applications
Biometric

Time Clocks or Biometric time and attendance systems, which are being increasingly used in various organisations to control employee timekeeping. safes and biometric locks, provides security to the homeowners. 4/13/12

Biometric

Biometric

access control systems, providing strong security at entrances. systems are also developed for securing access to pc's and providing single logon facilities. biometrics for high end 4/13/12 security and providing safer

Biometric

Wireless

Applications

of biometrics technology in identifying DNA patterns for identifying criminals, etc. airport security devices are also deployed at some of the world's famous airports to enhance the security standards.
4/13/12

Biometrics

9. Advantages
Increase

security - Provide a convenient and low-cost additional tier of security. fraud by employing hardto-forge technologies and materials.

Reduce

e.g. Minimise the opportunity for ID fraud, buddy punching.


4/13/12

Reduce

password administration

costs.
Replace

hard-to-remember passwords which may be shared or observed. significant cost savings or increasing ROI in areas such as Loss Prevention or Time & 4/13/12 Attendance.

Offer

Integrate

a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access. link an individual to a transaction or event.
4/13/12

Unequivocally

Bibliography
Sites

referred:

About.com Wikipedia.org Techtarget.com

4/13/12

Thanks for watching!

4/13/12

También podría gustarte