Verification occurs when the biometric system asks and attempts to answer the question, “Is this X?” after the user claims to be X. In a verification application, the biometric system requires input from the user, at which time the user claims his identity via a password, which usually is a body part like a hand, eye or a voice command. The user inputs the part into the system and the system finds a match or does not find a match.
Biometric Technology 3
Examples of Biometrics
Retinal Scan
Retinal scanning analyses the layer of blood vessels at the back of the
eye. Scanning involves using a low-intensity light source and an optical
coupler and can read the patterns at a great level of accuracy. It does require
the user to remove glasses, place their eye close to the device, and focus on a
certain point. Whether the accuracy can outweigh the public discomfort is
yet to be seen.
Facial Recognition
Facial recognition analyzes the characteristics of a person's face images
through a digital video camera. It measures the overall facial structure,
including distances between eyes, nose, mouth, and jaw edges. These
measurements are retained in a database and used as a comparison when a
user stands before the camera. This biometric has been widely, and perhaps
wildly, touted as a fantastic system for recognizing potential threats (whether
terrorist, scam artist, or known criminal) but so far has been unproven in
high-level usage. It is currently used in verification only systems with a good
deal of success.
Other types of biometric systems in use today are fingerprints, hand geometry, speaker
recognition, vapor detection and vascular patterns.
Biometric Technology 4
Conclusion
Due to the current security posture of civilian businesses in the world, some are bending an ear to Biometric Technology as a means of controlling entry into their place of work and certain areas which require a higher level of security. This technology is widely used in the military, intelligence and law enforcement sectors as well.
Biometric Technology 5
References
The Gale Group, Inc. (2004) Retina and Iris Scans. Encyclopedia of Espionage, Intelligence, and Security. Retrieved June 17, 2007 from www.wikipedia.org
Rudolph, Terry (1993) The FBI Law Enforcement Bulletin. Retrieved June 17, 2007
from www.articles.com