Biometric Technology 1

Biometric Technology:  Entry Control

Rick Everroad

Professor Jeffrey Fowler

RC 507

October 12, 2008

     

Biometric Technology 2

Biometric Technology:  Entry Control

          Biometric Technology is used for human recognition which consists of identification and verification to establish entry into secure areas.  The terms differ significantly.  With identification, the biometric system asks and attempts to answer the question, “Who is X.”  In an identification application, the biometric reader reads a sample of the person in question and compares his traits to all the traits found in the system’s database.  Depending on how the system is designed, it can make a “best” match, or it can score possible matches and rank them according to likelihood.  Identification applications are common when the goal is to identify criminals, terrorists or any other person attempting entry to a controlled area, particularly through surveillance.

Join now!

     Verification occurs when the biometric system asks and attempts to answer the question, “Is this X?” after the user claims to be X.  In a verification application, the biometric system requires input from the user, at which time the user claims his identity via a password, which usually is a body part like a hand, eye or a voice command.  The user inputs the part into the system and the system finds a match or does not find a match.

Biometric Technology 3

Examples of Biometrics

Retinal Scan

     Retinal ...

This is a preview of the whole essay