Biometrics and Wireless Technology

Undergraduate
Essay
Miscellaneous
Pages 7 (1757 words)
Download 0
We are living in a world where personal identification standards are rising higher and higher by the day. Biometric technology is fast becoming the identification process. It's processing is based on the unique physiological and behavioural characteristics that human beings possess…

Introduction


This technology is now the more favoured method of identification over traditional methods like password and PIN identifications. High numbers of passwords and PINs are generated on a daily basis as more and more people are settling in with the pace of technology. These PINs and passwords are saved electronically on database servers, which at some point may run out of space. In this scenario, the better choice for a person is to be her or his own password. In today's market many types of biometrical identification tools are available such as fingerprinting, face recognition, finger and hand geometry, iris recognition, voice and signature recognition (von Graevenitz 2003).
Biometric data collected using sensors are converted to digital formats for storage into computer databases. Fingerprinting biometrics has been long in use by the crime solving agencies and immigration authorities. However, technologies to use iris, face, and voice for recognition are still in their infancy.
According to the founder and chairperson of CardTech/SecurTech, Ben Miller, biometric technologies have been in use since 1968. The University of Georgia was a pioneer in the use of biometric technology when in 1973 the university set up a hand-scanning system that helped restrict entry into its all-you-can-eat dining halls.
Fingerprinting, iris recognition, retina recognition, face recognition, and hand recognition have been successfully imple ...
Download paper
Not exactly what you need?

Related papers

Wireless LAN Technology and its construction
This report presents a clear comparison between the products that are available and the kind of usage that is possible with them. While some of the standards are stable and are usable in multiple environments, it is not the same with equipments that comply to a different standard. The report also presents advantages - disadvantages map between the standards that are existing and the reason why…
Wireless Network technology
First is the GSM or Global System for Mobile Communications. GSM has 3 systems, the switching system, the base station system, and the operation and support system. Next is the PCS or Personal Communications Service. Sprint is said to be the first who used this kind of system. Last is the D-AMPS or the Digital Advanced Mobile Phone Service. This is the new version of AMPS. …
Biometrics and Wireless Technologies
Dominant security-enhancement technologies leave a lot to be desired. In addition to security risks, has been estimated that between half to a third of calls to IT help desks are password related, and that managing multiple passwords and password resetting costs can range between $200 (Forrester Research estimate) to $340 (Gartner estimate) per employee per year (www.Forrester.com (2005);…
Wireless Technology in the Educational System
This is akin to the view that mobile devices serves as a "platform for collaborative modeling" (N. Pinkwart, 2003). This collaborative and interactive environment is also made possible by a device called the wireless sensor network technology which forms a sensor node that enables people to "communicate with each other to collect and move data toward a central entity for further processing"…
Wireless Technology and its Impact on Computer Networking
One need not go into the depth and the history of this achievement but move on towards a more current realization, the accomplishment which is more conveniently termed as an industry due to its sheer magnitude and relative importance. According to Kaveh Pahalavan and Prashan Krishnamurthy, "it owns the largest market share, and it has enabled us to change our lifestyles by entering the information…
Biometrics and Wireless Technology
This technology is now the more favoured method of identification over traditional methods like password and PIN identifications. High numbers of passwords and PINs are generated on a daily basis as more and more people are settling in with the pace of technology. These PINs and passwords are saved electronically on database servers, which at some point may run out of space. In this scenario, the…