biometric access control systems

Post on 02-Dec-2014

1.356 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Identity verification in computer systems are done based on measures like keys, cards, passwords, PIN and so on. Unfortunately, these may be forgotten, disclosed, or changed. A reliable and accurate identification or verification technique can be designed using biometric technologies. For more information, please visit; http://www.safe-systems.com

TRANSCRIPT

www.Safe-Systems.com

Biometric Access Control Systems

www.Safe-Systems.com

Identity verification in computer systems are done based on measures like keys, cards, passwords, PIN and so on. Unfortunately, these may be forgotten, disclosed, or changed. A reliable and accurate identification or verification technique can be designed using biometric technologies.

www.Safe-Systems.com

The measurement and analysis of biological data is known as biometrics. The biological data mainly refers to certain unique characteristics of the human body. These unique characteristics include fingerprints, eye retina and iris, DNA, facial patterns, voice patterns, hand measurements, and so on.

www.Safe-Systems.com

A biometric system is a pattern recognition system that makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user.

www.Safe-Systems.com

Today, biometrics has found an application in every walk of life.

In everyday life, it is mostly used as a measure of access control, known as biometric access control. This is used as part of biometric security to restrict access to specific regions as well as to safeguard valuables.

www.Safe-Systems.com

An access control system can be set up based by using any of the bodily characteristics.

Over the years, fingerprints have emerged as the preferred parameter for biometric access control. This is because fingerprints are unique to each individual.

www.Safe-Systems.com

By scientific definition, fingerprints are the impressions left by the ridges present in our fingertips and palms. These ridges have different patterns which vary not only from person to person, but also from finger to finger.

The highly unique nature of fingerprints has led to immense popularity of fingerprint access control. Also, fingerprints are the easiest and fastest way to scan when compared to other characteristics.

www.Safe-Systems.com

Today, most commercial organizations which feel the need to restrict access in their premises, have embraced fingerprint access control. At times, such access control systems are also used to record employee attendance.

www.Safe-Systems.com

To eliminate chances of rejection due to an injury inflicted to one hand, scans of fingers will work for both hands. Entry is allowed or rejected on the basis of acceptance or rejection of both the scan and the number.

The most common implementation of an access control is a fingerprint door lock system. This system usually uses a combination of a fingerprint scan and a pre-assigned unique number to determine whether or not to allow access.

www.Safe-Systems.com

To rule out chances of fingerprint hacking, some new-age door lock systems avoid directly matching a scan with a pre-stored one. Instead, the scan is converted to a binary code which is then matched with a previously encrypted code. This makes the access control system even more reliable.

www.Safe-Systems.com

The advantages of biometric access control systems over their manual counterparts are numerous.

Any possibility of manual error is eliminated.

The scanning process usually takes less than a minute, saving valuable time for both authorities and the entrants.

Use of biometric access control significantly reduces paper or plastic usage and thus contributes to the cause of conservation.

top related