Thursday, February 11, 2010

How do biometric system Work? By aryah.net

The term biometrics refers to techniques used to recognize individuals by analyzing their physical and behavioral traits. They are used to boost the level of security and access for information technology. The techniques are split into two categories -- physiological and behavioral.

Aryah.net is the best in selling all types of biometric system Products.

The physiological category is based on the body and its shapes and patterns, including fingerprints, palm design, face recognition and eye recognition. Behavioral biometrics is based on personal behaviors, including vocal recognition and typing.

Physiological biometrics work by analyzing and storing the physical trait to be used for security. Biometrics creates an algorithm, a numeric encryption of the stored trait. The algorithm holds the minute details of the physical trait and looks for matches when the biometric security system is activated.

For example, if it's a retina scan, the biometric system stores the length of connective tissue, rings in the eye and the optical corona. When someone passes through the biometrics, a scanner will "read" the eye and then look for matches against the stored algorithm.

Behavioral biometrics looks for traits of behavior such as voice patterns, hand signatures or typing rhythms. Behavioral biometrics records these traits similar as its physiological counterpart. However, it requires regular updates due to the regular shifts in behavioral traits.

Biometrics works by checking users against a database (a collection of records) of recorded traits. When a user requests verification, the computer holding the database reads the user's traits and compares them. If authorization does not pass, the user is rejected. If authorization passes, the user is then allowed to access the computer or room that was protected.

Biometrics is considered good systems of security. However, the technology is not perfect. It suffers from False Acceptances or False Rejections. A False Acceptance is when an individual is allowed passed the system although they are not a registered user.

This could occur when a person is similar to a user or has copied the user's biological or behavioral information. A False Rejection occurs when a registered user is falsely rejected and not allowed access. This occurs when a user's criteria does not match their stored information. For example, a cold could alter a vocal pattern or pitch.

Biometrics is often used in conjunction with other security systems to resolve rates of False Acceptances and False Rejections.

Passwords, Smart Cards and Token Generators can allow for additional levels of quality assurance. If a false user can get past the biometrics, they may be prompted for a password or smart card which they may not possess. If a registered user is rejected, they may be prompted for a smart card or password, allowing them another chance to enter the system.

No comments:

Post a Comment