BLOGGER TEMPLATES AND TWITTER BACKGROUNDS

Monday, September 26, 2011

Biometrics Applications ( Activity 3 )



In today’s technology advancement era, where computers are a necessary nutrient to comply with and serve all the activities, the need for secured, reliable, simple and flexible system has advertently become a challenging concern for the organizations. The technology advancement has been a boon for speedy achievements of activity goals but at the same time the security breaches and transaction frauds are on rise.  Thus, the Biometric Technology has taken its pace to prevent any security breaches and fraudulent. This technique measures unique physiological and behavioral features of individuals to identify and verify them as the right person for the crucial information. The physiological features include face, fingerprints, hand geometry, iris, retinal, DNA etc. and behavioral features include signature, study of keystroke, voice etc.


METHODS OF BIOMETRIC AUTHENTICATION:

•    VERIFICATION: is the process of verifying the user is who they claim to be.
•    IDENTIFICATION: is the process of identifying the user from a set of known users.

0 comments: