“Biometric technologies are defined as "automated methods of identifying or authenticating the identity of a living person based on a physical or behavioral characteristic."(Source #1) Growing up I loved to watch McGyver. He use to run around and break in and out of military compounds that were equipped with all types of security systems. Somehow he would always find the laser beams, or trick the fingerprint security, or voice activation. During that time biometrics was just beginning to come to the surface. Nowadays systems enabled with fingerprinting security, voice activation, or face recognition have come a long way and are close to fool proof.
Biometrics have come even as far to be used at the Super Bowl or other huge sporting events. Cameras have been designed to monitor crowds and be able to take faces and run them through national criminal databases to see if any matches occur. Biometrics is the security of today and tomorrow. In this paper I will explain different types of biometric security systems, mainly fingerprint activation, and give a thourugh explanation of when it was created, who created it, how the product has evolved and where the product is going.
Among all the biometric techniques, fingerprint based identification is the oldest and most familiar method. Fingerprints were first recognised as unique in 1684. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by this pattern of ridges and furrows. The fingerprint scanner captures an image of the fingerprint and uses complex algorithms to either convert the image into a unique "map" of minutiae points or analyze the pattern. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation (split) or a ridge ending.This technique reads specific fingerprint 'ridge' characteristics and assigns an (x,y) coordinate. In most countries, a minimum of twelve of these points are legally required for positive identification in a criminal case, a typical biometric fingerprint reader can record in excess of 40 points. Only the data containing the location of the points of minutiae is stored in the template, not the actual fingerprint image. This keeps the file size to a minimum and helps prevent fraud, as a fingerprint cannot be recreated from the stored template. CSS total security based in the UK has created two different fingerprint readers that allow total security to Laptop PC users. The BioTouch PC Card Fingerprint Reader is state of the art technology. It allows only you to log on to your laptop computer. You simply press the fingerprint reader on the side of your laptop, the reader pops out, you press you finger against the reader. The reader then verifies your fingerprint then you simply press it back in. Another product that CSS Total Security has created is the...