Biometric Technology FAQ
Computers & Technology → Technology
- Author Thomas Boggo
- Published April 26, 2007
- Word count 568
Biometric technology uses intrinsic human characteristics such as fingerprints, handprints, facial characteristics, irises or retinas in the eyes, voice, and many other things for identification purposes. Biometrics security systems are growing rapidly because they are considered more secure than conventional security systems. After all it's much more difficult to steal or duplicated a fingerprint than it is to do the same with a key or a password.
That's a brief overview of biometric technology and here are some frequently asked questions:
- Can fingerprints be stolen or copied from biometric database?
Absolutely not. First of all only templates are stored in the database. Secondly, only a tiny subset of the characteristics of the fingerprint are extracted and stored in the template when the finger is scanned. The template stored in the database holds enough information to verify the finger presented is yours when your finger is scanned in the future but the entire image of the fingerprint is not stored so there is no way to copy or steal fingerprints from the database.
- Can biometric systems be fooled with replica fingerprints?
Yes, it is possible but not likely to fool biometric systems and if the system is fooled it will happen only once. In addition to recognizing fingerprints, biometric systems are sophisticated enough to recognize body temperature and blood flow to make sure the finger presented is from a live human being and not just a molded replica. Secondly, fingerprints are never exactly the same twice due to human factors. The fingerprints will be similar enough to identify individuals when scanned but if an exact replica of a previously scanned fingerprint is scanned again, the biometric system will know it and deny access.
- What's the enrollment capacity of biometric databases?
When authorized users present biometric data to be used for future identification by the database, they are said to be "enrolled." The answer as to how many can be enrolled depends on the system. It could be as few as 10 or as many as 3,000. However if capacity is reached it's not difficult to increase capacity if nothing else by using an offsite database with a larger capacity. Existing technology allows for quick retrieval of data even if the database is thousands of miles away in another state.
- How quickly can a fingerprint be identified by a biometric system?
The speed at which fingerprints are identified is dependent on two factors. The first factor is the speed or processing power of the system. The second factor is the number of fingerprint templates in the database. Obviously more templates means increased processing time. In any event, identification speed ranges from 1 to 2 seconds so either way it's very quick.
- Will dry fingers affect biometric systems?
Generally no but if the finger scanned is too dry, the quality of the images may not be sufficient to create a suitable template. This is rare but the result will be a "false reject" which means the system falsely rejects you. All you'll need to do is breathe on your finger or rub your fingers together to provide moisture and try again.
So you can see biometric technology is quite advanced. The systems are already quite accurate and difficult to fool. And as with most emerging technologies, biometric systems are advancing at a rapid rate so get used to them. It may not be long until you have a biometric security system installed in your home.
Thomas Boggo is a freelance writer specializing in emerging technologies. You can read more articles on Biometric Technology & Biometric Security Systems at http://www.105biometrictechnology.com/
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- The Rise of Software to Monitor Employee Computer Activity: Balancing Productivity, Privacy, and Ethics
- Electronic Document Management System: Efficiency and Challenges in the Digital Age
- Troubleshooting Common Windows Server Issues: IT Support Services in London for SMBS
- Freight Price Rules in Business Central for Transparent Shipping Costs
- Unlocking the Power of AI: How Artificial Intelligence is Revolutionizing Business Operations
- Top 10 AI Resume Builders for 2025
- How AI-Powered Accounting Software Saves Small Businesses Time and Money
- How to Optimize Your Practice with Healthcare Revenue Cycle Management Solutions
- How Biomethane Aligns Decarbonisation with Circular Economies
- How a Yes No Oracle Can Streamline Your Decision-Making Process
- The Essential Guide to Desktop Hard Drives
- 10 Tips to Maximize Efficiency in Business Central with Maintenance Manager
- Lean Analytics: A Practical Study Guide for Data-Driven Decisions
- Bitcoin Mining Hardware vs. Cloud Mining: Which Option Makes More Sense?
- HIRE A GENUINE CRYPTO RECOVERY SERVICE TO RECOVER FROM FRAUDLENT PLATFORMS; CYBERPUNK PROGRAMMERS
- How to Safeguard Your Tech Infrastructure Against Supply Chain Attacks
- psychophysical space time
- Top Mobile Application Development Company | Expert App Solutions
- Why Modern Businesses in Australia Need an AngularJS Development Company in 2025
- Reaching For The Skies! CNC Machining In Aerospace
- AI-Powered Content Generators: What Are the Opportunities and Challenges?
- Xcode Development services: Riding the Wave of Innovation
- Top 10 Ways Product Configurator Simplifies Manufacturing in Business Central
- One-Way Interviews: A Game-Changer in Modern Hiring
- The Rise Of Quantum Computing: What It Means For Businesses
- Top Six Ways the Enhanced Planning Pack Streamlines Operations in Business Central
- Why You Should Consider Building a Website
- The Transformation of Software Distribution: The Benefits of Selling Digital Licenses
- Round Robin Lead Distribution and Assignment: A Game-Changer for Sales Teams
- Why You Need DRaaS: The Case for MedOne’s Disaster Recovery as a Service