Biometric Technology FAQ
Computers & Technology → Technology
- Author Thomas Boggo
- Published April 26, 2007
- Word count 568
Biometric technology uses intrinsic human characteristics such as fingerprints, handprints, facial characteristics, irises or retinas in the eyes, voice, and many other things for identification purposes. Biometrics security systems are growing rapidly because they are considered more secure than conventional security systems. After all it's much more difficult to steal or duplicated a fingerprint than it is to do the same with a key or a password.
That's a brief overview of biometric technology and here are some frequently asked questions:
- Can fingerprints be stolen or copied from biometric database?
Absolutely not. First of all only templates are stored in the database. Secondly, only a tiny subset of the characteristics of the fingerprint are extracted and stored in the template when the finger is scanned. The template stored in the database holds enough information to verify the finger presented is yours when your finger is scanned in the future but the entire image of the fingerprint is not stored so there is no way to copy or steal fingerprints from the database.
- Can biometric systems be fooled with replica fingerprints?
Yes, it is possible but not likely to fool biometric systems and if the system is fooled it will happen only once. In addition to recognizing fingerprints, biometric systems are sophisticated enough to recognize body temperature and blood flow to make sure the finger presented is from a live human being and not just a molded replica. Secondly, fingerprints are never exactly the same twice due to human factors. The fingerprints will be similar enough to identify individuals when scanned but if an exact replica of a previously scanned fingerprint is scanned again, the biometric system will know it and deny access.
- What's the enrollment capacity of biometric databases?
When authorized users present biometric data to be used for future identification by the database, they are said to be "enrolled." The answer as to how many can be enrolled depends on the system. It could be as few as 10 or as many as 3,000. However if capacity is reached it's not difficult to increase capacity if nothing else by using an offsite database with a larger capacity. Existing technology allows for quick retrieval of data even if the database is thousands of miles away in another state.
- How quickly can a fingerprint be identified by a biometric system?
The speed at which fingerprints are identified is dependent on two factors. The first factor is the speed or processing power of the system. The second factor is the number of fingerprint templates in the database. Obviously more templates means increased processing time. In any event, identification speed ranges from 1 to 2 seconds so either way it's very quick.
- Will dry fingers affect biometric systems?
Generally no but if the finger scanned is too dry, the quality of the images may not be sufficient to create a suitable template. This is rare but the result will be a "false reject" which means the system falsely rejects you. All you'll need to do is breathe on your finger or rub your fingers together to provide moisture and try again.
So you can see biometric technology is quite advanced. The systems are already quite accurate and difficult to fool. And as with most emerging technologies, biometric systems are advancing at a rapid rate so get used to them. It may not be long until you have a biometric security system installed in your home.
Thomas Boggo is a freelance writer specializing in emerging technologies. You can read more articles on Biometric Technology & Biometric Security Systems at http://www.105biometrictechnology.com/
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Top Emerging Trends in Quantum Computing for 2024 and Beyond
- 10 Ways to Transform Production Scheduling in Business Central
- Master the Art of Gamification with Our Engaging App
- 10 Reasons Business Central Users Leverage Advanced Inventory Count
- The Ultimate Guide to 3D Animation: From Basics to Advanced Techniques
- Are Computer Towers Better Than Laptops? The Ultimate Comparison Guide for 2025
- Top 10 Software Company in Bangladesh
- Mitsubishi Electric proves heat pump compatibility with microbore pipework
- The Role of AI Services in Customer Experience and Satisfaction
- Google DeepMind Launches Gemma 2: A New AI Model Revolutionizing Research and Development
- How Do AI Solutions Drive Productivity And ROI In Business?
- Is Verizon Total the same as Verizon Prepaid?
- What is the best prepaid phone company?
- Why Small to Large Companies Continue to Use Dated/Dinosaur Technology
- 10 Ways Business Central’s Quality Inspector App Streamlines Quality Assurance
- 10 Ways Business Central’s Quality Inspector App Streamlines Quality Assurance
- The Rise of Sustainable Technology: Shaping a Greener Future
- Why Bullseye Engagement Offers the Best OKR Software for Businesses
- Web Development Companies in Canada
- How EasyPDF™ Forms Save Time & Money at Home and in the Workplace
- The One and Only 15-Second Digital Lien Waiver to Complete and Submit in Record Time Using the Free Adobe Reader
- The Impact of Employer Branding on Leadership Recruitment
- Augmented Reality (AR) in Business: Why Your Company Needs It
- Top 10 Reasons to Use Business Central’s License Plating App
- The Hidden Advantages of European Offshore Development Companies
- App Development: Transforming Ideas into Reality
- Automate you Chauffeur Service with A to Z Dispatch
- The Impact of Machine Learning and AI on Business: What the Future Holds In the modern busine
- Generate Flashcards Fast with AI: The Ultimate Solution for Developers
- Blockchain Interview Guide: Essential Questions and Answers for Success