2016-09-14 Bhatti A Biometric Devices Paper

You might also like

You are on page 1of 3

Bhatti 1

Bhatti Ahaz
Mr.Ortak
CIS 1
September 14, 2016
Access Granted
Biometric devices authenticate a persons identity by verifying unique personal
characteristics. These devices translate a biometric identifier, such as a fingerprint, into a digital
code that is compared with a digital code stored in a computer. If the digital code in the computer
matches the personal characteristic code, the computer grants access. Examples of biometric
devices include fingerprint readers and face recognition systems.
A fingerprint reader or scanner, captures curves and indentations of a fingerprint.
Organizations use fingerprint readers to secure doors, components, and software. For example a
fingerprint reader can be set up to authenticate users before they can access a computer (Rossi).
External fingerprint readers usually plug into a USB port. To save on desk space, some laptops
include built in fingerprint readers.1
A face recognition systems capture a live face and compares it with a stored image to
determine if the person is a legitimate user. Some buildings use face recognition systems to
secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition
systems to protect the public. Some mobile devices use face recognition systems to unlock the

1 Nadeer and White state that fingerprint readers can perform different functions for
different fingers, for example, one finger runs a program and another finger shuts down the
computer (62-63)

Bhatti 2
device. Face recognition systems are becoming more sophisticated and can recognize people
with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles.
(Allensmith)
Home and occupational users alike are using biometric security. Through a biometric
identifier, such as a fingerprint, biometric devices can deny or grant access to programs, devices,
computers, rooms, and other locations. Biometric devices are an effective security technology.

Bhatti 3
Works Cited
Allensmith, Samantha Clare. Understanding Face Recognition Systems. n.d. Course Technology.
Web. 16 Sept 2014.
Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security . Chicago: Windy City Press,
2014. Print.
Rossi, Marcell Enrico. "How to Use Fringerprint Readers." Digital Security Review Aug 2014:
n.pag. Web. 3 Oct 2014.

You might also like