Free Essay

Biometrics

In:

Submitted By rusheel2911
Words 1744
Pages 7
IB Extended Essay
Subject: Computer Science / I.T.G.S

Research Question –
To what extent can biometrics be trusted as a safe method of payment in personal devices?
Research Question –
To what extent can biometrics be trusted as a safe method of payment in personal devices?

Name: Rusheel Iyer

School: GEMS Wellington Academy - Silicon Oasis

Year 12

Word Count - ____

Name: Rusheel Iyer

School: GEMS Wellington Academy - Silicon Oasis

Year 12

Word Count - ____

Contents

Title Page………………………………………………………………………………………………………..1
Abstract………………………………………………………………………………………………………….3
Introduction……………………………………………………………………………………………………4
Biometrics………………………………………………………………………………………………………4
Fingerprints…………………………………………………………………………………………4 What is a Fingerprint?..........................................................................................4 Why is it used?.........................................................................................................4 What is Fingerprint Recognition?...................................................................4 Facial Recognition………………………………………………………………………………..5 Why is it used?........................................................................................................5 What is Facial Recognition?..............................................................................5 How does it work?................................................................................................5 Eye Scanning Why is it used?........................................................................................................6 What is Eye Scanning?.........................................................................................6 How does it work?.................................................................................................6
In a personal device………………………………………………………………………………………...7

Abstract

As more and more real life situations are becoming digitised such as conversations and communications, entertainment, gaming and many others, so is the transfer of payments. The Internet and one’s personal device are now becoming a person’s own EFTPOS System (Electronic Funds Transfer at Point Of Sale). Along with the numerous benefits of this movement, as with anything, there are certain factors that will not remain the same and some that are lost.
A major issue with the use of digital and online systems as a method of payment and transferring of money is the fact that along the way, security of information and security of the money itself is lost. Noticing these ‘flaws’, several improvements are being made and have been made by companies all around the world. One of these several improvements, and perhaps considered the most secure, is the use of biometrics to authorise payments. Biometrics includes fingerprint recognition, facial recognition and eye scanning. Even though the biometrics is unique to each person, it can only safely authorise the payment, it does not prevent something from going wrong after the authorisation has taken place.
There are several safety measures that have to be taken in order to prevent the loss of data, and money when transferring online. These are measures that would not have to be taken if the transaction was made first-hand. The transfer of payments through online methods therefore, while easier, may not always be the best option.
The purpose of this investigation is to see how reliable biometrics is when paying using a personal device and the research question is:
To what extent can biometrics be trusted as a safe method of payment?

Word Count – 279

Introduction

Biometrics, as a method of payment, is becoming increasingly important and increasingly recognised all across the world. For example, Samsung and Apple both have introduced software, Samsung Pay and Apple pay respectively, into their mobile devices that allow users to pay at EFTPOS counters using the mobile phones and authorising the transaction with a simple fingerprint scan. Due to this, it is being much more easily accepted. As a result of a persuasion this simple, people tend to stop questioning the safety of this technology, which is a huge danger to society and the people using the technology. Understanding how reliable using this is very important and hence asks the question: To what extent can biometrics be trusted as a safe method of payment in personal devices?

To be able to answer the question, we must understand how the technology behind it works.

Biometrics

Fingerprints

What is a fingerprint?

The skin on the tip of a human being’s finger is made up of several ridges and valleys. These ridges and valleys, when pressed against a surface, leaves an impression on the surface know as a fingerprint.

Why is it used?

Fingerprints are simply used due to the fact that they are completely unique to each person. Pairs of identical twins do not have the same fingerprints. Even a person’s own fingers do not have the same prints making fingerprints a reliable method for detection and assumedly for security. Each fingerprint has bout 60 to 70 points of reference, giving a lot for software to look at.

What is fingerprint recognition?

Fingerprints can be distinguished using several methods. Fingerprints are not distinguished by looking at the ridges and valleys but by features called minutia. The oxford dictionary defines minutiae as “the small, precise, or trivial details about something.” When it comes to fingerprints, the two most heavily recognised minutiae are Ridge Endings and Ridge Bifurcations. These are illustrated in Figures 1.0 and 1.1.

Figure 1.1
Figure 1.1

Figure 1.0
Figure 1.0

The Ridge Ending is simply the ending of a ‘line’ or ridge in a fingerprint. A ridge bifurcation is where a ridge splits into two separate ridges.

Figure 1.2
Figure 1.2

Figure 1.2 shows some of the other minutiae that are not so ‘popular’ but are still features that can be used while distinguishing between fingerprints.
Knowing this, fingerprint recognition is simply the automated process of identifying a person by verifying a match between two fingerprints.

Facial Recognition

Why is it used?

Although face structures may not be very unique amongst everybody, for example, in a family, almost all members may have the same facial structure. However, when it has to compare between a stored image of a face and a real-time face, it is still useful in identifying a match.

What is Facial Recognition?

Facial recognition, like fingerprint recognition, is the automated process of identifying an individual by comparing facial structures and patterns with an electronically ‘stored face’ and a person’s face.

How does it work?

Faces have lots of differentiable ‘landmarks’. Landmarks are the different peaks and valleys that make up the facial features, like in a fingerprint. Each human face has approximately 80 landmarks. Some of the more commonly used and noticeable landmarks could include: * Distance between the eyes * Width of the nose * Cheekbone shape * Length of jaw line
These are calculated and worked out by the software and creates a digital ‘faceprint’.

Eye Scanning

Why is it used? Eye scanning refers to the scanning of the iris rather than the whole eye. The iris is the coloured ring of muscle of muscle that opens and shuts the eye like a camera shutter. Like fingerprints, iris patterns and colours are determines genetically when in the womb. The colour and pattern of a person’s eye is complex and unique. Like the fingerprints, a person’s own two eyes do not have the same patterns and identical twins do not have the same patterns as well.

Figure 1.3 shows the iris; the coloured part around the dark centre (pupil).
Irises have more than 200 points of reference compared to about 60 or 70 in a fingerprint making it much more useful.

Figure 1.3
Figure 1.3

Also, a person’s eye does not usually change over time. With a fingerprint, physical injuries, such as burns can alter the fingerprint. This makes the use of iris scanning much more reliable and useful.

What is eye scanning? Eye scanning is another term used to refer to an iris scan. It is the automated process of biometric identification. Software on special devices recognise unique patterns in a person’s iris and using it to identify or authorise a specific individual by comparing it against a stored database of recognised iris patterns.

How does it work?

The process of scanning consists of the two following methods: 1. Enrolment 2. Verification
Enrolment is basically just registering the person and his or her eye. In an eye scan, the computer will recognise, after taking a picture, the following: * Centre of the pupil * Edge of the pupil * Edge of the iris * The eyelids and eyelashes
The patterns in the iris are analysed, translated and stored in the computer as code. It then removes the unnecessary details such as eyelashes.
The code is known as IrisCode and is a 512-digit number. The person’s name is stored along with this code. The person is now ‘enrolled’.
Verification is then simply the process of scanning and matching the current user’s eye with stored/enrolled eyes.

Figure 1.4
Figure 1.4

Figure 1.4 is a pictorial representation of an IrisCode with 512-bytes.
These codes are so unique that the chance of mistaking one code for another is 1 in 10 to the 78th power. That is:

11078

For two iris codes are the same means that there would have to be at least 78 billion billion billion billion billion billion billion billion million people in this world (that is 8 billions and a million people) and that would be for ONE person’s iris code to match one other person’s. These show odds that are highly in favour of using this technology.

In a personal device

When talking about using personal devices payment, it includes devices such as mobile phones and laptops rather than desktops (Personal Computers) or larger machines. It would be thought that such compact, portable devices do not have the storage space, physical space or the computational processing power to contain fingerprint, facial and eye / iris recognition devices. Surely, a small phone would not be able to hold the IrisCode for 7 billion people or fingerprints. However, it does not need to. To authenticate the user of the phone, the phone has to only store the owner’s fingerprints / IrisCode / Face and hence it does not take up as much storage space. The IrisCode as mentioned before occupies only 512 bytes, which is relative miniscule compared to the 128 Gigabytes that are available in high-end, modern smartphones.

Apple and Samsung Pay

Apple and Samsung pay are the latest software enabling payment through mobile phones. The phones, with the help of the software, will store the owner’s card details. When a transaction is being made, the owner of the phone simply has to scan his or her fingerprint in the phone’s in-built scanner to authorise the payment. This definitely makes the whole transaction quicker as a fingerprint scanning takes only a few seconds. It also means that the pockets may get lighter as people will no longer have to carry their wallets around with them. Since, many people already have the phones, it also means more people will be moving towards using electronic methods of payment rather than traditional, physical methods.

As with any new Information and Technology product or service, there are societal impacts. In the case of Apple and Samsung pay

Similar Documents

Free Essay

Biometrics

...Biometrics within Financial Institutions Abstract This paper presents a problem with the use of technology within the Credit Unions and Banking industries. Technological innovations have allowed the industry to be more open to consumers and challenges that the current economy has posed. Modern technology is also change the landscape of how, when and where business is conducted with financial institutions and consumers, businesses, and other organizations. Technology driven issues such as privacy, security and trust, have been pushed to the forefront, which makes the line between mobile banking and banking online increasing difficult to distinguish. Credit Unions like other banking institutions rely on gathering, processing, analyzing and providing information to meet the demands of the consumer. Given the importance of information systems within banking its not surprising to find, risks within the systems are developing in nature. History Truliant Federal Credit Union was started in Winston-Salem, North Carolina around 1952. They serve over 180,000 member owners and more than 900 business and organizations with $1.6 billion in assets. Truliant as it will be referred to in this paper has 21 financial locations in North Carolina, South Carolina, and Virginia. One philosophy that stands out or is a representation of what this particular Credit Union stands for is “ people helping people”. Like other not for profit organizations, they provide individuals and small business with...

Words: 1787 - Pages: 8

Premium Essay

Biometric

...springer.com/chapter/10.1007/978-3-642-01793-3_20 Eigenvalue estimation plays an important role in biometrics. However, if the number of samples is limited, estimates are significantly biased. In this article we analyse the influence of this bias on the error rates of PCA/LDA based verification systems, using both synthetic data with realistic parameters and real biometric data. Results of bias correction in the verification systems differ considerable between synthetic data and real data: while the bias is responsible for a large part of classification errors in the synthetic facial data, compensation of the bias in real facial data leads only to marginal improvements. https://www.eff.org/wp/biometrics-whos-watching-you September 14, 2003 September 2003 Introduction Among the many reactions to the September 11 tragedy has been a renewed attention to biometrics. The federal government has led the way with its new concern about border control. Other proposals include the use of biometrics with ID cards and in airports, e.g. video surveillance enhanced by facial-recognition technology. The purpose of this document is to sketch out EFF's concerns about biometrics. In today's public arena, biometric technologies are being marketed as a "silver bullet" for terrorism; however, very little independent, objective scientific testing of biometrics has been done. Deploying biometric systems without sufficient attention to their dangers makes them likely to be used in a way dangerous...

Words: 7685 - Pages: 31

Free Essay

Biometric

...Title (2) Biometric scanning system types and which one is more effectiveness in a workplace Biometric recognition, or biometrics, refers to the automatic authentication of a person based on his or her physiological or behavioural characteristics (Jain, Bolle, and Pankanti 1999a; Maltoni, Maio, Jain, and Prabhakar 2003). One of the most important technologies which acts as a human being identify required purpose. Nowadays there were great progresses in technology of access for companies which it using human being body to identify the identity of the person. In the past Human beings used fingerprint to identity for signature. Biometric technology looks like a revolution for modern society for example, Iris and AFIS (Automatic Finger Print Identification System). Although fingerprint has a good feature to identify people but I will argue that iris system has shown the best performance to do the required purpose of scanning and identification more accurately than fingerprint. Reliability Fingerprint is a biometric device by which the people been identified through scanning fingerprint of the person and save the data to store the fingerprint image. Furthermore fingerprint identification scanning is reliability because fingerprint identification and authentication is the mature biometric technology (Komarinski, 2005). Firstly, the fingerprint is reliable because it includes quite huge information and will keep for all life of human being, In spite of the fingerprint just...

Words: 1161 - Pages: 5

Free Essay

Biometrics

...the near future. It has been called ''biometrics". The pioneers of this new domain intend to construct devices which would allow identification of a person on the basis of his or her ''biological'' characteristics which is voice, movements, features of face and other parts of the body, retina or iris pattern. Nature has made human beings with different characteristics which may vary from one person to another. This property is made use of by Biometric technology to distinctly identify each person. This paper gives an overview of key biometric technologies and basic technique involved. The various opportunities for biometrics are mentioned, followed by the the benefits of the biometric and identification, the actual issue or current potential problems and abuses, and appropriate guidelines of identification and biometrics technology. Introduction Biometric technology involves effective methods of individual identification/authentication through its recognition of unique physiological characteristics. Although still a developing technology which contains deficiencies, it is generally considered to be a highly accurate and widely applicable security measure. However, growing public awareness of this technology has been accompanied by increasing concerns about ethical issues associated with its use. Biometric Systems Biometrics are automated methods of recognizing a person based on a physiological or behavior characteristics. Biometrics technologies are becoming the foundation...

Words: 268 - Pages: 2

Premium Essay

Biometrics

...the first biometric security systems appeared in the market, an increasing demand for novel techniques that will cover all different scenarios, has been observed. Every new method appears to outmatch some of its competitors but, at the same time, presents disadvantages compared to others. However, there is still no method that consists a single panacea to all different scenarios and demands for security. This is the reason for which researchers are on a continuous effort for more efficient and generic biometric modalities that can be used in various applications. In this chapter, emerging biometric modalities that appeared in the last years in order to improve the performance of biometric recognition systems, are presented. The presented methods are divided in two major categories, intrusive and non-intrusive ones, according to the level of user nuisance that each system sets off. 1 Introduction Biometric recognition is a well-known research area that aims to provide more efficient solutions to everyday growing human need for security. Biometrics refers to methods that can be used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral characteristics. In information technology, in particular, biometrics are used as a tool for efficient and reliable identity management and access control. Biometrics are also used in surveillance applications in order to identify individuals. The last decade, a large number of novel biometric modalities...

Words: 12845 - Pages: 52

Premium Essay

Biometrics

...“Biometric attendance in the workplace is a threat to privacy”. How far do you agree? (30 marks) Ref - http://www.biometrics.org/html/introduction.html Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy...

Words: 665 - Pages: 3

Free Essay

Biometrics

...Optimization of biometric Fingerprint Recognition parameters using Genetic Algorithms Report submitted for CPSC - 6126 Fall 2014 Term Paper By Krishna Sindhuri Nagavolu 13th December, 2014 Optimization  of  biometric  fingerprint  recognition  parameters  using   Genetic  Algorithms   Abstract This research paper discusses about parameter optimization for biometric fingerprint recognition with the use of genetic algorithms. An accurate access control system is very important in domains like identification checks at airports, government organizations, FBI’s, scientific working groups like NASA, US defense department and driver’s license office. The main reason these organizations prefer Biometrics is because it measures physiological characteristics like fingerprints, iris patterns, facial recognition, retina recognition, ear recognition and DNA analysis. Based on the features of the biometric sensors used, the system can detect whether a person is an authorized user or not. Though there are many other methods for identification, biometric sensors are considered to be very reliable and accurate. The main objective of this paper is to build a fingerprint recognizer that is fully automatic and can minimize the errors caused while matching the fingerprints. Keywords: Biometrics, genetic algorithms, Parameter optimization, fingerprints                           2|Page Optimization ...

Words: 2966 - Pages: 12

Premium Essay

Biometrics

...What is a Biometric Time and Attendance System? Biometrics is the identification of people based upon their physical characteristics; most commonly their fingerprints, hands, eyes, or facial features. While time and attendance systems are used to manage employee attendance, scheduling, and associated payroll tasks. Within time and attendance, biometric devices are often used as a punch clock in order to add an extra layer of security, accountability and efficiency. How Does Biometric Time and Attendance Software Work? Step 1: Biometric Devices: Using biometric time and attendance systemsallows employees to clock in and out using their fingerprint, retinal scan, etc. Often times this process is also accompanied by a PIN (Personal Identification Number) which must also match the fingerprint or other scan. Step 2: Time and Attendance Software: Pairing your biometric device with a time and attendance software allows for more efficient payroll and attendance processing. Rather than spending hours adding up manually submitted clock-in and clock-out times, your biometric time and attendance software will allow you to automatically import data into your payroll software. This will significantly cut down on processing time and will eliminate errors derived from manually inputting information. Different Types of Biometric Devices Fingerprint Scanners are probably the most common type of biometric time and attendance device, simply because they are easy to use and are generally quite...

Words: 573 - Pages: 3

Free Essay

Biometrics

...Biometrics and finger/palm printing Tara Tatum Team C Introduction In many of the FBI’s high profile cases, one form of technology that has become highly effective is biometrics. The definition of biometrics is the science of measuring and statistically analyzing biological data. This scientific measuring tool is mostly used in identifying individuals whether anatomical or physiological. While fingerprinting is probably one of the oldest and most common forms of biometrics, other forms can include but are not limited to iris scans, voice recognition, palm prints, and facial recognition. As of late, the FBI, being a leader in the latest biometric technology, has created with the help of the science and technology branch, the Biometric Center of Excellence or BCOE. Not only has the BCOE strengthened the FBI’s abilities by proving the guilt, as well as the innocence of those convicted of crimes, but it has also been effective in thwarting terrorism that plagues many countries today. Finger/palm printing techniques Since the early 1920’s, fingerprinting techniques have been in existence, assisting in identifying and authenticating a person’s identity. This older form of biometric technology has both advantages and disadvantages. Some of the advantages can be the authentication of one’s identity, as no two person’s have the same prints, the cost effectiveness, the ease of use, the accuracy and the standardization. Some disadvantages are the intrusiveness, as some...

Words: 776 - Pages: 4

Premium Essay

Biometrics

...Biometrics involves the automatic, real time identification of individuals based on their physiology or behavior (Grant & Terry, 2012). Biometrics include a wide range of technologies that include facial recognition software, DNA profiling, voice recognition, fingerprint identification, and retinal scanning. The benefits of any technology are significantly dependent on the quality of the data base that are used to result in preventing crime. Facial recognition technologies can distinguish suspects and improve security and officer safety. Facial recognition is different from other biometric techniques that are used for surveillance purposes. Searching for wanted criminals, suspected terrorists, and missing children are benefits of the facial recognition seeing as it can be done from far away. This ensures that there is no contact with the subject and they remain unaware that they are being scanned. Fingerprint identification requires an individual to roll each finger across a fingerprint scanner. This typically takes several minutes and do not capture any other imprints of the hand, which are often found at crime scenes. Fingerprint identification is one of the most well known and publicized biometric. This is one of the most popular because it has numerous sources, the ten fingers, and the ease of access. The offender databases include offender photos, fingerprints that have been obtained, and images of distinguishing marks such as scars, tattoos, and other body modifications...

Words: 332 - Pages: 2

Free Essay

Biometrics

...already arrived in New York — but it’ll take a whole lot more than a new pair of peepers to trick this setup. An Israeli general is at work on a “biometric security” system that he believes will have New Yorkers tossing out their keys and maybe ditching their doormen, too. Using sophisticated scanners that can recognize a person’s face, voice, build and stride, the system can unlock your door in under two seconds. Any strangers not in the database will be denied access. “This is only the beginning,” says General Aharon Farkash, the founder and president of the firm FST21. “This is the way people will enter buildings in the 21st century.” To help establish FST21 in the states, Farkash opened a North American office earlier this month at 7 World Trade Center. Should you drop by, you’ll be greeted by one of its security devices. But unless he’s beamed a code to your phone or you work there already, there’s no convincing the small 8-inch scanner to let you in. The device looks simple on the outside, and in practice it is, essentially turning everyone into a human-size key. “Just like a fingerprint, we all look and act in a unique way,” Farkash says. “Biometric” technology has been around since the 1970s, and is often seen in thumb-print readers and retinal scanners. But thanks to less-invasive techniques, biometrics is starting to take off. “People have been talking about this for decades as the future, but I think the technology is finally good enough and invisible...

Words: 1150 - Pages: 5

Premium Essay

Biometric

...Biometrics in Schools, Colleges and other Educational Institutions The following guidance has been prepared as an aid to schools, colleges and other educational institutions that may be considering the installation and use of a biometric system. This document is intended to encourage such institutions to fully consider if there is need for a biometric system in the first place and then to assess the privacy impact of different systems. The critical issues to be considered from a data protection perspective are the proportionality of introducing a biometric system and the requirement to obtain the signed consent of the student users (and their parents or guardians in the case of minors) giving them a clear and unambiguous right to opt out of the system without penalty. The document is not intended to promote any particular system, but is intended to make schools and colleges aware of their responsibilities under the Data Protection Acts 1988 & 2003. It is the use of a biometric system that may give rise to a data protection concern, not necessarily the production or sale of a system. All situations must be judged on a case-by-case basis. 1. Different types of Biometric systems All biometric systems operate on the basis of the automatic identification or authentication/verification of a person. What differs between systems is the nature of the biometric and the type of storage. 1.1 Information used to generate biometric data Biometric data may be created from physical or physiological...

Words: 3989 - Pages: 16

Free Essay

Biometrics

...3-20-14 Biometric Scan Technologies This essay covers the basic history, importance, and impacts biometric technologies have on our security, and what the future may hold because of them. When speaking of biometrics, fingerprinting is usually the first biometric method most people consider. However, throughout the years, biometric technology has advanced and accrued new methods such as facial recognition and iris scanning. First off, we will discuss finger-scanning, or fingerprinting, as it is the oldest and most commonly used form of biometrics to date. This technology has always fascinated me because it identifies every individual based on their unique fingerprint, making it very difficult to replicate or bypass. An average scan can identify up to, but not limited to, 40 unique characteristics called “minutiae” a term coined by the FBI years ago. If that is the current ability of a fingerprint scanner, I can only imagine that in the future this method of biometrics will be the standard for consumer securities. Homes will have touch pads instead of keys, making the likeliness of a burglary slim to none. So, in the future fingerprinting won’t be limited for the elite and three letter agencies. Secondly, facial recognition biometric technology is gaining popularity, especially in modern social devices such as smart phones, tablets, and laptops. Although this method has much higher goals, it currently stands as an efficient means of security. Again, biometrics has always...

Words: 477 - Pages: 2

Premium Essay

Biometrics

...Biometrics 125 years ago, winter 1879, Paris First agency police prefecture clerk Alphonse Bertillion was sitting in dark cold corner of huge file-cabinet room, where there were stored files on all Parisian criminals. A.Bertillion was entering the criminals’ description. He found out that there is no classification system, since: a) Criminals could easily change their names, and attempts to try different systems (by age, criminal method) end up in failure. Bertillion, son of Lui Bertillion – president of the Anthropological society, came up with an idea to utilize anthropological parameters (height, length and volume of the head, length of the hands, fingers, etc.) to identify personality. This was a break-through in criminalistics. With the development of electronics, Bertillioon’s theory was recalled and scientists realized that human beings have numerous unique characteristics beginning from the iris of the eye to the fingerprints and all these characteristics can be used in personality identification. With the rapid development of computer technologies, the concept of information security is becoming more and more important. Crime scene investigators have been using behavioral and physical characteristics for centuries in order to identify the criminals, nowadays; we have a great need for identification and authorization in information security. Information Security is being understood as a protection of the information and informational infrastructure...

Words: 1934 - Pages: 8

Free Essay

Biometrics

...Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems. A fingerprint reader captures the curves and indentations of a fingerprint. Fingerprint readers can be set up to perform different functions for different fingers. For example, the index finger could start a program, and the ring finger could shut down the computer [ (Jenkins) ]. Fingerprint readers usually cost less than $100, making it easy for people to use them in personal and business environments. Newer computer models include internal fingerprint readers for added security. External fingerprint readers usually are connected to a USB port on the computer [ (Parlor) ]. A biometric security device used in high security areas is an iris recognition system. Iris recognition systems read patterns in the iris of the eye. These patterns are as unique as a fingerprint. Iris recognition systems are quite expensive and are used by government security organizations, the military, and financial institutions that deal with highly sensitive data [ (Doe) ]. Biometric technology is a very effective way to keep information secure. Biometric technology is used in several different ways. Two widely known...

Words: 262 - Pages: 2