...BIOMETRICS BY: WILLIAM C. NEWTON SECR 5080 INFORMATION SYSTEMS SECURITY TABLE OF CONTENTS 1. TITLE PAGE………………………………………………………………………1 2. TABLE OF CONTENTS………………………………………………………….2 3. ABSTRACT………………………………………………………………………..3 4. HISTORY…………………………………………………………………………..4 5. TYPES OF BIOMETRICS………………………………………………………….6 6. FACIAL RECOGNITION…………………………………………………………..7 7. RETNA SCANNER………………………………………………………………….8 8. FINGERPRINT……………………………………………………………………….9 9. HANDPRINT…………………………………………………………………………9 10. VOICE AUTHENTICATION………………………………………………………10 11. AUTHENTICATION………………………………………………………………...11 12. SUMMARY…………………………………………………………………………..11 13. REFERENCES………………………………………………………………………..12 ABSTRACT This paper previewed my research of biometrics from the early 500 BCs to the 21st century. Upon understanding some of the biometrics differences and earlier methods used, I think the world is definitely is a better place to live in, as well as a much safer world to be in. One example of how this was used to make the world a better place was where biometrics were used at the NFL Super Bowl game in Tampa, Florida. There are many different types and ways of using biometrics to prevent entry into certain places or even to catch criminals from further causing damage in society. Biometrics is the overall study of measurable characteristics, specifically in computer security biometrics refers to the different authentication techniques that rely on measurable physical characteristics...
Words: 2368 - Pages: 10
...| Biometric Identification Technology | | By Group C: | HUMN432 | 6/10/2012 | | Table of Contents Introduction History of Biometric Identification Biometric Identification Advancement Timeline * Types of Biometric Identification Technologies and How They Work Benefits of Biometric Identification Technology How and Where Biometry is Used In the USA Controversial Issues and Legalities of Biometric Identification Conclusion Bibliography Introduction Biometric Identification Technology is the world-wide used computer science that identifies humans based on physiological and behavioral traits for access control and security. The computer processing idea has been around for hundreds of years but the equipment has only been available for the past several decades evolving to become better with each step. The need for a formal system to record and identify first-time and repeated offenders in the 1800s led the known Bertillon to develop anthropometrics to identify individuals. This advancement was later linked with computer systems to create a true biometric system identifier. The several types of biometric identifiers, later discussed, have evolved from a mere idea to an implemented security system used in airports, government programs, and even small businesses. The technology is used globally from the US to the UK, India, Germany, and many more. Its long history has created responsiveness and allowed countries to embrace the welfares of such a...
Words: 7486 - Pages: 30
...Abstract Biometrics has garnered considerable interest from both the Government and private industry. This interest has lead to a number of biometric technologies each with their own share of strengths and weaknesses. The process used in the verification and identification of people using fingerprint, retina-based, iris-based, hand geometry, and facial recognition biometrics are examined in this paper. The advantages and disadvantages of each of these methods are also explored. The future of biometrics is also considered given the current developments in the field. Organizations are constantly looking for a more secure authentication method for their users to gain access to e-commerce and other security applications. Biometrics continues to gain more and more attention. What is biometrics the right decision for your corporation? If you choose to use biometrics, which is the biometric solution for your corporation, there is no such thing as any one best type of biometrics. Different applications necessitate the use of different biometrics. In order to select the right biometric for your solution as a user you will need to investigate a myriad of vendor products while keeping an eye on future development and technology. Never before have there been more various and more varied options. Vendors have a wide variety of products to select from. Some are new to the market but even these can be considerably better and greatly improve your company security stance. The focus...
Words: 3807 - Pages: 16
...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks also...
Words: 3961 - Pages: 16
...cheaper and easy to implement compared to other biometrics technology. The fingerprint only authenticates the validated student. SAS with the fingerprint features can make the system secure because no student can record their attendance except to be authenticated by the system. Besides provides security, this new system provides efficiency to both lecturers and students. SAS focused on the developing system using SDLC as the methodology. This system using personal computer that is run under Windows platform and develop using VB, PHP and MySQL. This system uses the questionnaire method in order to analyze the user acceptance among respondents. In conclusion, this is important to provide the reliable and efficient record. 1.1 INTRODUCTION This chapter will focus on background of this project, problem of the manual system, the objectives, scope and significance of the project. 1.2 BACKGROUND Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics. It includes fingerprint, iris, facial and retinal. Biometrics technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Today, biometric is being spotlighted as the authentication method because of the need for reliable security. Fingerprint authentication has been in use for the longest time and bears more advantages than other biometrics. It has been verified through various applications...
Words: 2173 - Pages: 9
...written permission. Biometric Scanning Technologies: Finger, Facial and Retinal Scanning This paper discusses several Biometric scan technologies: finger-scan, facialscan and retinal-scan. We discuss the recent history of Biometrics and how it has been influenced by such pseudo-sciences as Phrenology, the study of human skull characteristics and Anthropometry, the study of human body measurement. We discuss how finger-scan technology was influenced by French and British police advancements in the nineteenth century and still remain the most widely used Biometric technology today. Facial-scan technology is ... AD Copyright SANS Institute Author Retains Full Rights fu ll r igh ts Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SA NS In sti tu te 20 03 ,A ut ho rr eta ins Edmund Spinella SANS GSEC Original Submission San Francisco, CA Dec 2002 28 May 2003 Biometric Scanning Technologies: Finger, Facial and Retinal Scanning Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2003, As part of the Information Security Reading Room. Author retains full rights. Abstract © SA NS In sti tu te 20 03 ,A ut ho rr eta ins fu ll r igh ts This paper discusses several Biometric scan technologies: finger-scan, facialscan and retinal-scan. We discuss the recent history of Biometrics and how it has been...
Words: 5748 - Pages: 23
...Investigation into Biometric Technologies and the Development of a Fingerprint Recognition Application Student Name: Robert Heaney ST No: 10550804. Supervisor: Jonathan G. Wallace . . . . . . . . . . Note: Incomplete, this document is currently in draft Abstract This preliminary document covers the presentation phase of a final year BSc (Hons) computing science project aiming to investigate biometric technologies and develop a fingerprint recognition application to allow logging of student attendance at lectures. The introduction offers some background to the project and establishes the aims and objectives of the project overall. Following on from the introduction, the literature review presents a critique of research material that provides the basis for the project. This material includes a number of texts, journals and research papers as well as additional information sourced from the Web. As drawn from the literature, the subject areas covered include; history and background to modern biometrics; technological, social, organisational and environmental influences; key technologies in the market today; design issues, including security, performance and testing. In chapter 3, attention turns to requirements analysis for the development of a fingerprint recognition system. The process follows a requirements engineering approach to development by formally establishing user requirements and allowing continuous requirements assessment...
Words: 5371 - Pages: 22
...Time And Attendance: Biometric Payroll System- Automates Daily Tasks Posted on October 18, 2012 by James Added Benefits Of A Biometric Payroll System Your business will benefit tremendously by using MinuteHound’s biometric payroll system. It’s a fast and convenient way for employees to sign in and sign out of work. It’s low-cost and simple to use. Best of all, it holds employees accountable for their actions. Perfect attendance is guaranteed through biometrics. This biometric payroll system is more than just your standard clocking in device. How else can this help make your business or company even better? When employees scan their fingerprints to get into work, the biometric payroll system records information live. All the data is available for viewing at your convenience, in real time. Gone are the days of sitting with a calculator for hours on end to figure out each and every nickel that the employees are owed. Please note that MinuteHound works in conjunction with payroll devices to calculate how much money should go into your employees’ paychecks. You will never over or under pay again. The biometric payroll system makes your life easier. The Biometric Payroll System Keeps You Informed Did you know that this biometric payroll system can send you an email or text message when an employee doesn’t show up or leaves work early for the day? Knowing this might make you question how the biometric payroll system works when someone is off for a holiday or because of an illness...
Words: 441 - Pages: 2
...Computer and network security has become very important to businesses, government, military, and individuals. Many companies have been compromised and personal information obtained and used without authorization. It is very important to have computer and network security to keep hackers and malware from collecting data and destroying a computer system and network. Computer security protects all of the data that is stored on your computer. Every component should be protected that includes hardware, software, and data. The history of Network security started when hacking crimes started in the 1980’s. Robert Morris was a computer hacker that released a worm that affected 6,000 computer systems. It created a large monetary financial lost because of a computer worm. The Computer Emergency Response Team (CERT) was said to be form after the attack to inform users they had security problems. ”The Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) leads efforts to improve the Nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the Nation while protecting the constitutional rights of Americans (US-CERT).” Hospitals have major concern in protecting computer and network security. The information in hospitals have very valuable information such as patient records, social security...
Words: 1025 - Pages: 5
...• Device Manager in biometric devices will help in managing the drivers for biometric devices. • Credential provider on bio-metric device will help biometric data log which is to be collected on a local computer. • Group Policy settings on biometric devices will enable, disable, or limit the use of biometric data for a local computer or domain. This settings is on the bio-metric devices and prevent installation of biometric device driver software. • Biometric device driver software is available from Windows Update installer. Branch Cache will install the services that are required to provide Branch Cache client functionality on bio-metric device. It also supports the Branch Cache server support for the HTTP protocol, Hosted Cache, and applications other than network files. Branch Cache will reduce the utilization of the wide area network (WAN) links by connecting to various branch offices to the data center or headquarters and increases access speeds to the content which has...
Words: 1470 - Pages: 6
...Biometrics Technology Biometrics Technology Biometrics technology is an authentication method used for measuring a person’s unique physical or behavioral characteristics. When referring to biometrics in information technology, characteristics like fingerprints, DNA, eye retinas and irises, voice pattern, facial patterns, and hand measurements are all used for authentication purposes. Biometric science did not originate at one single place as people all over the world have been using it for identifying individuals from each other. The history of biometrics dates back to as early as the 14th century in the form of fingerprinting by China. This was reported by explorer Joao de Barros who wrote that the Chinese merchants were stamping children’s palm prints and footprints on paper with ink so young children could be identified from one another. This primitive form of biometrics is still being used today. Biometrics was used in the 1800 in for form of photographic memory. It wasn’t until the 1890’s that an anthropologist and police desk clerk in Paris, Alphonse Bertillon, created a field of study to find a way to identify convicted criminals. Bertillon developed the technique of taking multiple body measurements and was used throughout the world until it was discovered that some people have the same measurements making this technique unusable. After this failed the police went to fingerprinting which was created by Richard Edward Henry of Scotland Yard, who just reverted...
Words: 1831 - Pages: 8
...A FINGERPRINT BASED BIOMETRIC AUTHENTICATION AND IDENTIFICATION SYSTEM FOR TIME AND ATTENDANCE MANAGEMENT ABSTRACT This project is about designing a system that automates the whole process of taking attendance and maintaining its records in an academic institute. Managing people is a difficult task for most of the organizations, and maintaining the attendance record is an important factor in people management. When considering academic institutes, taking the attendance of students on daily basis and maintaining the records is a major task. Manually taking the attendance and maintaining it for a long time adds to the difficulty of this task as well as wastes a lot of time. For this reason an efficient system is designed. This system takes attendance electronically with the help of a fingerprint sensor and all the records are saved on a computer server. In order to mark the attendance, student/staff has to place his/her finger on the fingerprint sensor. On identification student’s attendance record is updated in the database and he/she is notified through a screen. . TABLE OF CONTENTS Certification Acknowledgement Abstract Table of Contents List of Figures Chapter One Introduction Chapter Two Literature Review Chapter Three Methodology Chapter Four System Design Chapter Five Implementation Chapter Six Conclusion and Recommendation LIST OF FIGURES CHAPTER ONE INTRODUCTION 1.1 INTRODUCTION This chapter focuses on the background of the project, the objectives, scope and...
Words: 2434 - Pages: 10
...Investigation into Biometric Technologies and the Development of a Fingerprint Recognition Application . . . . . . . . . . Note: Incomplete, this document is currently in draft Abstract This preliminary document covers the presentation phase of a final year BSc (Hons) computing science project aiming to investigate biometric technologies and develop a fingerprint recognition application to allow logging of student attendance at lectures. The introduction offers some background to the project and establishes the aims and objectives of the project overall. Following on from the introduction, the literature review presents a critique of research material that provides the basis for the project. This material includes a number of texts, journals and research papers as well as additional information sourced from the Web. As drawn from the literature, the subject areas covered include; history and background to modern biometrics; technological, social, organisational and environmental influences; key technologies in the market today; design issues, including security, performance and testing. In chapter 3, attention turns to requirements analysis for the development of a fingerprint recognition system. The process follows a requirements engineering approach to development by formally establishing user requirements and allowing continuous requirements assessment throughout the project life-cycle. The design approach and methodology used to model the...
Words: 11664 - Pages: 47
...Future of Policing Proposal Team Alpha CJA/214 June 03, 2014 Robert Gasior Policing in this day and age is not about just keeping the peace in the community. Officers have numerous responsibilities and have an abundance of new technology at their finger- tips. The technology that we have now helps the officers perform at a higher level, when it comes to crime solving, communication, making communities, and decreasing crime levels. GPS tracking and Biometrics are two very useful technologies that allow the officers of the law to catch more criminals and solve crimes a lot quicker and more efficiently. These two specific technologies allow law enforcement to catch more criminals and solve cases a lot quicker. GPS tracking systems are some of the most advanced technology that has come into play for law enforcement in this day and age. In the past, officers would have the tedious job of following criminals on foot for days or even months at a time ("GPS Tracking for Law Enforcement", 2013). Officers now have GPS tracking technology, and that allows them to monitor potential suspects actions and movements by remote in almost real time from practically anywhere by a computer that his hooked up to the internet. Officers are able to also monitor them by using an IPhone, Samsung Galaxy, and even IPad. This incredible technology will permit law enforcement to dedicate more of their valuable time, resources, and money by resolving crimes that individuals commit a lot faster...
Words: 1265 - Pages: 6
...Biometrics within Financial Institutions Abstract This paper presents a problem with the use of technology within the Credit Unions and Banking industries. Technological innovations have allowed the industry to be more open to consumers and challenges that the current economy has posed. Modern technology is also change the landscape of how, when and where business is conducted with financial institutions and consumers, businesses, and other organizations. Technology driven issues such as privacy, security and trust, have been pushed to the forefront, which makes the line between mobile banking and banking online increasing difficult to distinguish. Credit Unions like other banking institutions rely on gathering, processing, analyzing and providing information to meet the demands of the consumer. Given the importance of information systems within banking its not surprising to find, risks within the systems are developing in nature. History Truliant Federal Credit Union was started in Winston-Salem, North Carolina around 1952. They serve over 180,000 member owners and more than 900 business and organizations with $1.6 billion in assets. Truliant as it will be referred to in this paper has 21 financial locations in North Carolina, South Carolina, and Virginia. One philosophy that stands out or is a representation of what this particular Credit Union stands for is “ people helping people”. Like other not for profit organizations, they provide individuals and small business with...
Words: 1787 - Pages: 8