Biometrics   authentication
Upcoming SlideShare
Loading in...5
×
 

Biometrics authentication

on

  • 214 views

Biometrics authentication

Biometrics authentication

Statistics

Views

Total Views
214
Views on SlideShare
214
Embed Views
0

Actions

Likes
0
Downloads
22
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Biometrics   authentication Biometrics authentication Presentation Transcript

  • Biometrics Authentication
  • What is Biometrics ? Biometrics -- technology that identifies you based on your physical or behavioral traits -- for added security. Biometrics can use physical characteristics, like your face, fingerprints, irises or veins, or behavioral characteristics like your voice, handwriting or typing rhythm.
  • You take basic security precautions every day -- you use a key to get into your house and log on to your computer with a username and password. You've probably also experienced the panic that comes with misplaced keys and forgotten passwords. It isn't just that you can't get what you need - if you lose your keys or jot your password on a piece of paper, someone else can find them and Can use them
  • Biometrics Today FINGERPRINTS RETINA PRINTS FACE PRINTS DNA IDENTIFICATION VOICE PRINTS PALM PRINTS HANDWRITING ANALYSIS ETC…
  • Fingerprint scanners are a popular type of biometric system
  • Biometrics in nootbook BIOMETRIC SECURITY SYSTEMS, LIKE THE FINGERPRINT SCANNER AVAILABLE ON THE IBM THINKPAD T43 (RIGHT), IS BECOMING MORE COMMON FOR HOME USE.
  • the nootbook Systems also use the biometrics authentication : A sensor that detects the characteristic being used for identification A computer that reads and stores the information Software that analyzes the characteristic, translates it into a graph or code and performs the actual comparisons
  • Hand and Finger Geometry TYPICAL SYSTEMS MEASURE DIFFERENT FEATURES: OVERALL HAND AND FINGER WIDTH DISTANCE BETWEEN JOINTS BONE STRUCTURE PRIMARILY FOR ACCESS CONTROL: MACHINE ROOMS OLYMPICS
  • Iris Scanning WHEN YOU LOOK INTO AN IRIS SCANNER, EITHER THE CAMERA FOCUSES AUTOMATICALLY OR YOU USE A MIRROR OR AUDIBLE FEEDBACK FROM THE SYSTEM TO MAKE SURE THAT YOU ARE POSITIONED CORRECTLY. USUALLY, YOUR EYE IS 3 TO 10 INCHES FROM THE CAMERA. WHEN THE CAMERA TAKES A PICTURE, THE COMPUTER LOCATES: THE CENTER OF THE PUPIL THE EDGE OF THE PUPIL THE EDGE OF THE IRIS THE EYELIDS AND EYELASHES IT THEN ANALYZES THE PATTERNS IN THE IRIS AND TRANSLATES THEM INTO A CODE.
  • Template Size Biometric Approx Template Size Voice 70k – 80k Face 84 bytes – 2k Signature 500 bytes – 1000 bytes Fingerprint 256 bytes – 1.2k Hand Geometry 9 bytes Iris 256 bytes – 512 bytes Retina 96 bytes
  • Thank you
  • HCL PRESENTED BY - DINESH KUMAR PRESENTATION TOIPC- BIOMETRICS AUTHENTICATION BACTH – HCNE 03 SAP CODE - 4001201076 TRINNER – Mr. SANDEEP DAHIYA