SlideShare a Scribd company logo
1 of 16
Authentication
The process of verifying that a user requesting a
network resource is the one who he/she claims to be, and
vice versa.
Conventional authentication methods
„something that you have“ – key, magnetic card or smartcard
„something that you know“ – PIN or password
Biometric authentication uses personal features
„something that you are“
What is biometricsWhat is biometrics ??
Biometrics refers to technologies that
mesures and analyze human body characteristics,
such as DNA, fingerprints,eye retinas and irises,
voice patterns, facial patterns and hand
measurements for authentication purpose.
AdvantagesAdvantages ::
 No more forgotten or stolen passwords.
 Positive and accurate Identification.
 Highest level of security.
 Offers Mobility.
 Impossible to forge.
 Serves as a key that can’t be transferred.
 Safe and user friendly.
Application Domains :Application Domains :
Access control
to devices
• cellular phones
• logging into a computer, laptop, or PDA
• cars
• Guns
to local services
• debitting money from a cash dispenser
• logging in to computer
• accessing data on smartcard
to remote services
• e-commerce
• e-business
Physical access control
 to high security areas
 to public buildings or areas
Time & attendance control
 In schools ,colleges and offices
Identification
 forensic person investigation
 social services applications, e.g. immigration or
prevention of welfare fraud
 personal documents, e.g. electronic drivers license
or ID card
Types of Biometric sensors:Types of Biometric sensors:
Fingerprint
Face Recognition
Hand Geometry
Iris Scan
Voice Scan
Retina Scan
DNA
FingerprintFingerprint
Optical fingerprint sensor
[Fingerprint Identification Unit
FIU-001/500 by Sony]
Physical Access Control System
[BioGate Tower by Bergdata]
Face RecognitionFace Recognition
Hand GeometryHand Geometry
Iris ScanIris Scan
Retina ScanRetina Scan
Voice ScanVoice Scan
DNADNA
Biometrics

More Related Content

What's hot

Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)satyamswet
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasTenet Systems Pvt Ltd
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilitySamsung SDS America
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment SystemsAmit Naik
 
Computer's project
Computer's projectComputer's project
Computer's projectAbdullah555
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationLarry Kluger
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics PosterFaisal Razzak
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometricijtsrd
 

What's hot (20)

Estonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileIDEstonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileID
 
Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
 
L1 - DAS Family
L1 - DAS FamilyL1 - DAS Family
L1 - DAS Family
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment Systems
 
Computer's project
Computer's projectComputer's project
Computer's project
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital Transformation
 
Usher overview.2014.02 hi
Usher overview.2014.02 hiUsher overview.2014.02 hi
Usher overview.2014.02 hi
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics Poster
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 

Viewers also liked

Viewers also liked (15)

Pinhao indigena - PARANÁ
Pinhao indigena -  PARANÁPinhao indigena -  PARANÁ
Pinhao indigena - PARANÁ
 
Circular exhibición judo v.navalazarza 2014
Circular exhibición judo v.navalazarza 2014Circular exhibición judo v.navalazarza 2014
Circular exhibición judo v.navalazarza 2014
 
00 capa
00 capa00 capa
00 capa
 
Producto en oferta (i)
Producto en oferta (i)Producto en oferta (i)
Producto en oferta (i)
 
Marketing e Empreendedorismo - YouTube
Marketing e Empreendedorismo - YouTubeMarketing e Empreendedorismo - YouTube
Marketing e Empreendedorismo - YouTube
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TOR
 
Rúbrica prueba
Rúbrica pruebaRúbrica prueba
Rúbrica prueba
 
Prueba
PruebaPrueba
Prueba
 
Practica de laboratorio n3
Practica de laboratorio n3Practica de laboratorio n3
Practica de laboratorio n3
 
Escala de actitud
Escala de actitudEscala de actitud
Escala de actitud
 
Evaluacion: concepto, tipología y objetivos
Evaluacion: concepto, tipología y objetivosEvaluacion: concepto, tipología y objetivos
Evaluacion: concepto, tipología y objetivos
 
Tor
TorTor
Tor
 
Obsesión
ObsesiónObsesión
Obsesión
 
Anhelo
AnheloAnhelo
Anhelo
 
Listo
ListoListo
Listo
 

Similar to Biometrics

Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometricszia balti
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBahaa Abdulhadi
 
Remote Identity Verification: The Ultimate Guide
Remote Identity Verification: The Ultimate GuideRemote Identity Verification: The Ultimate Guide
Remote Identity Verification: The Ultimate GuideFTx Identity
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...GQ Research
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
The Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationThe Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationFTx Identity
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometricsijbuiiir1
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Boosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe SolutionsBoosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe SolutionsScoreme Solutions
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincIdentity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincViolet Le, MBA MIS
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Mobile technologies know your customers
Mobile technologies  know your customersMobile technologies  know your customers
Mobile technologies know your customersMyles Freedman
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Girish Kengar
 

Similar to Biometrics (20)

Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
Remote Identity Verification: The Ultimate Guide
Remote Identity Verification: The Ultimate GuideRemote Identity Verification: The Ultimate Guide
Remote Identity Verification: The Ultimate Guide
 
Biometric
 Biometric Biometric
Biometric
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
The Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationThe Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity Verification
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Boosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe SolutionsBoosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe Solutions
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincIdentity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSinc
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Mobile technologies know your customers
Mobile technologies  know your customersMobile technologies  know your customers
Mobile technologies know your customers
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
ConfidentID_broc
ConfidentID_brocConfidentID_broc
ConfidentID_broc
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Biometrics

  • 1.
  • 2. Authentication The process of verifying that a user requesting a network resource is the one who he/she claims to be, and vice versa. Conventional authentication methods „something that you have“ – key, magnetic card or smartcard „something that you know“ – PIN or password Biometric authentication uses personal features „something that you are“
  • 3. What is biometricsWhat is biometrics ?? Biometrics refers to technologies that mesures and analyze human body characteristics, such as DNA, fingerprints,eye retinas and irises, voice patterns, facial patterns and hand measurements for authentication purpose.
  • 4. AdvantagesAdvantages ::  No more forgotten or stolen passwords.  Positive and accurate Identification.  Highest level of security.  Offers Mobility.  Impossible to forge.  Serves as a key that can’t be transferred.  Safe and user friendly.
  • 5. Application Domains :Application Domains : Access control to devices • cellular phones • logging into a computer, laptop, or PDA • cars • Guns to local services • debitting money from a cash dispenser • logging in to computer • accessing data on smartcard to remote services • e-commerce • e-business
  • 6. Physical access control  to high security areas  to public buildings or areas Time & attendance control  In schools ,colleges and offices Identification  forensic person investigation  social services applications, e.g. immigration or prevention of welfare fraud  personal documents, e.g. electronic drivers license or ID card
  • 7. Types of Biometric sensors:Types of Biometric sensors: Fingerprint Face Recognition Hand Geometry Iris Scan Voice Scan Retina Scan DNA
  • 8. FingerprintFingerprint Optical fingerprint sensor [Fingerprint Identification Unit FIU-001/500 by Sony] Physical Access Control System [BioGate Tower by Bergdata]
  • 13.

Editor's Notes

  1. To view this presentation, first, turn up your volume and second, launch the self-running slide show.