Introduction to How Fingerprint
● Computerized fingerprint scanners have
been a mainstay of spy thrillers for de
cades, but up until recently, they were
pretty exotic technology in the real wo
● In this article, we'll examine the secr
ets behind this exciting development in
law enforcement and identity security.
● Fingerprints are one of those bizarre t
wists of nature.
● Human beings happen to have built-in, e
asily accessible identity cards.
● You have a unique design, which represe
nts you alone, literally at your finger
● A fingerprint scanner system has two ba
sic jobs -- it needs to get an image of
your finger, and it needs to determine
whether the pattern of ridges and valle
ys in this image matches the pattern of
ridges and valleys in pre-scanned image
● Like optical scanners, capacitive finge
rprint scanners generate an image of th
e ridges and valleys that make up a fin
● But instead of sensing the print using
light, the capacitors use electrical cu
● n movies and TV shows, automated finger
print analyzers typically overlay vario
us fingerprint images to find a match.
● In actuality, this isn't a particularly
practical way to compare fingerprints.
Pros and Cons
● There are several ways a security syste
m can verify that somebody is an author
● Most systems are looking for one or mor
e of the following:
● What you have
● What you know
● Who you are