SlideShare a Scribd company logo
1 of 7
Download to read offline
How Fingerprint Scanners
         Work


       Week12
        s1180009 Takako Osada
Introduction
Computerized fingerprint scanners have
been a mainstay of spy thrillers for decades,
but up until recently, they were pretty exotic
technology in the real world. In the past few
years, however, scanners have started
popping up all over the place -- in police
stations, high-security buildings and even on
PC keyboards. In this article, we'll examine
the secrets behind this exciting development
in law enforcement and identity security.
Unique marker
Fingerprints are one of those bizarre twists
of nature. Human beings happen to have
built-in, easily accessible identity cards. Just
like the weather conditions that form clouds
or the coastline of a beach, the entire
development process is so chaotic that, in
the entire course of human history, there is
virtually no chance of the same exact
pattern forming twice. Consequently,
fingerprints are a unique marker for a
person, even an identical twin.
A fingerprint scanner system
 A fingerprint scanner system has two basic jobs.
   First, it needs to get an image of your finger.
Second, it needs to determine whether the pattern
 of ridges and valleys in this image matches the
   pattern of ridges and valleys in pre-scanned
   images. The heart of an optical scanner is a
   charge coupled device (CCD), the same light
    sensor system used in digital cameras and
     camcorders. Typically, an analog-to-digital
  converter in the scanner system processes the
    analog electrical signal to generate a digital
             representation of this image.
How to get an image of one's
               finger
The scanning process starts when you place your
finger on a glass plate, and a CCD camera takes
a picture. The scanner has its own light source,
typically an array of light-emitting diodes, to
illuminate the ridges of the finger. Before
comparing the print to stored data, the scanner
processor makes sure the CCD has captured a
clear image. If the processor finds that the image
is crisp and properly exposed, it proceeds to
comparing the captured fingerprint with
fingerprints on file.
Capacitive sensor
Like optical scanners, capacitive fingerprint
scanners generate an image of the ridges and
valleys that make up a fingerprint. But instead of
sensing the print using light, the capacitors use
electrical current. The sensor is made up of one
or more semiconductor chips containing an array
of tiny cells. Each cell includes two conductor
plates, covered with an insulating layer. The
sensor is connected to an integrator, an electrical
circuit built around an inverting operational
amplifier. The inverting amplifier is a complex
semiconductor device, made up of a number of
transistors, resistors and capacitors.
Advantage of the capacitive
           sensor
The main advantage of a capacitive scanner
is that it requires a real fingerprint-type
shape, rather than the pattern of light and
dark that makes up the visual impression of
a fingerprint. This makes the system harder
to trick. Additionally, since they use a
semiconductor chip rather than a CCD unit,
capacitive scanners tend to be more
compact that optical devices.

More Related Content

What's hot

Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27s1170050
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners WorkKS
 
Adaptive Learning through Visual Sensor
Adaptive Learning through Visual SensorAdaptive Learning through Visual Sensor
Adaptive Learning through Visual SensorSyed Muhammad Bilal
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Introduction to Capacitive Sensing Part1
Introduction to Capacitive Sensing Part1Introduction to Capacitive Sensing Part1
Introduction to Capacitive Sensing Part1Premier Farnell
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Workoceanflying
 
Quantum film image sensing ppt
Quantum film image sensing pptQuantum film image sensing ppt
Quantum film image sensing pptayush1191
 
Kinect presentation
Kinect presentationKinect presentation
Kinect presentationAnkur Sharma
 
Eet3131 ccd cmos_presentation2
Eet3131 ccd cmos_presentation2Eet3131 ccd cmos_presentation2
Eet3131 ccd cmos_presentation2djehlke
 
Capacitive Sensing Design in Minutes - Capsense Capacitive Sensors
Capacitive Sensing Design in Minutes - Capsense Capacitive SensorsCapacitive Sensing Design in Minutes - Capsense Capacitive Sensors
Capacitive Sensing Design in Minutes - Capsense Capacitive SensorsDaniel Smith
 

What's hot (19)

Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
assignment
assignmentassignment
assignment
 
Scanner
ScannerScanner
Scanner
 
Virtual reality
Virtual reality Virtual reality
Virtual reality
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
 
Adaptive Learning through Visual Sensor
Adaptive Learning through Visual SensorAdaptive Learning through Visual Sensor
Adaptive Learning through Visual Sensor
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Touch screens
Touch screensTouch screens
Touch screens
 
Introduction to Capacitive Sensing Part1
Introduction to Capacitive Sensing Part1Introduction to Capacitive Sensing Part1
Introduction to Capacitive Sensing Part1
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Quantum film image sensing ppt
Quantum film image sensing pptQuantum film image sensing ppt
Quantum film image sensing ppt
 
Kinect presentation
Kinect presentationKinect presentation
Kinect presentation
 
Eet3131 ccd cmos_presentation2
Eet3131 ccd cmos_presentation2Eet3131 ccd cmos_presentation2
Eet3131 ccd cmos_presentation2
 
Capacitive Sensing Design in Minutes - Capsense Capacitive Sensors
Capacitive Sensing Design in Minutes - Capsense Capacitive SensorsCapacitive Sensing Design in Minutes - Capsense Capacitive Sensors
Capacitive Sensing Design in Minutes - Capsense Capacitive Sensors
 
week12
week12week12
week12
 
Kinect
KinectKinect
Kinect
 
Kadai2
Kadai2Kadai2
Kadai2
 

Viewers also liked

11 slides brand architecture m2m_ralph_sherman_2013
11 slides brand architecture m2m_ralph_sherman_201311 slides brand architecture m2m_ralph_sherman_2013
11 slides brand architecture m2m_ralph_sherman_2013Madison2Main
 
The latest technology in education- 3D Printer
The latest technology in education- 3D PrinterThe latest technology in education- 3D Printer
The latest technology in education- 3D PrinterShanyu See
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Fingerprint Attendance System
Fingerprint Attendance SystemFingerprint Attendance System
Fingerprint Attendance Systemsandeep pawar
 
computer history and latest technology
computer history and latest technologycomputer history and latest technology
computer history and latest technologyVibrant academy
 
Fingerprint based voting machine ppt
Fingerprint based voting machine pptFingerprint based voting machine ppt
Fingerprint based voting machine pptitzmemidhu
 
Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rulesKUL2700
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machinesanthu652
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Suprema Time Attendance & Access Control- Grapple Technologies
Suprema Time Attendance & Access Control- Grapple TechnologiesSuprema Time Attendance & Access Control- Grapple Technologies
Suprema Time Attendance & Access Control- Grapple Technologiesnajidkt
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 

Viewers also liked (19)

Fingerprint Interoperability Seminar
Fingerprint Interoperability SeminarFingerprint Interoperability Seminar
Fingerprint Interoperability Seminar
 
11 slides brand architecture m2m_ralph_sherman_2013
11 slides brand architecture m2m_ralph_sherman_201311 slides brand architecture m2m_ralph_sherman_2013
11 slides brand architecture m2m_ralph_sherman_2013
 
The latest technology in education- 3D Printer
The latest technology in education- 3D PrinterThe latest technology in education- 3D Printer
The latest technology in education- 3D Printer
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Fingerprint Attendance System
Fingerprint Attendance SystemFingerprint Attendance System
Fingerprint Attendance System
 
Fingerprint attendance system
Fingerprint attendance systemFingerprint attendance system
Fingerprint attendance system
 
computer history and latest technology
computer history and latest technologycomputer history and latest technology
computer history and latest technology
 
Fingerprint based voting machine ppt
Fingerprint based voting machine pptFingerprint based voting machine ppt
Fingerprint based voting machine ppt
 
Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rules
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Suprema Time Attendance & Access Control- Grapple Technologies
Suprema Time Attendance & Access Control- Grapple TechnologiesSuprema Time Attendance & Access Control- Grapple Technologies
Suprema Time Attendance & Access Control- Grapple Technologies
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 

Similar to Week12group

How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Workguest13f6ca
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners works1180002
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignments1180051
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Workoceanflying
 
Input and output devices
Input and output devicesInput and output devices
Input and output devicesprofessorsawyer
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners WorkShota Suzuki
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behs1190106
 
Report On Image Sensors
Report On Image SensorsReport On Image Sensors
Report On Image Sensorspranavhaldar
 

Similar to Week12group (20)

How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Ex12
Ex12Ex12
Ex12
 
Week12
Week12Week12
Week12
 
2
22
2
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignment
 
Roy3
Roy3Roy3
Roy3
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
input devices By ZAK
input devices By ZAKinput devices By ZAK
input devices By ZAK
 
Kadai2
Kadai2Kadai2
Kadai2
 
Sw week12
Sw week12Sw week12
Sw week12
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Report On Image Sensors
Report On Image SensorsReport On Image Sensors
Report On Image Sensors
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Week12
  Week12  Week12
Week12
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Week12group

  • 1. How Fingerprint Scanners Work Week12 s1180009 Takako Osada
  • 2. Introduction Computerized fingerprint scanners have been a mainstay of spy thrillers for decades, but up until recently, they were pretty exotic technology in the real world. In the past few years, however, scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards. In this article, we'll examine the secrets behind this exciting development in law enforcement and identity security.
  • 3. Unique marker Fingerprints are one of those bizarre twists of nature. Human beings happen to have built-in, easily accessible identity cards. Just like the weather conditions that form clouds or the coastline of a beach, the entire development process is so chaotic that, in the entire course of human history, there is virtually no chance of the same exact pattern forming twice. Consequently, fingerprints are a unique marker for a person, even an identical twin.
  • 4. A fingerprint scanner system A fingerprint scanner system has two basic jobs. First, it needs to get an image of your finger. Second, it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. The heart of an optical scanner is a charge coupled device (CCD), the same light sensor system used in digital cameras and camcorders. Typically, an analog-to-digital converter in the scanner system processes the analog electrical signal to generate a digital representation of this image.
  • 5. How to get an image of one's finger The scanning process starts when you place your finger on a glass plate, and a CCD camera takes a picture. The scanner has its own light source, typically an array of light-emitting diodes, to illuminate the ridges of the finger. Before comparing the print to stored data, the scanner processor makes sure the CCD has captured a clear image. If the processor finds that the image is crisp and properly exposed, it proceeds to comparing the captured fingerprint with fingerprints on file.
  • 6. Capacitive sensor Like optical scanners, capacitive fingerprint scanners generate an image of the ridges and valleys that make up a fingerprint. But instead of sensing the print using light, the capacitors use electrical current. The sensor is made up of one or more semiconductor chips containing an array of tiny cells. Each cell includes two conductor plates, covered with an insulating layer. The sensor is connected to an integrator, an electrical circuit built around an inverting operational amplifier. The inverting amplifier is a complex semiconductor device, made up of a number of transistors, resistors and capacitors.
  • 7. Advantage of the capacitive sensor The main advantage of a capacitive scanner is that it requires a real fingerprint-type shape, rather than the pattern of light and dark that makes up the visual impression of a fingerprint. This makes the system harder to trick. Additionally, since they use a semiconductor chip rather than a CCD unit, capacitive scanners tend to be more compact that optical devices.