The Pedanandipadu College Of Arts & Science. Biometrics ABSTRACT: In networking environment, security is a crucial factor. It is not easy to maintain security to confidential matters using Password security mechanism all the time.
1. Biometric time clocks
The Pedanandipadu College Of Arts & Science. Biometrics ABSTRACT: In networking environment,
security is a crucial factor. It is not easy to maintain security to confidential matters using Password
security mechanism all the time. So, we need a good security mechanism for all categories of data like
confidential, secret, non-secret and public. The security mechanism that ful fill the security of all the
categories of data is Biometrics. This term Biometrics is a combination of two words, 'Bio' means 'life',
which is related to biological study and -˜Metric' means measurement. Thus Biometrics means "security
through human measurements". Security of pages in the Network is an important factor in Internet. As
the usage of Internet has tremendously increased, security has become a serious issue. So, we need a
security mechanism that provides a great security from all types of Hackers and Intruders. Biometrics
has solved all these problems and became a super security mechanism. As for every good, there is an
evil, there are some disadvantages for Biometrics too. But they are very minimal when compared to
other security mechanisms. They are some techniques used in Biometrics for security.
This paper presents the various techniques used in Biometrics. They are two types of techniques used in
Biometrics. They are Token-based security mechanism and secret based security mechanism. Biometrics
also provides Permissions depending on the type of users. The users may be of various types like System
Administrator, Database owners, Database object owners and Database users. This paper also presents
the various verification methods involved in Biometrics. The various verification methods are
psychological verification methods and behavioural verification methods. psychological verification
methods involve the verifications of finger prints, hand prints, face measurements, Retinal scans and
DNA analysis. Behavioural verification methods involve signatures, typing and voice. Finally this paper
ends with the Advantages and Limitations of biometric time clocks with a conclusion.
INTRODUCTION:
Biometrics is an advanced technology for superb security and authentication .The very term "biometric-
• represents biological measurement , in which "bio" means something that is related to the biological
study and "metric " means something, which is related to measurement. In network environment ,
security is a crucial factor. Providing security to the pages in the network is too difficult. Password is not
a good measurement for security. Good security mechanism is necessary on the Internet. Security in
different levels applies to various documents. Security depends on how security assign to documents.
Security depends on following categories.
1.Confidential 2.Secret 3.Non-secret 4.Public
Biometric is a technology where the password entry is you, which identifies Your psychological and
behavioral characteristics.
2. Confidential pages over the network require full security. Tampering of data in the page by third party
should not be allowed. In this case , biometrics are more useful and there will be no way to disturb the
page contents. First of all store all the data on biometrics in database after that tally the data of the user
with this data. If tally satisfies with backend then provide access to the user. Collecting information is
too difficult and storing in the database also needs more space.
There are two security methodologies in Biometrics, they are
1.Token-based security:It relies on the users special item token like card-id.
2.Secret based security:it relies on an individual secret id number like password.ANALYSIS:
METHODS OF VERIFICATION:
1).PSYCHOLOGICAL VERIFICATION METHOD:
Psychological Verification involves the verification of the organs of the human being, which will have
unique identification and does not match with others.
There are five types of verifications. These are:
I.Fingerprint.II.Handprint. III.Face measurement. IV. Retinal scans.V.DNA analysis.
I.Finger print:It is one of the security verification methods in which the authorized person is identified
through the unique finger prints. This method is popular since every person will have unique finger
prints. It involves the user placing his finger over a glass-plate, which resides over a high-resolution
camera, which uses optical or electromagnetic means to take its snapshot. For this verification method,
first of all some collection of authorized finger prints should be stored in the database, so that when a
person's finger prints are scanned by the finger print device, person's finger prints are compared with
the information of finger prints stored in the database. If match is found, the person is treated as an
authorized person and the person is granted the access permissions. Otherwise the person is considered
as an unauthorized person and access is denied. The device that is used in finger print verification
method is as follows: In US super market, customers give their credit card information and other
personal details to store and tie it with their fingerprint data. The next time, he can pay for purchases
without a fingerprint.