Tech Search

Custom Search

Thursday, February 19, 2009

Finger print authentication (Basics)

Finger print authentication
Now a days, there are number of technologies have emerged to meet out the security aspects. In this series, fingerprint authentication plays a major role. Fingerprints differs person to person which can be used in security systems.
For example the fingerprints are used for the following applications
PC access, PC network access and Access to rooms (key replacement), Safety on weapons: no access for children and other unauthorized users, Mobile phones: network access, theft protection, mobile financial transactions, ID: company pass, personal identification, club ID, Credit cards, bank cards, EC cards Automobile: Seats, mirrors, temperature, and other personal settings Automation of hotels (e.g., check-in and room access) Company vending machines (soft drinks) Participation in sporting events Personal access to patient records Almost all the fields have need of the usage of this technology.
The fingerprint of one person differ from another one with respect to the following Coarse features (loops, arch, whorls), Fine features (minutia), and Pore structure Coarse features have strong genotypic contributions and are suited for presorting during an identification with a very large data base.
The minutia are predominantly
randotypic in nature and cause most of the uniqueness in a fingerprint. Therefore, either directly or indirectly, almost all fingerprint systems examine minutia. Pore structure is rarely used, due to large fluctuations in the quality of the scanning procedure.
The most prominent way to recognize a fingerprint is to compare the minutiae. These are the endings and the branching of the finger lines.

No comments:

Related Blogs

Related Posts with Thumbnails