Friday, July 12, 2013

Different Kinds Of Biometric Devices

Biometrics capture, process, store and compare personal identification traits.


Personal identification methods have been advancing through the study of biometrics. As technology progresses, inexpensive, user-friendly identification techniques are becoming the norm. Permanent identification applications are being relied upon for business and private use which focus on distinguishable traits that cannot be lost or stolen. Networks that communicate and share single-person identification data are being developed, eliminating the need for passwords and decreasing the problem of identity theft.


Fingerprint and Hand Scanners


Fingerprint scanning eliminates the need for multiple passwords.


Biometric fingerprint scanners capture and process a person's fingerprints. Each person's fingerprints are unique and can only be used to identify that person. Fingerprint scanners allow a person to imprint their fingerprint into a device that stores and is able to compare it against other fingerprints. Fingerprinting technology has advanced allowing fingerprint scanners to be installed in laptop computers, at ATMs, in real estate lockboxes, as employee recognition in schools and businesses and for national security purposes.


Hand scanners are similar to fingerprint scanners except they authenticate features of the complete hand, measuring lengths and thickness of fingers, curves and bone structures of fingers and surface area of palms. Because many hand traits can be disturbed by injury, hand scanning is often used with other types of biometric identification.


Facial Recognition Cameras


Cameras are used in facial recognition biometrics.


Cameras are used in biometric facial recognition technology. Main features of the face are captured, while expressions, piercings and facial hair like beards and mustaches are not. Infrared cameras are used to detect heat patterns in the face. Some facial recognition devices incorporate several cameras to capture more detail and reduce light interference. Facial recognition is not reliable for identifying people through photographs and cannot identify people wearing masks.


Voice Recognition Microphones


Microphones record unique voice characteristics.


Microphones tape the acoustics and inflections in a person's voice. Voices are distinguished by physical shape and build of the mouth and throat, age and learned behavior related to culture, tone, pitch and volume. Voice recognition software usually uses a password to digitize a person's voice, filtering out unique characteristics. It is used for security purposes and has also become an invaluable tool for physically disabled people, making it easier for them to use computers and function in society.


Iris Scanners


Portable iris scanners detect distinguishable traits in eyes.


Iris scanners detect individual traits of a person's eye. They are often portable devices used mainly to track people. Recent software developments have been improved so that iris detection works when a person is wearing contacts or glasses. Prison guards use iris scanners to track prisoners, strengthening security and monitoring inmate arrivals and departures.


Signature Pads


Computerized signatures protect against forgery and identity theft.


Signature pads are becoming commonplace in retail outlets. They capture and process a person's signature. These biometric devices perform handwriting analysis, pauses during writing, rate of speed used when writing and pressure applied when writing. Advancements in signature pad technology limit forgery of documents, lessening the chances of identity theft. Signature pads are used with increasing frequency in Internet business.







Tags: capture process, facial recognition, identity theft, Cameras used, capture process person, distinguishable traits, fingerprint scanners