Fingerprint- biometric computer security systems, Computer Engineering

Fingerprint- Biometric computer security systems

First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and they exist on human's important tools which are hands and foot (Han & Moon, 2008). For this reason, fingerprint technology was firstly used on police cases investigation in the early age due to the unique recognition from human. However, on nowadays, because of the rapid development of technology, fingerprint technology has been mixed with personal computer security system. For example, a large amount of modern laptops contain fingerprint scanner which builds up a unique path for user to access the computer. Thereby, this security technology can be quickly popularized to a majority of computer users. Furthermore, users' data and information in computers can be effectively protected with this technology.

2221_Fingerprint- Biometric computer security systems.png

Although fingerprint security technology provides users a safe pathway for accessing computer, it also contains various problems and disadvantages. Firstly, fingerprints of human are slightly changing with the growing of human, especially teenagers (Han & Moon, 2008). This can lead to the security devises having problems in identifying human's fingerprints. Fingerprint security technology also occupies an irreplaceable role on personal computer protection though it can not become the perfect tool.

 

Posted Date: 4/2/2013 2:45:48 AM | Location : United States







Related Discussions:- Fingerprint- biometric computer security systems, Assignment Help, Ask Question on Fingerprint- biometric computer security systems, Get Answer, Expert's Help, Fingerprint- biometric computer security systems Discussions

Write discussion on Fingerprint- biometric computer security systems
Your posts are moderated
Related Questions
A dialog box, generally square, that records an on or off value.

N number of XNOR gates is linked in series that is the N inputs (A0, A1, A2......) are specified in the subsequently way: A0 and A1 to first XNOR gate and A2 and O/P of First XNOR

Define various security protocols used for e-commerce applications. The e-commerce systems of today are composed of very many components as like: a commerce server, client soft

For this phase of the project you are required to formulate a social media strategy for a product/service/business/concept/charity...etc. the strategy can include technologies such

Instruction Cycle The instruction cycle consists of a series of steps required for the execution of an Instruction in a program. A distinctive instruction in a program is compo

Q. What is Switched Mode Power Supply? SMPS is the unit into which electric supply from the mains is connected to your PC and this supplies DC to internal circuits. It is more

The scheduling in which CPU is allocated to the process with least CPU-burst time is called? Ans. Shortest job first Scheduling wherein CPU is allocated to the process with lea

What are the advantages and disadvantages of a Smart Card?    Advantages of Smart Card: 1. It gives convenience & support for multiple currencies over borders. 2. Used

Table, TR and TD Tags Three tags form the essential ingredients for creating a table. TABLE: This is the main tag. It tells the browser that a table follows. It has attrib

Differentiate between Hardware and Software Another classification is software vs. hardware. Hardware is the collection of physical components, like chips, wires, PCBs, connect