Fingerprint- biometric computer security systems, Computer Engineering

Fingerprint- Biometric computer security systems

First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and they exist on human's important tools which are hands and foot (Han & Moon, 2008). For this reason, fingerprint technology was firstly used on police cases investigation in the early age due to the unique recognition from human. However, on nowadays, because of the rapid development of technology, fingerprint technology has been mixed with personal computer security system. For example, a large amount of modern laptops contain fingerprint scanner which builds up a unique path for user to access the computer. Thereby, this security technology can be quickly popularized to a majority of computer users. Furthermore, users' data and information in computers can be effectively protected with this technology.

2221_Fingerprint- Biometric computer security systems.png

Although fingerprint security technology provides users a safe pathway for accessing computer, it also contains various problems and disadvantages. Firstly, fingerprints of human are slightly changing with the growing of human, especially teenagers (Han & Moon, 2008). This can lead to the security devises having problems in identifying human's fingerprints. Fingerprint security technology also occupies an irreplaceable role on personal computer protection though it can not become the perfect tool.


Posted Date: 4/2/2013 2:45:48 AM | Location : United States

Related Discussions:- Fingerprint- biometric computer security systems, Assignment Help, Ask Question on Fingerprint- biometric computer security systems, Get Answer, Expert's Help, Fingerprint- biometric computer security systems Discussions

Write discussion on Fingerprint- biometric computer security systems
Your posts are moderated
Related Questions
How does TCP achieve reliability? One of the most significant technologies is retransmission. While TCP stands data the sender compensates for packet loss through implementing

Define user space? The system space is divided from virtual address space in which the user application programs reside. The letter space is known as user space.

Can a structure be used within a structure? Yes , a structure can be used within a structure known as nesting of structures.

Web server security through SSL (Secure Socket Layer) As it is well known that the Intranets and internet are purely based on use of powerful web servers to deliver information

What are prefetch instructions? Prefetch instructions are those instructions which can be inserted into a program either by the programmer or by the compiler.

Instruction Length: Variable-length instructions (Intel 80x86, VAX) need multi-step fetch and decode, but permit for a much more flexible and compressed instruction set.

design a gray to bcd code converter using 16:1 de multiplexe

What is the binary equivalent of the decimal number 368 ? Ans. 101110000 is the Binary equivalent of the Decimal number 368. From Decimal number to Binary number conversioni

What are function modules? Function modules are general-purpose library routines that are available system-wide.

What are the disadvantages of Bespoke Software -  Very dependent on suppliers of the software; if they go out of business there would be little or no support if problems occ