Fingerprint- biometric computer security systems, Computer Engineering

Fingerprint- Biometric computer security systems

First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and they exist on human's important tools which are hands and foot (Han & Moon, 2008). For this reason, fingerprint technology was firstly used on police cases investigation in the early age due to the unique recognition from human. However, on nowadays, because of the rapid development of technology, fingerprint technology has been mixed with personal computer security system. For example, a large amount of modern laptops contain fingerprint scanner which builds up a unique path for user to access the computer. Thereby, this security technology can be quickly popularized to a majority of computer users. Furthermore, users' data and information in computers can be effectively protected with this technology.

2221_Fingerprint- Biometric computer security systems.png

Although fingerprint security technology provides users a safe pathway for accessing computer, it also contains various problems and disadvantages. Firstly, fingerprints of human are slightly changing with the growing of human, especially teenagers (Han & Moon, 2008). This can lead to the security devises having problems in identifying human's fingerprints. Fingerprint security technology also occupies an irreplaceable role on personal computer protection though it can not become the perfect tool.

 

Posted Date: 4/2/2013 2:45:48 AM | Location : United States







Related Discussions:- Fingerprint- biometric computer security systems, Assignment Help, Ask Question on Fingerprint- biometric computer security systems, Get Answer, Expert's Help, Fingerprint- biometric computer security systems Discussions

Write discussion on Fingerprint- biometric computer security systems
Your posts are moderated
Related Questions
What are the basic approaches to the design of subscriber access to Strowger systems? Describe them. A step by step switching system has three main parts as demonstrated in fig

Illustrate about the single inheritance During inheritance, superclass feature may by override by a subclass defining that feature with the same name. The overriding features (

What are synchronous counters? Design a Mod-5 synchronous counter using J-K Flip-Flops. Ans. Synchronous Counters : It means that all flip-flops are clocked concurrently. T

Step 1: Choose File -> Import XML into Template Step 2: Select the XML file & click Open When an XML file is imported, Dreamweaver merges XML content in Template, which is be

Q. How to define a Filename in DOS? Each file is given a name so that it can be referred to later. This name is termed as Filename. The filename in DOS can be up to eight alpha

Common problem with Hill climbing: An alternative way of justifying the problem is that the states are boards with 8 queens already on them, so an action is a movement of one

Explain a binary semaphore with the help of an example? An abstract data type (ADT) is a semaphore which defines a nonnegative integer variable that apart from initialization i

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

Q. Computational Fluid Dynamics? Computational Fluid Dynamics: CFD was a FORTRAN like language developed in the early 70s at "Computational Fluid Dynamics Branch of Ames Resear

The real power of arrays comes from their facility of using an index variable to traverse the array, accessing every element with the similar expression a[i]. All the is required t