Fingerprint- biometric computer security systems, Computer Engineering

Fingerprint- Biometric computer security systems

First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and they exist on human's important tools which are hands and foot (Han & Moon, 2008). For this reason, fingerprint technology was firstly used on police cases investigation in the early age due to the unique recognition from human. However, on nowadays, because of the rapid development of technology, fingerprint technology has been mixed with personal computer security system. For example, a large amount of modern laptops contain fingerprint scanner which builds up a unique path for user to access the computer. Thereby, this security technology can be quickly popularized to a majority of computer users. Furthermore, users' data and information in computers can be effectively protected with this technology.

2221_Fingerprint- Biometric computer security systems.png

Although fingerprint security technology provides users a safe pathway for accessing computer, it also contains various problems and disadvantages. Firstly, fingerprints of human are slightly changing with the growing of human, especially teenagers (Han & Moon, 2008). This can lead to the security devises having problems in identifying human's fingerprints. Fingerprint security technology also occupies an irreplaceable role on personal computer protection though it can not become the perfect tool.

 

Posted Date: 4/2/2013 2:45:48 AM | Location : United States







Related Discussions:- Fingerprint- biometric computer security systems, Assignment Help, Ask Question on Fingerprint- biometric computer security systems, Get Answer, Expert's Help, Fingerprint- biometric computer security systems Discussions

Write discussion on Fingerprint- biometric computer security systems
Your posts are moderated
Related Questions
Appropriate Problems for ANN learning - artificial intelligence-  As we did for decision trees, it is essential to know when ANNs are the correct representation scheme for the

In the module on WSDL you were presented with the details of the WSDL service that receives a request for a stock market quote and returns the quote. The basic structure of a WSDL

Now when a site structure is set up for storing pages and assets for Compass site, you'll create the first page-a home page for the site. As you build this page, you will add text,

Describe the construction and working of michelson iinterferometer.describe the formation of different types of fringes in Michaelson''s interferometer

What are the main differences between OSI and TCP/ IP reference models? Explain briefly. We will be considering only on the key differences among the two references models. Th

Diagnosis: Medical diagnosis program bases on probabilistic analysis have been able to perform at the level of an expert physician tin several areas of medicine. Heckerman(1981)

1's complement representation of decimal number of -17 by using 8 bit representation is ? Ans. (17) 10 = (10001) 2 In 8 bit = 00010001 1's Complement = 11101110

Aim: Build a program or application which gives an interface to the user to maintain his personal account for E-mails & should be able to work on the following applications. Des

How are interrupt handled by the operating system? The fundamental interrupt mechanism works as follows: The CPU hardware has wire called the interrupt-request line which

#what is decoders? explain with diagram