Fingerprint- biometric computer security systems, Computer Engineering

Fingerprint- Biometric computer security systems

First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and they exist on human's important tools which are hands and foot (Han & Moon, 2008). For this reason, fingerprint technology was firstly used on police cases investigation in the early age due to the unique recognition from human. However, on nowadays, because of the rapid development of technology, fingerprint technology has been mixed with personal computer security system. For example, a large amount of modern laptops contain fingerprint scanner which builds up a unique path for user to access the computer. Thereby, this security technology can be quickly popularized to a majority of computer users. Furthermore, users' data and information in computers can be effectively protected with this technology.

2221_Fingerprint- Biometric computer security systems.png

Although fingerprint security technology provides users a safe pathway for accessing computer, it also contains various problems and disadvantages. Firstly, fingerprints of human are slightly changing with the growing of human, especially teenagers (Han & Moon, 2008). This can lead to the security devises having problems in identifying human's fingerprints. Fingerprint security technology also occupies an irreplaceable role on personal computer protection though it can not become the perfect tool.

 

Posted Date: 4/2/2013 2:45:48 AM | Location : United States







Related Discussions:- Fingerprint- biometric computer security systems, Assignment Help, Ask Question on Fingerprint- biometric computer security systems, Get Answer, Expert's Help, Fingerprint- biometric computer security systems Discussions

Write discussion on Fingerprint- biometric computer security systems
Your posts are moderated
Related Questions
Sir,wish to receive guidance from you how to join in Aeronautical Engineering after Bsc Computer Science. I am a Girl.Interested to work in AE field, it will be better to use in co

Byteland county is very famous for luminous jewels. Luminous jewels are used in making beautiful necklaces. A necklace consists of various luminous jewels of particular colour. Nec

Describe the various signalling techniques. Signaling systems link the variety of transmission systems, switching systems and subscriber elements in telecommunication network

Optical storage - computer architecture: Optical storage, the distinctive Optical disc, stores information in deformities on the surface of a circular disc and reads this info

Explain Message switching. Recourse computer sends data to switching office that stores the data into buffer and seems for a free link. Sends link to other switching office, if

Define throughput?  Throughput in CPU scheduling is the number of processes that are completed per unit time. For long processes, this rate might be one process per hour; for s

Describe a console application project to show the different formatting styles used in display methods(i.e.Console.writeLine()).

Q. Convert the following into SOP form   1. (A+B) (B'+C) (A'+ C) 2. (A+C) (AB'+AC) (A'C'+B) 3. (A'+B') (C'+B)   Q.Convert the following into POS form   1. WYZ + XYZ + W'X'

Hypertext vs Hypermedia     Hypertext is basically the similar as regular text - it can be stored, read, searched, or edited - with a significant exception: hypertext having co

Define secondary memory. This memory holds those pages that are not present in main memory. The secondary memory is usually a high speed disk. It is known as the swap evice, an