Retina - biometric computer security systems, Computer Engineering

Retina - Biometric Computer Security Systems

The next security technology that explained in this report is retina security technology which is very famous in a lot of spy movie. Although retina is an outstanding and perfect security device, it can not be popularized in human’s daily life. Firstly, retina contains a large amount of vessels which absorbs more light than the surrounding area. The retina scanner device can recognize retina by casting a ray of low energy light into human’s retina when they see through the device. However, according to Biometric Scanner (2009), the person who wants to be recognized should concentrate his eyes on the scanner device for more than 10 seconds. The description stated above is the principle of operating retina scanning device.

342_Retina - Biometric Computer Security Systems.png

According to the principle of retina scanner, it is actually a dependable security system. However, a lot of scientists continually study for the ray from the device because users still doubt whether the ray is harmful for human’s eyesight or not (Biometric Scanner 2009). Furthermore, using this security system is not only time consuming, but also making user uncomfortable due to the 10 seconds concentration. With this drawbacks and the expense, retina can not be commonly used at present society.

Posted Date: 4/2/2013 2:50:02 AM | Location : United States







Related Discussions:- Retina - biometric computer security systems, Assignment Help, Ask Question on Retina - biometric computer security systems, Get Answer, Expert's Help, Retina - biometric computer security systems Discussions

Write discussion on Retina - biometric computer security systems
Your posts are moderated
Related Questions
What is time out mechanism. If one unit is faulty the data transfer will not be done. Such an error can be detected using time out mechanism which makes an alarm if the data tr

Q. Programming with loops and comparisons? This segment deals with more practical illustrations employing comparison, loops and shift instructions. Simple Program Loops

Resource Dependence The parallelism between instructions can also be affected because of the shared resources. If two instructions are occupying the same shared resource then i

Your company is planning a party for employees, and you have been asked to set up a spreadsheet to track the attendees and to measure the associated cost. Every employee is permitt

Analysis Iteration   To understand any problem completely you have to repeat task which implies that analysis requires repetition. First, just get overview of problem, make a r

Give an account of modems used in data transfer. Modem: Modems are usually provided through network operators (Department of Telecommunication in India) or through vendors wh

What is a multiple line field? A multiple line field is a special part of field which allows the user to enter multiple lines of data into it.

how can i explain dynamic hashing

Driver software is software that works as a translator among another program and some piece of hardware. In the software industry, there are commonly standard ways to do things. Th

What is the binary equivalent of the decimal number 368 ? Ans. 101110000 is the Binary equivalent of the Decimal number 368. From Decimal number to Binary number conversioni