This website uses cookies to ensure you have the best experience. Learn more

Biometrics Essay

1931 words - 8 pages


Presented by
Ratna Sudha.R


1. Introduction
2. Security and authentication
3. Methods of verification
a. Psychological verification
i. Finger Print.
ii. Hand Print.
iii. Face Measurement.
iv. Retinal Scanning.
v. DNA Analysis.
b. Behavioral verification
i. Typing.
ii. Signature.
iii. Voice.
4. Identification.
5. Verification.
6. Advantages
7. Limitations
8. ...view middle of the document...

Token-based security:
It relies on the users special item -token like card-id.

2.Secret based security:
It relies on an individual secret id number like password.

Neither of the two can accurately determine whether the password that posses a token nor knows some secret information of the individual it represents. Tokens can be stolen and information can be guessed or fraudulently obtained.

Biometric is a technology where the password for entry is you, which identifies your psychological and behavioral characteristics.

Security and Authentication

Web-Based Enterprise Management (WBEM) supports a limited form of security for the Microsoft® Windows® 98 platform that involves validating a user's logon for the local machine and for remote access. A validated user is granted access to the entire Common Information Model (CIM) schema. WBEM does not secure system resources, such as individual classes, instances, and namespaces. Security is limited because Windows 98 is not a secure operating system and does not support file system or registry security.
All security-related information is represented by instances of WBEM system classes located in the Root\Security namespace. These classes and instances can only appear in the Root\Security namespace and must remain there permanently.
The WBEM Administrator application can be used to set permissions for WBEM users. It is similar to the User Manager application supplied with Microsoft® Windows NT®.
In WBEM, all security accounts are referred to as subjects. There are two types of subjects: user and group. Users are represented by instances of the NTLMUser system class, which describes individual users. Groups are represented by instances of the NTLMGroup system class, which describes multiple users. Both the NTLMUser and NTLMGroup classes derive indirectly from the subject system class, an abstract class that is not intended to be used for instantiation. More directly, NTLMUser derives from the generic User class and NTLMGroup derives from the generic Group class.


Microsoft SQL Server uses permissions to enforce database security. The SQL Server permissions system specifies which users are authorized to use which Transact-SQL statements, views, and stored procedures. The

ability to assign permissions is determined by each user's status (as SA, database owner, or database object owner). Permissions are set on database users or groups, not on login IDs.

Permission Hierarchy:

SQL Server's permissions system recognizes four types of users: the SA, database owners, database object owners, and other users of the database.
The different types of users exist in a hierarchy (explained in the following sections and illustrated below).

Only the SA and database owners can grant statement permissions to other users.

Different Security Mechanisms:
To help you understand the...

Other Papers Like Biometrics

The Benefits Of Biometrics Essay

730 words - 3 pages The Benefits of Biometrics By definition Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic (Campbell, 1995). More and more businesses are now using biometrics as a preferred measure over traditional methods involving passwords and PIN numbers for 2 reasons; The person being identified is required to be physically present at the point of identification

Iris Recognition Biometrics Essay

656 words - 3 pages Iris Recognition In the computer world, they say it is important to keep your eyes on the future, and in the research that follows, we're going to do just that. I am planning on exploring the ins and outs of iris recognition biometrics. Whether we like it or not, biometrics are here to stay and are becoming more and more popular as each year passes. Although the automated method of iris recognition has only existed in patent since 1994, an

Aarkstore - Saudi Arabia Biometrics Market (2014-2019) Market Forecast BY Technology, Application and Regions

1084 words - 5 pages  Aarkstore - Saudi Arabia Biometrics Market (2014-2019): Market Forecast BY Technology, Application and Regions Summary Middle East region is emerging as a key growing region in global biometrics market, where countries such as UAE, Turkey and Saudi Arabia are exhibiting tremendous growth in overall

India Biometric Market

602 words - 3 pages 15thJuly 2016 – Navi Mumbai, India: Market reports on India presents the latest report on “India Biometric Market”. This report help industry consultants, biometrics solution providers and other stakeholders align their market-centric strategies. India biometrics market witnessed growth over the last few years on account of increasing need for security across various end user sectors coupled with roll-out of various nationwide government

Cro Management

516 words - 3 pages Advanced Clinical Trials Portfolio By Indian CRO’s The field of biometrics studies and analysis can be described as a set of technologies and methods that are used to recognize humans, depending on a certain set of traits. Biometrics traits can be divided into two principal groups. First, the physiological traits that are associated with the body shape, where we can include face recognition, palm print, fingerprint, iris recognition, DNA, hand

Biometerrice Identification

471 words - 2 pages should not change over time, the characteristic should be unique from person to person, and the method should be easy to scan and read while working in the field. The systems should be easy to use and train to professionals, and it must be understood that the system should be set up so that willing participation is not necessary. Currently biometrics can be used to help be mobile handicapped individuals, by reading facial


4267 words - 18 pages ) because it can provide accurate data and reports in a certain business, In this case the payroll in the said school. Payroll System with Biometrics for Benigno “Ninoy“ S. Aquino National High School 1-1 Transaction Processing System has characteristic which is applicable to the proposed system. It includes (1) rapid response which means it can have a fast. Performance and rapid result in computation (2) reliability which can provide a

Cio White Paper

1543 words - 7 pages enrolment so that the user (or anybody else) does not even know it. The key itself is completely independent of biometrics and, therefore, can always be changed or updated. After a biometric sample is acquired, the BE algorithm securely and consistently binds the key to the biometric to create a protected template, also called “private template.” In essence, the key is encrypted with the biometric. The BE template provides an excellent

Technology and Communication

1190 words - 5 pages its affects. One advanced technology used in the criminal justice system is the biometric iris scanning technique. The iris scanning technology used to allow for the capture of each individual’s unique iris pattern by the use of a photograph. These photographs are then stored in a database and used as an identifier, just like fingerprints would be("Biometrics: Facial Recognition And Iris Scanning", n.d.). Iris scanning however is a

Face Recognition

7690 words - 31 pages Intel® Technology Journal | Volume 18, Issue 4, 2014 HETERogEnEoUs FAcE REcognITIon: An EmERgIng TopIc In BIomETRIcs Contributor Guodong Guo West Virginia University An emerging topic in biometrics is matching between heterogeneous image modalities, called heterogeneous face recognition (HFR). This emerging topic is motivated by the advances in sensor technology development that make it possible to acquire face images from diverse imaging

Fighting Crime with the Help of Biometric Technology

586 words - 3 pages Fighting Crime with the Help of Biometric Technology Biometric solutions can be used by companies for verification and identification purposes, using a host of physiological and behavioural characteristics that are unique to an individual. However, in order to be foolproof, this system of identification and verification must be reliable, convenient, universal and acceptable at all times. A security system based on Biometrics comprises of

Related Essays

Biometrics Essay

776 words - 4 pages Biometrics and finger/palm printing Tara Tatum Team C Introduction In many of the FBI’s high profile cases, one form of technology that has become highly effective is biometrics. The definition of biometrics is the science of measuring and statistically analyzing biological data. This scientific measuring tool is mostly used in identifying individuals whether anatomical or physiological. While fingerprinting is probably one of the

Biometrics Essay

1950 words - 8 pages Biometrics 125 years ago, winter 1879, Paris First agency police prefecture clerk Alphonse Bertillion was sitting in dark cold corner of huge file-cabinet room, where there were stored files on all Parisian criminals. A.Bertillion was entering the criminals’ description. He found out that there is no classification system, since: a) Criminals could easily change their names, and attempts to try different systems (by age, criminal method

Biometrics Essay

1190 words - 5 pages ,” Farkash says. “Biometric” technology has been around since the 1970s, and is often seen in thumb-print readers and retinal scanners. But thanks to less-invasive techniques, biometrics is starting to take off. “People have been talking about this for decades as the future, but I think the technology is finally good enough and invisible enough that people will start to embrace it,” says Robert McCrie, a professor at John Jay College of Criminal

Ethical Application Of Biometrics Essay

921 words - 4 pages The Proper and Ethical Application of Biometrics IFSM 201 – A Practical Introduction to Computers and Communications As the advancement of technology continues to flourish within the modern age, so too have the capabilities and ruthlessness of predators looking to exploit the weaknesses of some for their own personal gains. In order to safeguard and protect the privacies of technological users, technology has also adapted its growth to