TITLE

Open Biometrics

AUTHOR(S)
Perler, Dore Scott
PUB. DATE
May 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p36
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses open biometric technology. There are various biometric technology which are aiming at border control, biometrically enables identity management solutions. In order to avoid any mismanagement during registrations and to work effectively, multiple biometric technologies must be utilized within the system. The multiple biometric technology would enable to track the required information for further detection of circumvention. The technology is so advanced that it can also help in tracking suspected terrorists masking themselves in the small towns.
ACCESSION #
20920214

 

Related Articles

  • BIOMETRICS ON PASSPORTS: BEST BET FOR TIGHT SECURITY. David, Mark // Electronic Design;8/23/2004, Vol. 52 Issue 18, p15 

    The September 11, 2001 terrorist attacks Commission Report offers myriad recommendations on how to tighten homeland security, but the finding that offers the greatest impact is one being addressed by electronic designers. The Commission recommend that the government should target terrorist...

  • Counterfeit freedom. Stross, Randall E. // U.S. News & World Report;10/8/2001, Vol. 131 Issue 14, p43 

    Discusses the proposal for the use of identification (ID) cards in the United States in light of security measures taken following terrorist attacks on the U.S. Proposal of Larry Ellison, corporate executive officer of Oracle, that the U.S. adopt a national ID card; Hopes of Ellison to improve...

  • Palm-print Verification Using Optimized Cepstrum Blocks. Kekre, H.B.; Vig, Rekha; Pranay, Arya; Aashita, Irani; Saurabh, Bisani // International Journal of Research & Reviews in Computer Science;Mar2011, Vol. 2 Issue 2, p470 

    Using biometrics to verify a person's identity has several advantages over the present practices of personal identification numbers (PINs) and passwords. Minutiae-based automated identification systems are more popular, but they are more computationally complex and time consuming. In this paper...

  • Facing the future. Saccomano, Ann // Journal of Commerce (1542-3867);5/26/2003, Vol. 4 Issue 21, p33 

    Deals with the obstacles to the implementation of biometric identification. Absence of international standard for biometric identification; Technological barriers in fingerprinting; Cultural concerns on the use of biometric identification. INSET: How some countries view biometrics.

  • An Effective Two-Finger, Two-Stage Biometric Strategy for the US-VISIT Program. Baveja, Manas; Wein, Lawrence M. // Operations Research;Sep2009, Vol. 57 Issue 5, p1068 

    Motivated by the cost and disruption involved in changing from a two-finger to a ten-finger biometric system for matching U.S. visitors to a watchlist of criminals and terrorists, we investigate whether any two-finger multistage biometric strategies would fix the inadequate matching performance...

  • Who Goes There? Biometrics Knows. Trembly, Ara C. // National Underwriter / Life & Health Financial Services;12/20/99-12/27/99, Vol. 103 Issue 51, p19 

    Deals with several products using biometrics, the technology that uses unique biological factors to positively identify an individual. Features of the PCIris authentication system from IriScan Inc.; Plans of SecuGen Corp., SAFLINK Corp. and ING Direct Canada to develop a fingerprint biometric...

  • EYE OF THE BEHOLDER. Buechner, Maryanne Murray // Time International (South Pacific Edition);11/27/2000, Issue 47, p88 

    Focuses on the development of the technology of biometrics as of November, 2000. How it develops security systems based on physical characteristic, such as an iris of an eye, or behaviors to authenticate a person's identity; Use of the technology by companies and government agencies;...

  • Trends and directions for buyer planning.  // Security: Solutions for Enterprise Security Leaders;Mar1998, Vol. 35 Issue 3, p110 

    Highlights trends in purchasing of security systems. Addition of topic on biometrics at the Daily New Service on the Web site of the periodical `Security'; Importance of creating corporate policies to prevent internal abuse of computers and communications networks; Passing of ordinance...

  • 'BIG BROTHER' BIOMETRICS? Williams, Steve // Credit Union Management;Apr2005, Vol. 28 Issue 4, p44 

    Focuses on the inefficacy of biometric technology in providing securing data identification of the consumers in the U.S. Causes of the slow growth in biometric technology in credit unions; Functions of biometrics in check cashing process; Utilization of biometrics and smart cards for a higher...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics