Biometrics Security Technology: The Future Now

Berger, Vic
October 2007
Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p60
Trade Publication
The article discusses issues related to biometrics security technology in the U.S. It is stated that biometrics is the study of measurable biological characteristics. The paper also discourses the advantages and future of biometrics. The technology includes fingerprint recognition where factories are replacing timecards with hand geometry which provides identity validation and physical access control.


Related Articles

  • Biometrics. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Jan2011, Vol. 22 Issue 1, p42 

    The article reports on the development of biometric application products in the U.S. The top challenge is the cost of the devices, although the prices of fingerprint scanners are expected to lower in the future. The biometric products have evolved from hardware that interface with an identity...

  • Getting the 411 on Biometrics.  // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p48 

    Provides information on biometrics technology, the reading of a unique human physical attribute as data which is then applied to actuating a system. Passwords and personal identification numbers; Fingerprinting; Retinal scans; Capabilities of the BioMetric Fingerprint BLP-100 Pressure Sensitive...

  • Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication. Kumar K., Pavan; Krishna Prasad, P. E. S. N.; Ramakrishna, M. V.; Prasad, B. D. C. N. // International Journal of Network Security & Its Applications;Jul2013, Vol. 5 Issue 4, p83 

    Token based security (ID Cards) have been used to restrict access to the Secured systems. The purpose of Biometrics is to identify / verify the correctness of an individual by using certain physiological or behavioural traits associated with the person. Current biometric systems make use of...

  • Bodily access. Tyler, Geoff // Management Services;Feb1995, Vol. 39 Issue 2, p30 

    Biometric recognition systems designed for our use in industry and commerce so far may read a finger or hand print, scan an eye's retina pattern, recognize a voice or read a signature. One feature they share is that they are regarded as expensive and aimed at the top security applications where...

  • Reliability of biometric identification using fingerprints under adverse conditions. Nídlová, V.; Hart, J. // Agronomy Research;2015, Vol. 13 Issue 3, p786 

    Biometric user identification is highly topical these days. The most well-represented method is fingerprint identification, to which this study is also dedicated. However, we cannot forget other methods such as scanning the bloodstream, retina and iris, facial recognition, etc. Four reading...

  • Foolproof ID with new body-language security systems. Bakke, Timothy O. // Popular Science;Jun86, Vol. 228 Issue 6, p76 

    Focuses on benefits and accuracy of biometric security systems which is widely being studied in the U.S. Revelation that the biometric security system measures unique, unchangeable characteristics of an individual to determine identity with near unerring accuracy; Information on various...

  • Bioscrypt V-Station.  // SC Magazine: For IT Security Professionals (UK Edition);Oct2007, p66 

    The article evaluates the Bioscyrpt V-Station biometric tool.

  • NEWS: Tell-tale print. HARRIS, STEPHEN // Engineer (Online Edition);8/15/2011, p8 

    The article discusses the availability of a new fingerprinting technology that can reveal the diet, drug habits and ethnicity of a suspected criminal.

  • Biometrics Bridges Physical, Logical Security. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;May2008, Vol. 45 Issue 5, p58 

    The article discusses several applications based on biometrics technology that bridges the gap between physical and logical security system. According to the International Biometrics Industry Association, biometrics are technologies that automatically confirm the identity of an individual by...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics