Biometrics -- Getting Personal and Liking It

Zalud, Bill
February 2011
Security: Solutions for Enterprise Security Leaders;Feb2011, Vol. 48 Issue 2, p42
Trade Publication
The article focuses on the use of biometrics-based system integrated with access controls in handling homeless individuals. It says that the integration of biometrics to any existing access control application was simplified; thus, eliminating extra network infrastructure costs. It also states that card reader emulation is the most common way in integrating biometrics, which is effective when integrating into existing card-based system to have extra security to the front entrance or server room.


Related Articles

  • Tailor to the Application and Organization.  // SDM: Security Distributing & Marketing;Aug2003, Vol. 33 Issue 8, p52 

    Focuses on the ways of using biometrics to verify the identity of an individual. Biometric access with single door control; Use of Smart card systems to leverage the secure data storage; Integration of biometrics into conventional access control systems.

  • SECURITY WATCH. LORENZI, NEAL // Health Facilities Management;Jan2014, Vol. 27 Issue 1, p31 

    The article reports on innovations for increased safety and security in healthcare facility operations as of January 2014. It states that two access control trends include multipurpose smart cards for providing access control, identification, and time and attendance functionality, and systems...

  • Reading the Future. Hodgson, Karyn // SDM: Security Distributing & Marketing;Jun2013, Vol. 43 Issue 6, p75 

    The article presents information on several developments related reader technologies. It is stated that near field communications (NFC) has a great potential to change the access control card and reader market in the future. North Carolina-based firm Strategic Security Solutions is installing...

  • Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Kumari, Saru; Wu, Fan; Li, Xiong; Farash, Mohammad; Jiang, Qi; Khan, Muhammad; Das, Ashok // Multimedia Tools & Applications;Dec2016, Vol. 75 Issue 24, p17215 

    In recent years, Voice over Internet Protocol (VoIP) has gained more and more popularity as an application of the Internet technology. For various IP applications including VoIP, the topic of Session Initiation Protocol (SIP) has attracted major concern from researchers. SIP is an advanced...

  • It's All in the Cards. D'Alto, Nick // Odyssey;Oct2007, Vol. 16 Issue 7, p36 

    The article presents information on the use of smart cards in biometric systems in the U.S.

  • Under the Wire.  // Security: Solutions for Enterprise Security Leaders;Mar2007, Vol. 44 Issue 3, p54 

    The article reports on a trend in which universities adopt wireless access control and electronic security systems with smart cards. Wireless systems eliminate the need to run miles of conduit and to install multiple power supplies. Biometric identification is a technology that will expand in...

  • Security Weaknesses and Improvements of a Fingerprint-based Remote User Authentication Scheme Using Smart Cards. Hyung-Kyu Yang; Young-Hwa An // International Journal of Advancements in Computing Technology;Jan2012, Vol. 4 Issue 1, p15 

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2006, Khan et al.[12] proposed an improved fingerprint-based remote user authentication scheme using smart cards that is achieved...

  • Family Card Security System Using Biometric Device. Prasanth, R.; Balamurugan, V.; Roubavaan, S.; Suresh, E.; Purushothaman, N. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 2, p1533 

    This system mainly focuses on Designing and Implementation of Security System for a family card using fingerprint that has been used to the Civil Supply Corporation. In recent scenarios, all public and private sectors using smart card systems to provide security. Still, it is not up to the...

  • Modeling of Authentication System by Vague Expressions. Bani Hashim, Ahmad Yusairi // Journal of Communication & Computer;Nov2011, Vol. 8 Issue 11, p997 

    There is a widespread use of authentication systems. The applications range from home to industrial settings. The knowledge of the technologies is becoming a trade. Any types of security systems are vulnerable to intrusions. Therefore, this study is done to test a technique using unconventional...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics