TITLE

Defense skills applied to biometric ID

AUTHOR(S)
Scott, William B.
PUB. DATE
October 1994
SOURCE
Aviation Week & Space Technology;10/17/1994, Vol. 141 Issue 16, p54
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the competition among aerospace and defense companies for a share of the biometric identification market. Federal Bureau of Investigation's Automated Fingerprint Identification System program; Potential applications for computer-based identification.
ACCESSION #
9410312111

 

Related Articles

  • You can't forget this password. Sherrid, Pamela // U.S. News & World Report;05/17/99, Vol. 126 Issue 19, p49 

    Describes a fingerprint reader for corporate computer networks developed by Identicator Technology of Sunnyvale, California. Use of the technology by Compaq Computer; Other uses for biometric technology in corporations; Price of biometric devices plummeting; Consumer market for the devices;...

  • Face off. Braue, David // Bulletin with Newsweek;11/21/2000, Vol. 118 Issue 6251, p80 

    Highlights developments in biometrics. Mechanics of computerized fingerprint recognition; Fujitsu Australia's manufacturing of mass-market microwave-sized fingerprint scanners; Incorporation of improvements in microchip technology; Expected drop in the costs of scanners.

  • Tired of All Those Passwords? Here Are Some Alternatives. Stone, Brad // Newsweek (Pacific Edition);12/07/98 (Pacific Edition), Vol. 132 Issue 23, p12 

    Focuses on biometrics, the measuring of unique characteristics like the fingerprint and iris of the eye for the purposes of authenticating identity. Lack of a commonly recognized standard for how such devices should be incorporated into machines; Hardware required by iris and fingerprint...

  • Tired of All Those Passwords? Here Are Some Alternatives. Stone, Brad // Newsweek (Atlantic Edition);12/07/98 (Atlantic Edition), Vol. 132 Issue 23, p10D 

    Focuses on biometrics, the measuring of unique characteristics like the fingerprint and iris of the eye for the purposes of authenticating identity. Lack of a commonly recognized standard for how such devices should be incorporated into machines; Hardware required by iris and fingerprint...

  • Tired of All Those Passwords? Here Are Some Alternatives. Stone, Brad // Newsweek;11/30/1998, Vol. 132 Issue 22, p12 

    Focuses on biometrics, the measuring of unique characteristics like the fingerprint and the iris of the eye for the purposes of authenticating identity. Lack of a commonly recognized standard for how such devices should be incorporated into machines; Hardware required by iris and fingerprint...

  • Banking at the touch of a finger. Fitzpatrick, Doreen D. // Fairfield County Business Journal;8/28/95, Vol. 34 Issue 35, p11 

    Focuses on the industrial use of fingerprint biometrics. Possibility of its use by banks to improve customer service and security at automated teller machines; How the system works; Availability of fingerprint-based identification systems technology from several suppliers; Includes Fingermatrix...

  • Weaving a worldwide web for personal ID. Lee, Andrew // Engineer (00137758);3/15/2002, Vol. 291 Issue 7593, p7 

    Reports on the plans of the organization Oasis in developing ways to exchange biometric personal identification via the Internet as of March 15, 2002. Computer protocol that will be used for the development; Facts on the use of biometrics in crime fighting; Information on the fingerprint...

  • Fingerprint scanning slows illegal immigration. Brakeman, Lynne // Automatic I.D. News;Nov95, Vol. 11 Issue 12, p24 

    Focuses on the United States Immigration and Naturalization Service's (INS) use of a biometric scanning system called INS'IDENT to identify fingerprints of illegal aliens. System features; System benefits; System development.

  • Product trades passwords for prints. Phillips, Ken // PC Week;09/07/98, Vol. 15 Issue 36, p47 

    Looks at U.are.U, a biometric device from Digital Persona Inc. that identifies computer users by scanning their fingerprints. Price; Platforms the device works with; Security issues; System requirements; Contact information.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics