Computer security
View Paper
ESSAY DETAILS
Words: 2627
Pages: 10
(approximately 235 words/page)
Pages: 10
(approximately 235 words/page)
Essay Database > History > European History
Biometrics is now becoming more popular with the introduction of information technology. This technology is used to verify and/or identity someone using his or her own unique physical patterns, for example fingerprints, facial recognition, iris scanning, retinal scan and hand geometry or behavioural patterns such as voice, keystroke dynamics and signatures (See Appendix 1). Until recently, biometrics was considered intrusive and too expensive for most companies, but now with the need for increased security, the
showed first 75 words of 2627 total
Sign up for EssayTask and enjoy a huge collection of student essays, term papers and research papers. Improve your grade with our unique database!
showed first 75 words of 2627 total
showed last 75 words of 2627 total
of individual features such as width of the fingers at different locations, length of the fingers, etc to confirm verification. As well as using the biological set up for biometrics, behavioural patterns can also be used, these include voice recognition, keystroke dynamics and signatures, these methods verify identification rather than identify. References Wirtz, J., Heracleous, L. (2005), "Biometrics meets services", Harvard Business Review, No.February, pp.48. International Biometrics Group (2005), available at: www.biometricgroup.com (accessed July 2005),
of individual features such as width of the fingers at different locations, length of the fingers, etc to confirm verification. As well as using the biological set up for biometrics, behavioural patterns can also be used, these include voice recognition, keystroke dynamics and signatures, these methods verify identification rather than identify. References Wirtz, J., Heracleous, L. (2005), "Biometrics meets services", Harvard Business Review, No.February, pp.48. International Biometrics Group (2005), available at: www.biometricgroup.com (accessed July 2005),