Beruflich Dokumente
Kultur Dokumente
that even Biometric features can change (our voice does not always sound the
same, signatures can vary, even fingerprints may be scarred or damaged in
accidents), and hence biometric controls may sometimes fail.
PHYSICAL BIOMETRIC CONTROLS
Fingerprint This is the most commonly used biometric control. When a user
places his or her finger on a scanner for a few seconds, 30-40 details are read,
like ridge patterns, bifurcations and divergences, etc. These details are
compared with the stored template of that user to decide whether or not to allow
access.
Retina Optical technology is used to map the capillary pattern of the users
retina. As the capillary patterns of the retina are unique for every human being,
retinal scan is the most reliable biometric control. However, user acceptability is
a practical problem as the user has to put his or her eye very close to the reader.
Iris Iris-scanning is an improvement over retinal scanning. It is also highly
reliable as the iris has over 400 characteristics and these remain stable over
time. The user has to focus his or her vision on the reflection of their iris in the
device, upon which the reader scans their iris and compares it with a stored
value. It has greater acceptability than retina scanning as close contact with a
device is not necessary, but these methods are expensive.
Palm/hand geometry: These systems are based on physical characteristics of
the palm / geometry of the hand, such as ridges and valleys on the palm, threedimensional measurements of the users hand and fingers. The advantages of
these are social acceptance (people are far less reluctant to place their
palms/hands on a device than bring their eyes close to it) and low requirement of
resources in terms of storage space.
BEHAVIOUR-OREINTED BIOMETRIC CONTROLS
These are usually based on signature recognition and voice recognition.
Signature recognition involves capturing and using two areas of information
about an individuals signature: the features of the signature and the features of
the process of signing. Signature dynamics, like the speed of signing, pressure
applied, directions, stroke lengths and the points at which the pen is lifted from
the surface, are recorded. The process is easy to use and can be implemented
at a relatively low cost. It is highly effective because, while a forger can usually
replicate the image of a signature, it is virtually impossible to reproduce the
signature dynamics. Disadvantages are that not all users sign in a consistent
manner and signatures may vary when a person is ill or excited / upset.
Voice recognition requires an individual to speak a certain phrase, called a
passphrase, and converting it into a digital template. However, the system may
By D.S.Mahanty, CM
Information Security Dept
Corporate Centre, Belapur