Haven't found the Essay You Want?
For Only $12.90/page

Authentication by Biometric Verification Essay

Finger Scan is cost efficient and accurate. The finger print, the most common biometric measurement, has been in use for security measures by law enforcement agencies for more than 100 years (Johnathon, 2001). The fingerprint has come a long way from India paper cards and Ink. The way the finger scan works is, that it looks “minutia”, and it is the position of the end points and junctions of individual ridges that mutually form the finger print. Most commercial applications rely on the collection of approx 14 to 30 minutias; though the number that can be tracked can run into the hundreds.

The initial system for a finger scanner, consist of fixed CPU connected to a chip. The chip read your minutia when your finger is positioned on it. Once the scan is complete, the computer compares the minutia to a list of official users in its database. The stored record cannot be used to recreate a fingerprint, because the records doesn’t store photographs, but instead reflect the information about the exact points of the finger (Thompson, 2001). Financial Institutions One of the first financial institution to implement finger scans was the Purdue Employees Federal Credit Union in Lafayette, Indiana in 1996.

Using it for Authentication The Commerce Community The commerce community has also begun to use fingerprint scanning for (HRM) human resource management, scam, internal theft, and administration access codes. One main case is a co-worker punching in the time card for an absent co-worker. Hand, finger, and voice biometrics can put a stop to this scam and save the company cash. One more type of problem in which businesses lose cash is forging. One case of a company’s attempt to stop forging through the use of biometrics is Walt Disney.

In March 1996, Disney World began testing the use of 3-D finger geometry to reduce fraud and add ease for visitors. The theme park sales hundreds of dollars in passes and has suffered a profit lose through the criminal action of forging passes. The allegation of the biometric hand scan to verify pass holders, has stopped the previous serious of fake passes. The commerce community has also begun using biometrics systems for domestic theft. Every one in business knows that the greater part of theft comes from its own employees.

Businesses have even prepared a group under decline to classify this type of lost inventory. With the use of biometrics, no employee can argue that some one cracked their code or that they don’t know who had access to it. By eliminating this problem, shrinkage would decrease and profit would rise. Health Care One of the near futures incorporation with biometrics is in the medical field. There is an accurate use for this type of tools in health care, which would make authorization a stronger word.

With the execution of biometrics there is an option for nurses to enter a patient’s Identity number, authenticate their access codes with the scan of their fingerprint, which in turn can download the patients file (Simpson, 2001). Signing out would be the similarity to giving a signature, clearing up the jumble of you did when and what? I’m sure that this example sounds a spot critical of today’s medical procedure, but it has to be. Biometrics will not take over the method that the medical field has established; slightly it will help to enforce tighter security. Judicial system

Number of people agrees that fingerprinting should be allowed in our courtrooms just as it has been for so many years. With so much inquiry of the soundness of fingerprinting evidence, it cannot probably be allowed in our judicial system. In order for us to resolve whether or not fingerprint evidence is scientifically sound, we need to look at what forms a match. Fingerprints are exclusive. Every person’s fingerprint is like a snowflake, there are millions of them, yet no two are accurately alike. If we personally find it hard to take a hidden print from the scene of a crime, and compare it to a record of millions of fingerprints.

Fingerprint databases are built from police stations, jails, prisons, and credentials programs like Identi-Kid. Advantages and possible Applications 1. Increase security – Provide a convenient and low-cost additional level of security. 2. Reduce fraud by employing hard-to-forge technologies and materials. 3. Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access 4. Unequivocally link an individual to a transaction or event.

Disadvantages/Hurdles for implementation – Security and Consistent Accuracy 1. The finger prints of the persons working in Chemical industries are frequently affected. So these industries should not use the finger print mode of authentication. 2. It is notice that with the age, the voices of a person changes. Also when the person has throat infection or flu the voice changes or if there are too much sound in the environment this method may not validate correctly. So this method of verification is not practicable all the time 3. Biometrics is a costly security solution.

4. For people affected with diabetes, the eyes get affected resulting in differences (Ritter, 2002). Clearing the Hurdles Skilled assessor of fingerprint verification agrees that the process of comparing hidden fingerprints of unknown origin with inked impressions of known origin is an “art” rather than a “science”. It requires an examiner to assess, on the basis of knowledge in dealing with thousands of fingerprints, what parts of an incomplete and partially blurred hidden print show detectable friction ridge detail that can be used for identification purposes.

But whether fingerprint identification is “art” or “science” is undoubtedly no longer applicable to a Daubert inquiry (Meagher, n. d. ). What needs to be observed is whether the underlying premises upon which fingerprint detection are based have been experimentally authenticated. And these premises are of three kinds: (1) Friction ridge detail of the epidermis on the palm side remains unchanged of the hands during the lifetime of a person, except for accidental or alteration.

(2) Friction ridge pattern areas shows so much variety of detail that no two patterns are ever found to be accurately the same on the digits (or palms or soles of feet) of one individual or on the digits (or palms or soles of feet) of further individuals. (3) While these friction ridge patterns shows an endless variety of detail, they nevertheless fall within certain wide classes or categories that permit police to store and recover millions of prints according to categorization formulae (Moenssens, 2002).

There is, however, reputable empirically established evidence of the uniqueness of fingerprint patterns. Research by many examiners has shown that the fingerprints of identical twins are dissimilar, as are the prints of triplets, quadruplets, and quintuplets. In that sense, fingerprint recognition has been found to be even more discriminating than the vaunted DNA (deoxyribonucleic acid) “fingerprinting” technique, which cannot differentiate, by today’s technology, between the DNA of identical twins.

Since inherited behaviour for similarity in patterns and sub-pattern types are the most common among people who are related closely to each other, the dissimilarity in the prints of such persons definitely can be taken as pragmatic evidence of fingerprint individuality (Moenssens, 2002). Conclusion Where we talk about conclusion of the Forensic Computing “Authentication by Biometric Verification” we came to realize that finger print, the most common biometric measurement, has been in use for security measures since years.

Forensic computing is really very important in today’s world, as we already know that internal theft and scam is very common in industries, if a person punching in the time card for an absent person. Hand, finger, and voice biometrics can put a stop to this scam and save the money of the company. Different types of industries like Health Care departments, Judiciary department and business communities are using the methods of authentication of Biometric Verification just because to stop scam, reduce fraud and unusual benefits taken by employees.

There are some disadvantages/hurdles for implementation- Security and consistent accuracy like Biometric authentication systems are cost effective and in rear cases it not works perfectly because there are some skin infection which changes the finger ridges and if we talk about voice biometric authentication system so some diseases like Flu and throat infection can change the person’s voice. In spite of these disadvantages we have to focus on benefits of the Forensic Computing “Authentication by Biometric Verification” and in near future technology will definitely resolve these disadvantages.

References The Economist, “Fingering Fingerprints”, 14 December 2000 Meagher, Stephen, n. d. , What is a Daubert Hearing? Meehan, Patrick L. Memorandum of Law in Support of Government’s Motion for Reconsideration of the Court’s Exclusion of Fingerprint Testimony. 7 January 2002 Moenssens, Andre A. Fingerprints and the Law. Philadelphia: Chilton Book Co. 1969 Moenssens, Andre A. The Reliability of Fingerprint Identification – A Case Report. 17, January 2002 Ritter, Malcolm. Fingerprint evidence loses credibility. 2002 Thompson, Jim.

(2001). Dreams of the Bond Car, Boardwatch Magazine. [Online], 15(18), Retrieved May 25, 2010 from EBSCOhost database Hill, Johnathon A. , (2001). Arthur W. Coviello, Internet World. [Online], 20 (34), 5 pages. Retrieved May 25, 2010 from EBSCOhost database Hill, Johnathon A. , (2001). Biometrics Come of Age. Internet World. [Online], 7(54), 2 pages. Retrieved May 25, 2010 from EBSCOhost database Simpson, Roy L. (2001). ‘Techno-marvel’s’ just around the corner. Nursing Management. [Online], 32(50), 4 pages. Retrieved May 25, 2010 from EBSCOhost database

Essay Topics:

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email. Please, specify your valid email address

We can't stand spam as much as you do No, thanks. I prefer suffering on my own