About Biometric Solution
Biometrics has been around since about 29,000 BC when cavemen would sign their drawings with handprints. In 500 BC Babylonian business transactions were signed in clay tablets with fingerprints. The earliest cataloguing of fingerprints dates back to 1881 when Juan Vucetich started a collection of fingerprints of criminals in Argentina.
Biometrics is the science and technology of measuring and analysing biological data. In information technology, biometrics refers to technologies that measure and analyse human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. Now, following the spate of insecurity globally at this age, Monac Global did not hesitate to indulge in the security business within the biometric circle. Monac Global created a department and sent some seasoned IT staff to related institutions China and USA to specialize in the installation of biometric security devices and management. Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of sale (POS) applications. In addition to security, the driving force behind biometric verification has been convenience.
To prevent identity theft, biometric data is usually encrypted when it’s gathered. Here’s how biometric verification works on the back end: To convert the biometric input, a software application is used to identify specific points of data as match points. The match points in the database are processed using an algorithm that translates that information into a numeric value. The database value is compared with the biometric input the end user has entered into the scanner and authentication is either approved or denied.
A biometric system can operate in the following two modes:
In verification mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. Three steps involved in person verification. In the first step, reference models for all the users are generated and stored in the model database. In the second step, some samples are matched with reference models to generate the genuine and impostor scores and calculate the threshold. Third step is the testing step. This process may use a smart card, username or ID number (e.g. PIN) to indicate which template should be used for comparison. Positive recognition’ is a common use of verification mode, “where the aim is to prevent multiple people from using same identity”
In Identification mode the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold. Identification mode can be used either for ‘positive recognition’ (so that the user does not have to provide any information about the template to be used) or for ‘negative recognition’ of the person “where the system establishes whether the person is who she (implicitly or explicitly) denies to be” The latter function can only be achieved through biometrics since other methods of personal recognition such as passwords, PINs or keys are ineffective.
Some Practical Benefits of Biometric Security Systems
Unlike the conventional security systems, biometric solution has changed the face of security system with guarantee of tight security. Some practical benefits are outlined below:
- It protects highly sensitive documents from getting into wrong hands
- It prevents unauthorized physical access to restricted facilities and establishments
- It aids the discovery and arrest/apprehension of criminals
- It securely traces monitors and keeps record of events or stolen properties
- It prevents the occurrence of terror attacks etc.