220 likes | 357 Views
Biometric time systems and Attendance Software are quickly gaining foothold in most offices and institutions, all thanks to an increased need for transparency and accountability, flexible work culture, and a mobile workforce. To make our Attendance Software & Leave Management and Tracking Features features even more robust, Depending on your requirements, you have the flexibility to choose one of two awesome fingerprint machines.
E N D
Biometrics:Fingerprint Technology Jakin ID Technology +1-604-278-8888
Agenda • Why Biometrics? • Fingerprint Patterns • Advanced Minutiae Based Algorithm • Identification vs. Authentication • Security • Applications • Versus other Biometric Technologies • Industry
Why Biometrics? Inventory access control devices that restrict entry into an area of a retail establishment can be set up in a number of ways. Before establishing an access control system, the question to ask yourself is, “How can I institute an access control device that will not only safeguard my inventory but also help to establish a concrete audit trail in case there is a problem so that I can determine the cause?” The only sure way to do this is by using biometric technology.
Why Biometrics? • Biometrics is a security solution based on something you know, have, and are:
Do you know? • Passwords are not reliable. • Too many • Can be stolen • Forgotten • Protect Sensitive Information • Banking • Medical
Why Its useful? • Has been used since 14th century in China • Reliable and trusted • Will never leave at home • Fingerprints are unique • Everyone is born with one • 80% of public has biometric recorded
Fingerprint Patterns There are three main fingerprint patterns: arches, loops and whorls. Arches are found in about 5% of fingerprint patterns encountered. The ridges run from one side to the other of the pattern, making no backward turn.
Fingerprint Patterns • 6 classes of patterns
Fingerprint Patterns • Minutiae • Crossover: two ridges cross each other • Core: center • Bifurcation: ridge separates • Ridge ending: end point • Island: small ridge b/w 2 spaces • Delta: space between ridges • Pore: human pore
Fingerprint Patterns • Two main technologies used to capture image of the fingerprint • Optical – use light refracted through a prism • Capacitive-based – detect voltage changes in skin between ridges and valleys
Identification vs. Authentication • Identification – Who are you? • 1 : N comparison • Slower • Scan all templates in database • Authentication – Are you John Smith? • 1 : 1 comparison • Faster • Scan one template
Security • Accuracy • 97% will return correct results • 100% deny intruders • Image • Minutiae is retrieved and template created • Encrypted data • Image is discarded • Cannot reconstruct the fingerprint from data
Security • Several sensors to detect fake fingerprints • Cannot steal from previous user • Latent print residue (will be ignored) • Cannot use cut off finger • Temperature • Pulse • Heartbeat sensors • Blood flow
Versus other Biometric Technologies 1 (worst) – 5 (best)
Industry • Hot market • Lots of $$$
Conclusion • Want to protect information • Passwords are not reliable; forget • Fingerprints have been used for centuries • Fingerprints are unique; can verify • Very accurate • Lots of applications being developed • Hot market. Lots of $$$
Biometrics Fingerprint Technology Visit us at www.jakinid.com Call us at +1-604-278-8888
Quick links • RFID solutions • Access Control Solutions • Time and Attendance Solutions • Payroll Management Solutions • Web Payroll Management Solutions • Fingerprint Access Control • Fingerprint Time Attendance