Biometric technology is used to recognition patterns of human body parts. Biometric devices use a persons unique physiology to determine identity. Such as, fingerprint, retinal scan, palm, facial recognition, DNA, etc.
Fingerprint technology is used by Granding.
Granding fingerprint devices are embedded with stable and fast algorithm which can read fingerprint template and identify unique pattern of a fingerprint. The duration of verification process will be very short( less than 1 sec).
Legal to read and store people’s fingerprint
All the Granding fingerprint reader can scan fingerprint image and store the fingerprint template. This kind of template is generated by our special algorithm which can not be revert to original fingerprint image. So this may not transgress law for some country.
The right way to put your finger on the device reader
Normally, Granding fingerprint reader can read the fingerprint freely, even half of the fingerprint. But putting the finger firmly and flat on the center of the scanner will be much better.
Here are some hints for successful enrollments:
|How to select the finger||
|How to place the finger||
|Fingerprints is too dry or dirty||
|Others||Few people’s fingerprint quality is too poor to verify, the fingerprint is in gear.
The hardware used to acquire biometric samples. The following acquisition devices are associated with each biometric technology.
Automated Fingerprint Identification System. A system originally developed for use by law enforcement agencies, which compares a single fingerprint with a database of fingerprint images. Subsequent developments have seen its use in commercial applications, where a client or customer has their finger image compared with existing personal data by placing a finger on a scanner, or by the scanning of inked paper impressions.
A sequence of instructions that tells a system how to solve a problem. Used by biometric systems, for example, to tell whether a sample and a template are a match. Cryptographic algorithms are used to encrypt sensitive data files, to encrypt and decrypt messages, and to digitally sign documents.
Application Program Interface. A computer code which is a set of instructions or services used to standardize an application. Any system compatible with the API can then be added or interchanged by the application developer.
The process of establishing the validity of the user attempting to gain access to a system. Primary authentication methods are:
* Access passwords (something the user knows)
* Access tokens (something the user owns)
* Geography (a workstation, for example)
one of various technologies that utilize behavioral or physiological characteristics to determine or verify identity. “Finger-scan is a commonly used biometric.” Plural form also acceptable: “Retina-scan and iris-scan are eye-based biometrics.”
Field relating to biometric identification. EG: “What is the future of biometrics?”
Of or pertaining to technologies that utilize behavioral or physiological characteristics to determine or verify identity. EG: “Do you plan to use biometric identification or older types of identification?”
The identifiable, unprocessed image or recording of a physiological or behavioral characteristic, acquired during submission, used to generate biometric templates. Also referred to as biometric data.
The integrated biometric hardware and software used to conduct biometric identification or verification.
In regard to chip cards: whether the card is read by direct contact with a reader or has a transmitter/receiver system which allows it to be read using radio frequency technology (up to a certain distance).
Crossover error rate (CER)
a comparison metric for different biometric devices and technologies; the error rate at which FAR equals FRR. The lower the CER, the more accurate and reliable the biometric device.
The result of the comparison between the score and the threshold. The decisions a biometric system can make include match, non-match, and inconclusive, although varying degrees of strong matches and non-matches are possible.
Either/or multimodality describes systems that offer multiple biometric technologies, but only require verification through a single technology.
The scrambling of data so that it becomes difficult to unscramble or decipher. Scrambled data is called ciphertext, as opposed to unscrambled data, which is called plaintext. Unscrambling ciphertext is called decryption. Data encryption is done by the use of an algorithm and a key. The key is used by the algorithm to scramble and unscramble the data. The algorithm can be public (for scrutinization and analysis by the cryptographic community), but the key must be kept private. Encryption does not make unauthorized decryption impossible, but merely difficult. Time, and the power (ever increasing) of computers are the factors involved in the feasibility of decryption.
the initial process of collecting biometric data from a user and then storing it in a template for later comparison.
The automated process of locating and encoding distinctive characteristics from a biometric sample in order to generate a template.
False-acceptance rate (FAR)
the percentage of imposters incorrectly matched to a valid user’s biometric.
False-rejection rate (FRR)
the percentage of incorrectly rejected valid users.
the process by which the biometric system identifies a person by performing a one-to-many (1:n) search against the entire enrolled population.
(1:N, one-to-many, recognition) – The process of determining a person’s identity by performing matches against multiple biometric templates. Identification systems are designed to determine identity based solely on biometric information. There are two types of identification systems: positive identification and negative identification. Positive identification systems are designed to find a match for a user’s biometric information in a database of biometric information.
The comparison of biometric templates to determine their degree of similarity or correlation. A match attempt results in a score that, in most systems, is compared against a threshold. If the score exceeds the threshold, the result is a match; if the score falls below the threshold, the result is a non-match.
Single Error Rates
Error rates state the likelihood of an error (false match, false non-match, or failure to enroll) for a single comparison of two biometric templates or for a single enrollment attempt. This can be thought of as a “single” error rate.
The process whereby a user provides behavioral or physiological data in the form of biometric samples to a biometric system. A submission may require looking in the direction of a camera or placing a finger on a platen. Depending on the biometric system, a user may have to remove eyeglasses, remain still for a number of seconds, or recite a pass phrase in order to provide a biometric sample.
a mathematical representation of biometric data. A template can vary in size from 9 bytes for hand geometry to several thousand bytes for facial recognition.
A predefined number, often controlled by a biometric system administrator, which establishes the degree of correlation necessary for a comparison to be deemed a match.
Verification (1:1, matching, authentication)
The process of establishing the validity of a claimed identity by comparing a verification template to an enrollment template. Verification requires that an identity be claimed, after which the individual’s enrollment template is located and compared with the verification template. Verification answers the question, “Am I who I claim to be?” Some verification systems perform very limited searches against multiple enrollee records. For example, a user with three enrolled finger-scan templates may be able to place any of the three fingers to verify, and the system performs 1:1 matches against the user’s enrolled templates until a match is found. One-to-few. There is a middle ground between identification and verification referred to as one-to-few (1:few). This type of application involves identification of a user from a very small database of enrollees. While there is no exact number that differentiates a 1:N from a 1:few system, any system involving a search of more than 500 records is likely to be classified as 1:N. A typical use of a 1:few system would be access control to sensitive rooms at a 50-employee company, where users place their finger on a device and are located from a small database.