28.02.2013 Views

Biometric Technology Application Manual - ITI Observatorio ...

Biometric Technology Application Manual - ITI Observatorio ...

Biometric Technology Application Manual - ITI Observatorio ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Section 1 4 Introduction<br />

There are several mature biometric systems available in<br />

the market today and many successful applications of<br />

biometric technology. The technology has proven capable<br />

of decreasing costs and increasing convenience<br />

for both users and system administrators. Furthermore,<br />

properly employed these systems are capable of improving<br />

privacy and resisting identity theft.<br />

One of the major impediments to widespread implementation<br />

of biometric technologies at the consumer level is<br />

the wide variety of competing, vendor-proprietary devices<br />

that have been developed without general standardization.<br />

The primary barriers to using biometrics more<br />

broadly in the private sector have had to do with limited<br />

compliance with existing standards, scalability of the systems,<br />

interoperability, usability, security, buyer concerns<br />

about return on investment (ROI), and issues concerning<br />

attacks on privacy. Each of these barriers have reasonable<br />

solutions or are susceptible to an effective and acceptable<br />

compromise..<br />

The costs of biometric devices and software have declined<br />

rapidly over recent years and the technology is now being<br />

offered as a standard component in a number of security<br />

applications, such as laptop computer login and<br />

facility access control. In addition, significant increases in<br />

computing power, along with continuing advancements<br />

in biometric software algorithms and sensor hardware,<br />

have resulted in vastly improved speed and accuracy for<br />

the more widely used biometric methods. Since the tragic<br />

events of September 11, 2001, governments have rushed<br />

to embrace biometrics as a key component in their multilayered<br />

security systems for anti-terrorism and homeland<br />

security applications such as border control.<br />

Utilized in isolation or integrated with other technolo-<br />

Version 2 – Summer 2008

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!