|
|
|
|
Fingerprint Identification Technology |
 | | Today, many Techonlogies and devies are developed and utilized Though innovative human effort to enrich our lives
We can now store and administer personal information and confidential
business information in such technical devices as PDAs,
cellular phones and PCs.
With the continuous development of computer networks, security-sensitive
personal, industrial and national information is being exchanged within
the networking environment. |
|
However, since digitalized information is exposed to the risks of outflow and loss, concerned
people are actively searching for solutions to these problems. In response
to the urgency of the situation, a number of information security technologies are being researched
and developed. Among those is biometrics, a technology that stands out among all others as
a highly reliable solution to information security.
What is ¡°Biometrics¡±, and what kind of convenience and security can it offer us?
Biometrics refers to an automated system that can identify an individual by measuring their physical and behavioral uniqueness or patterns, and comparing it to those on record. In other words, instead of requiring personal identification cards, magnetic cards, keys or passwords, biometrics can identify fingerprints, face, iris, palm prints, signature, DNA, or retinas of an individual for easy and convenient verification. With the boom in Internet-based business and the increased need for accurate verification when accessing accounts, biometrics is the simplest and most convenient the solution. Its universal, unique, permanent and measurable features ensures security of information in E-commerce, such as
on-line banking and shopping malls. Biometrics can also provide you with convenience and security,
by enabling a machine to verify the individual by itself and to respond to the individual¡¯s requests.
Through the use of such physical controls as access control, and punch card maintenance, user restrictions on certain apparatus can be made possible with an automated verification system
|
Why Select Fingerprint |
|
The biometric verification systems that are currently being used include:
fingerprint, iris, voice, retina face, hand, vein and signature. Out of all of
these, the Iris can return the most accurate results. But since it requires
the system or device to come very close to the individual¡¯s eyes, it a less
desirable method of verification. In addition, such devices or systems
tend to be expensive and bulky, putting limits on its practical application. |
 |
However, since digitalized information is exposed to the risks of outflow and loss, concerned
people are actively searching for solutions to these problems. In response
to the urgency of the situation, a number of information security technologies are being researched
and developed. Among those is biometrics, a technology that stands out among all others as
a highly reliable solution to information security.
What is ¡°Biometrics¡±, and what kind of convenience and security can it offer us?
Biometrics refers to an automated system that can identify an individual by measuring their physical and behavioral uniqueness or patterns, and comparing it to those on record. In other words, instead of requiring personal identification cards, magnetic cards, keys or passwords, biometrics can identify fingerprints, face, iris, palm prints, signature, DNA, or retinas of an individual for easy and convenient verification. With the boom in Internet-based business and the increased need for accurate verification when accessing accounts, biometrics is the simplest and most convenient the solution. Its universal, unique, permanent and measurable features ensures security of information in E-commerce, such as
on-line banking and shopping malls. Biometrics can also provide you with convenience and security,
by enabling a machine to verify the individual by itself and to respond to the individual¡¯s requests.
Through the use of such physical controls as access control, and punch card maintenance, user restrictions on certain apparatus can be made possible with an automated verification system |
 | Comparative Market Share by Technology |
| Home | time attendance & Access Control | ATF008V | ATF0077 | ATF980 | ATF0088 | |
|
|