Biometric Authentication: Enhancing Security in Physical Spaces

Classified in Computers

Written at on English with a size of 4.46 KB.

Biometric Systems: Enhancing Security

Biometric systems, applied to information systems, allow for the authentication of individuals using electronic technologies. These technologies employ complex mathematical formulas to ensure that the person applying for entry to a resource, or a physical space, is who they claim to be.

Increased Security with Biometric Access Systems

Personal identification methods to control access are based on:

  • Something you know: passwords or access keywords.
  • Something you own: for example, an encoded magnetic card.
  • A personal characteristic: such as fingerprints or iris.

Combining two or more methods provides an even higher level of security.

Biometrics: Key Characteristics

  • Universality: All individuals possess this characteristic.
  • Uniqueness: The characteristic is distinct for each individual.
  • Permanence: The characteristic does not change over time, either in the short or long term.
  • Quantifiability: The characteristic can be measured by any system.

Characteristics Required of a Biometric System

  • Effectiveness: Its use must be convenient and faster for users.
  • Acceptability: It should not cause rejection from individuals undergoing recognition and cannot be dangerous to health or physical integrity.
  • Reliability: It must be robust, ensuring the most reliable results, and resistant to manipulation or fraudulent use.

Functioning of a Biometric System

  • Identification: After obtaining a person's biometric characteristics, they are entered into a database. A search is performed to determine to which person they belong.
  • Verification: Used to verify that a person is who they claim to be.

Biometrics for Physical Access Control

Iris Recognition

The iris, the colored part of the eye, is read throughout life. The ID reader is placed near entrances, either on the wall or on a stand. During data collection, the software processes the image, applying algorithms to obtain parameters. These parameters are encoded and stored in the database, serving as a measure for recognition and determining access to designated areas. High reliability.

Hand Geometry

This method captures the network of veins in the palms. A device emits near-infrared rays that reflect on the hand. Hemoglobin's properties cause the veins to appear black in the resulting image. A digital image framework is created and stored in a database for subsequent identification and access control. High reliability.

Facial Recognition

Based on the placement of points on a facial image and measuring the distances between them. After data entry, the person stands in front of a video camera that captures their image. The camera software recognizes key facial points and calculates distances. The obtained values are compared with the database to identify the person and grant or deny entry or exit. Medium-low reliability.

Fingerprint Recognition

Facilitates the identification and comparison of fingerprints with databases without relying on visual recognition. The system extracts the fingerprint pattern similarly to iris recognition. However, subsequent identification requires contact between the finger and the ID reader's surface. Medium reliability.

Integration and Centralization of Access Control Systems

Different access control systems can be centralized in a powerful computer. This computer connects to and manages these resources through dedicated software. Typically, this is an integrated application suite providing all necessary utilities for management and access control.

Responsibilities of Technical Microcomputer and Network Specialists

The study of each case's specific needs, budgeting, and installation of access control systems are carried out by companies that distribute electronic systems or by specialized professionals. The person responsible for the installation and maintenance of computer systems and networks must possess knowledge of security measures to protect the physical environment and advise on the suitability of installing these systems.

Entradas relacionadas: