As the market grows to it’s peak with new emerging companies playing their best shot to prove their mark, new ways to crack down there security are also being developed. This has led to the development of better yet weird security systems that grant access only not only by matching finger prints but also their behavior!?
The term used to define this is BIOMETRICS. The word biometric can be defined as “life – measure.” It is used in security and access control applications to mean measurable physical characteristics of a person that can be checked on an automated basis.
You’ll be familiar with the FINGERPRINT RECOGNITION TECHNOLOGY (FRT) that scans the finger prints of a person and matches it against a given database of such prints. But the FRT can be fooled if one is able to take a scan of the person’s finger and place just the paper in the scanner. Here are more complicated security systems that may be deployed in the future.
4. IRIS RECOGNITION
This is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the iris of an individual’s eyes. There’s another less worthy retina scanning which is different. Iris recognition uses camera technology, with subtle infrared illumination to create images of the detail-rich, intricate structures of the iris. But there are possibilities that the image of the retina can scan and converted into a contact lens that the scanner can recognize.
3. FACE RECOGNITION
A facial recognition system analysis and verifies a persons selected facial features from a video source against an already existing database.
2. SMELL/ODOR RECOGNITION
This technology uses a device called ‘electronic nose’. An electronic nose is an intelligent sensing device that uses a gas sensor array of partial and overlapping selectivity along with a pattern-recognition component to distinguish between simple and complex odors.
Here’s the weirdest of them all that your boss might be using to monitor you.
1. KEYSTROKE RECOGNITION
Keystroke dynamics is the detailed timing information that describes exactly when each key was depressed and when it was released as a person is typing at a computer keyboard. It monitors when a keystroke was pressed and released by a person and measures the time interval in nano seconds.
No comments:
Post a Comment