ASYNCHRONOUS CHIPS

12
ASYNCHRONOUS CHIPS SUBMITTED BY ATHIRA BALAKRISHNAN

description

ASYNCHRONOUS CHIPS. SUBMITTED BY ATHIRA BALAKRISHNAN. What is Biometrics ?. - PowerPoint PPT Presentation

Transcript of ASYNCHRONOUS CHIPS

Page 1: ASYNCHRONOUS CHIPS

ASYNCHRONOUS CHIPS

SUBMITTED

BY

ATHIRA BALAKRISHNAN

Page 2: ASYNCHRONOUS CHIPS

What is Biometrics ?

• Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.

Page 3: ASYNCHRONOUS CHIPS
Page 4: ASYNCHRONOUS CHIPS

Why am I so intresting in biometrics

• Social Request

• Personal interest

Page 5: ASYNCHRONOUS CHIPS

*Easiest possible method of employee clock-in and clock-out * Convenient - there is no password to forget, no card to lose * Cost effective - there is a reduction in costs as there is no need for password administration, user up time or user support* Protects the privacy and confidentiality of one's own data as a useful personal PIN can only be used by a particular individual

Benefits

Page 6: ASYNCHRONOUS CHIPS

Problems/issues

Operational :1. Recognition errors:

*the false accept rate (FAR)

A False Accept is when a nonmatching pair of biometric data is wrongly accepted as a match by the system.

*the false reject rate (FRR)

A False Reject is when a matching pair of biometric data is wrongly rejected by the system.

Page 7: ASYNCHRONOUS CHIPS

2.Compromised biometric data• The greatest strength of biometrics is at the same time its

greatest liability. It is the fact that an individual's biometric data does not change over time: the pattern in your iris, retina or palm vein remain the same throughout your life. Unfortunately, this means that should a set of biometric data be compromised, it is compromised forever. The user only has a limited number of biometric features (one face, two hands, ten fingers, two eyes). For authentication systems based on physical tokens such as keys and badges, a compromised token can be easily canceled and the user can be assigned a new token. Similarly, user IDs and passwords can be changed as often as required. But if the biometric data are compromised, the user may quickly run out of biometric features to be used for authentication.

Page 8: ASYNCHRONOUS CHIPS

3.Vulnerable points of a biometric system

•4.Attacks

Page 9: ASYNCHRONOUS CHIPS

Social issue

* People could cut your hand for robbing your money instead of stealing your card. * people fell really unsafe in the society.They have to worry about their personal body information(fingerprinter…) being stored all the time.

Page 10: ASYNCHRONOUS CHIPS

Applications

1.Business

2.Personal

3.Government

4.Military

Video

Page 11: ASYNCHRONOUS CHIPS

A look at one particular systems…

 • Smart lock:

• What do people think about such systems?

Page 12: ASYNCHRONOUS CHIPS

References – • *This website described detailly about what is

Biometrics,what is his functionality,how it used in the scociety at the moment ect.

•  http://www.webopedia.com/TERM/B/biometrics.html • *This website is the electronic Privacy

Information Center, it will tell you all the information about the privacy.

•  http://www.epic.org/ • *This website will tell you all the issues about

the biometrics at the moment.•  • http://biometricwatch.com/privacy.htm