Fingerprint readers
are used for computer security.
When you consider how much personal, and often times sensitive, information is stored on computers, it makes sense that data security is an issue that should be given thoughtful consideration. One of the many methods available that computer users can employ to provide some level of computer security is the fingerprint reader.
How They Work
Portable fingerprint reader.
A fingerprint reader or scanner establishes identity by comparing the fingerprint of a user to one or more previously created digital files called templates, which contain information unique to an individual's fingerprint. Each template represents a unique fingerprint. The software that operates the scanner/reader uses the template-as opposed to an actual image of a fingerprint-to compare all stored templates to the fingerprint of an individual requesting identification. If a match is produced the user is "verified."
Types
There are numerous types of scanner sensor technologies, however the capacitive and optical methods are the most common. The capacitive sensor type fingerprint reader senses the difference in capacitance between the ridges and valleys of the fingerprint and creates an image using the contrast. Optical sensor fingerprint readers use a charge coupling device similar to camcorders and digital cameras to create fingerprint images.
Advantages
Establishing the identity of a person using fingerprint analysis is the cheapest, fastest, most reliable and convenient method available. The cost of installing a biometric scanner is very low compared to other security measures. Fingerprint readers provide fast identification and verification processes. If a fingerprint scanner is lost or stolen, there is no security threat because the stored image templates are useless to anyone else. Fingerprint readers are also portable.
Disadvantages
Since fingerprint readers construct templates on the finger being scanned, any damage to the scanned finger can potentially create verification problems. And, although it is estimated to have 60 percent of the global market, biometric fingerprint reader technology is viewed by some as an invasion of privacy. So fingerprint readers may face acceptance issues. It's also been argued that the technology used to store fingerprints as statistical algorithms could possibly be modified to recreate an accurate depiction of an actual fingerprint.
Considerations
Since fingerprint identification technology is well beyond the research and development stage, it is more widely available than other ID technologies. Still, there are some who suggest that the same technology used to store fingerprints as statistical algorithms may also be used or modified to create accurate depictions of original prints. This has created some concern for how data should be stored, maintained and protected to prevent fraudulent use
Tags: fingerprint reader, fingerprint readers, Fingerprint readers, computer security, fingerprints statistical