Biometric password generation

Password widely used method for protecting information and other drugs were allowed: in computer networks, ATMs, phone cards, etc. However, passwords can be forgotten, stolen or broken. In this regard, biometric identification is more reliable as fingerprint or eye can not disappear so easily. There are also examples of a combination of biometric and password, or scan areas to protect or to generate random passwords. Implementation Reports of biometric password generation creates numerous benefits for the daily use.

The point of password to use to create universal and easy to install system, the issue of biometric use is to create a very secure system.

Biometric market is now worth 3.4 billion U.S. dollars with an annual growth of 29.1%, mainly among the finger-scan technology (59%), facial and iris scanning (13%), tax (0.4% ) and signature scans (2.7%). Proposed invention targets end-users, small and medium enterprises and dissemination of information systems need: L 1-Convenient, effective and safe solution for the storage of personal passwords, ie - flexibility in the installation of access control devices: ie biometric scanners and password generators in university laboratories and libraries or Internet media subscription services.

Since safety concerns in the modern world are constantly growing, biometric password generation is able to win at least 3% of the total biometric market.

Advantages biometric password management

-Passwords are unique because of the uniqueness of biometric identifiers. - Passwords are permanent because they use certain mathematical algorithm (table coding) for coding. Other methods on the market simply to generate random passwords, useless for most applications. - Passwords do not require additional storage or processing (ie the comparison of a fingerprint in a database with etalon). - Passwords used is flexible and can be invented in many applications, from personal password generators to the control box. - Passwords are secure because the user can select any encoding table or coordinate just the password to generate this selection, but easily remember.
One of the key principles is that the password remains the most popular security measure. Anyway, to answer whether the existing or new technologies will impact our invention, we need to discuss areas of application and how it should be realized.
Application
2. Technology
Application of our invention and straigntforvard is simple: to generate passwords and to ensure their safety. Need a password for all generations shows that more than a password, whether for banking, email, or administration. Password saving is of course uncertain, or in Notepad or a bullet-proof safe. Present invention claims to offer such technology using fingerprints.
2. However, with technological developments, new market developments and bring happiness to their inventors. The recent example is a group of Russian students, who offered the device for facial recognition and attracted several million venture fund investments from Japan.

To generate password (http://merqum.com), biometric identifier must be permanent, distinctive and have a high performance, ease of use should be universal and collectible. Fingerprint technology is also a leader in biometric technology and we present some comments below why they are better than others. • DNA: deoxyribonucleic acid (DNA) is the one-dimensional ultimate unique code for one's individuality, except for the fact that identical twins have identical DNA patterns. However, there are a number of considerations in using it. • Facial, hand and hand vein infrared thermograms: The pattern of the heat radiated by the human body is a characteristic of every individual body and can be captured by an infrared camera in an unobtrusive way much like a regular (visible spectrum) photo picture. The technology can be used for covert recognition and can differentiate between identical twins. A thermogram-based system is non-contact and non-invasive, but sensing challenges in uncontrolled environments where the heat coming surf1aces in the vicinity of the body such as heaters and vehicle exhaust pipes, can have drastic consequences for the image acquisition phase. Infrared sensors are priceless, which is a factor inhibiting widespread use of the thermograms. • Gait: Gait is the peculiar way one walks and is a complex spatiotemporal biometric. • Hand and finger geometry: Some functions related to a human hand (eg the length of the fingers) are relatively invariant and special (though not very distinctive) to an individual. The representative requirements of the hand are very small (nine bytes in one of the commercially available products), which is an attractive feature for bandwidth and memory-limited systems. • Iris: Visual texture of the human iris is determined by the chaotic morphogenetic processes during embryonic development and is posited to be distinctive for each person and each eye (Daugman, 1999a). Iris identification technology is a very accurate biometrics. Ease of use and system integration is not traditional strengths with iris scanning devices, but people can expect improvements in these areas as new products emerge.

• retina scan: The retinal vasculature is rich in structure and is intended as a feature of to each individual and each eye. It is claimed to be the most secure biometric because it is not easy to change a copy of the retinal vasculature The image acquisition involves the cooperation of the subject, is in contact with the eyepiece, and requires a conscious effort on the part of the user . All these factors affect the social acceptability of the retina biometrics. Retinal vasculature can reveal some medical conditions (eg, hypertension), which is another factor in the way of public acceptance of retinal scan based on biometrics. • Voice: Voice recording is unobtrusive and voice print is an acceptable biometric in almost all societies. Vote may be the only viable biometric recognition applications that a person on a phone. Vote is not expected to sufficiently distinctive to identify an individual permit from a large database of identities. Additionally, a voice signal available for recognition is usually degraded in quality from the microphone, communication channel, and digitizer characteristics. Voice is also influenced by the health of a person (eg, cold), stress, emotions and so on. Besides, some people seem to be extraordinarily adept at imitating others. • Finger-scan biometrics is based on the distinctive characteristics of a human fingerprint. It is not surprising that the workstation access application seems almost exclusively based on fingerprints, due to the relatively low cost, small size and ease of integration of fingerprint authentication devices.

As it is clear from the above investigation, biometric techniques are different in applicability, the use of the use, acceptability, etc. It is unlikely that the technique will benefit some market share to change others, particularly the most popular, such as fingerprint or face recognition. A successful combination of biometric techniques is capable of creating its own niche market.

The market.
Biometric market is now worth 3.4 billion U.S. dollars with an annual growth of 29.1%, mainly among the finger-scan technology (59%), facial and iris scanning (13%), scale (0 , 4%) and signature scans (2.7%). Pocket USB password generators, L-1 installation flexibility of access control devices: ie, biometric scanners and password generators in university laboratories and libraries or Internet media subscription services. As safety concerns in the modern world are constantly growing, biometric password generation is able to get at least 3% of total market.Additional biometric details are available at http://merqum.com

Biometrics security expert

Share and Enjoy:
  • Print
  • Digg
  • StumbleUpon
  • del.icio.us
  • Facebook
  • Yahoo! Buzz
  • Twitter
  • Google Bookmarks
  • Add to favorites

Leave a Reply

Spam protection by WP Captcha-Free