Advanced Identification Systems: Special Security on Laptops

Advanced Identification Systems: Special Security on Laptops

Continuing with the special security on laptops, after seeing more physical protection methods, such as padlocks and backpacks, now it is the turn of a type of advanced security designed to prevent an attacker from accessing the information that we store on your computer. Don’t talk about solutions based only on software, as hardware but Quiviger as readers of fingerprints or identification by the iris of our eyes.

All these methods are based on biometrics, which is a security technology based on the recognition of a physical and non-transferable persons property. Commonly used systems are the fingerprint, iris, voice, retina, face, the Palm of the hand or signature.

The advanced method of identifying most-used today in laptops, mostly from companies, is making use of our fingerprint. This method serves as access to the operating system and even to encrypt the disk.

The fingerprint reader laptops tend to be placed together with the touchpad. Experience with this type of sensor has not been very positive mainly because he had just activated when we didn’t because of its location.

The other system of biometric recognition used in laptops makes use of the already common webcam on computers, and looking our eye to recognize us. It does this by phases. First analyzes the image of the eye, to identify the area of the iris, then process it. Finally unfolds the image, obtaining a rectangular pattern that contains the information for the recognition and that will be that compares in successive accesses to the system.

A step forward in the identification of the iris is the facial recognition, where an application automatically identifies a person attending a digital image, usually taken with a webcam, and based on certain facial features is compared with data from a database. Since the characteristics of the user change with age, it is not too reliable system.

The advantage of safety based systems in biometric identification the management of access to the crew without keys is or passwords, which are easily forgotten or can be stolen. At the consumer level it does not have much relevance, but professionally it is imposing with force.

At the level of individuals, already third-party applications are being implemented for traces of the portable readers, according to which finger pass by the reader, to access to a service or specific application.

Gallery

Biometrics adventures

Biometrics adventures

Source: www.scifiromance.info

Overview of Robotic Vision – Object Tracking and Image …

Overview of Robotic Vision – Object Tracking and Image ...

Source: www.intorobotics.com

What is a minicomputer?

What is a minicomputer?

Source: safebytes.com

XACS101 Software Security Foundations

XACS101 Software Security Foundations

Source: scpd.stanford.edu

XACS215 Mobile Security

XACS215 Mobile Security

Source: scpd.stanford.edu

AUTOMATIC IDENTIFICATION SYSTEM (AIS), AtoN, TRACKING …

AUTOMATIC IDENTIFICATION SYSTEM (AIS), AtoN, TRACKING ...

Source: www.maritec.co.za

OCR Passport Reader ID card scanner

OCR Passport Reader ID card scanner

Source: www.diytrade.com

Processing Options For Implementing Vision Capabilities in …

Processing Options For Implementing Vision Capabilities in ...

Source: www.embedded-vision.com

Vehicle security system final report

Vehicle security system final report

Source: www.slideshare.net

ASUSPRO ADVANCED B53A | Laptops

ASUSPRO ADVANCED B53A | Laptops

Source: www.asus.com

Revoluce se blíží: Americko-čínské závody ve vývoji umělé …

Revoluce se blíží: Americko-čínské závody ve vývoji umělé ...

Source: www.armadninoviny.cz

OGCIO: Smart ID Card Publications/Reference Documents/Links

OGCIO: Smart ID Card Publications/Reference Documents/Links

Source: www.ogcio.gov.hk

Windows 7 Walkthrough: System and Security Control Panel …

Windows 7 Walkthrough: System and Security Control Panel ...

Source: www.techrepublic.com

What is the Google Advanced Protection Program?

What is the Google Advanced Protection Program?

Source: www.cnet.com

Classification of Microorganisms – Chapter 9

Classification of Microorganisms – Chapter 9

Source: slideplayer.com

Configure File Access Auditing in Windows Server 2016 …

Configure File Access Auditing in Windows Server 2016 ...

Source: www.rootusers.com

NCIS Navy Special Agent Security Badge Retractable ID Card …

NCIS Navy Special Agent Security Badge Retractable ID Card ...

Source: www.ebay.com

Generally Accepted Principles and Practices for Securing …

Generally Accepted Principles and Practices for Securing ...

Source: docplayer.net

Flat Line Icons Cloud Data Protection Stock Vector …

Flat Line Icons Cloud Data Protection Stock Vector ...

Source: www.shutterstock.com

Setting up CSIRT

Setting up CSIRT

Source: www.slideshare.net

Comments are closed.