January 24, 2013

beings use biometric time and attendance characteristics identification


Human beings use biometric time and attendance characteristics identification history department traced back to the ancient egyptians by measuring the size of the different parts of body to identification, modern biological recognition technology initial dry in the mid 70 s, because the early identification equipment relatively expensive, so application is limited to level of security requirements of high atomic energy experiment, production base, etc. Now because of the microprocessor and various electronic components cost will be reduced, the accuracy will gradually enhance, biological identification system gradually applied in business license control, such as the entrance guard, the enterprise checkingattendance management system security certification, etc.



Due to the fingerprint is the uniqueness and invariability, and biometric time clock technology has high feasibility and practicability, fingerprint identification becomes the most popular, the most convenient, the most reliable personal identity authentication technology of. Although the fingerprint identification field has many research achievements, but along with the social to the urgent needs of the fingerprint identification, and the fingerprint recognition technology in practical application and test performance of many insufficiencies, in recent years, many research institutions are very actively for the further research in the field of fingerprint identification all key technologies, in order to improve the performance of the fingerprint identification and solve practical problems in use, so as to accelerate the popularization of fingerprint identification technology. But because the noise of the fingerprint, the elasticity of the skin of the nonlinear factors, and many literature because of commercial interests and without public, ideal for automatic fingerprint identification system is still a very difficult task.



being handled.the biometric time clock systems in addition to terminal itself login identification of authentication outside, the network application system, office automation system, being handled.the WEB page, E-mail, database and so on also need to identify the identity authentication, can also be used with the user name and password. According to being handled.the information system passwords requirements, also want to a certain length and regular replacement, is also difficult to memory and operation problems such as inconvenience. For this reason, we in the user login security system private network WEB page, the use of office automation system, database, equipped with fingerprint identification platform software, and cooperate with fingerprint mouse system, will be the original online all kinds of systems use "account + password" identity authentication way, replaced with fingerprint identification authentication system. By using fingerprint identification alternative password password authentication, not only can improve the user identity identification accuracy, but also through the operation log audit, the use of being handled.the system carefully controls, the minimum degree ShiXieMi reduce risk.

fingerprint time clock technology is the whole information security system, and the most important part of the core, once the identity authentication system out of the question, then, the whole information security system will be like the "maginot line", let you as strong as iron, let you enable the most advanced anti-virus, firewall and so on, put leak equipment, suddenly come to naught, thoroughly collapse. Someone do a safety barrel principle analogy, if the information security system as a barrel, then firewall, intrusion detection, VPN security gateway, etc, is the wall board, identity authentication is equivalent to barrel bottom. Can say, identity authentication used to solve the visitor's physical identity and digital identity of the consistency problem, to other security technology provides access management basis, firewall etc technologies for digital identity rights management, solve the question of what do digital identity. Thus it can be seen, identity authentication is the basis of the information security system.

Posted by: davytoney at 03:21 AM | No Comments | Add Comment
Post contains 596 words, total size 5 kb.

Comments are disabled. Post is locked.
13kb generated in CPU 0.0094, elapsed 0.0592 seconds.
33 queries taking 0.0538 seconds, 65 records returned.
Powered by Minx 1.1.6c-pink.