4. •Biometric Systems are automated methods
of verifying or recognizing the identity of a
living person on the basis of some
physiological characteristics, like a fingerprint
or face pattern, or some aspects of behavior,
like handwriting or keystroke patterns. Some
of the most used biometric characteristics are
shown in the picture below. A biometric
system based on physiological characteristics
is more reliable than one which
adopts behavioral features, even if the latter
may be easier to integrate within certain
specific applications.
Introduction
5. 1.2.1.1 Broad Objective
• The broad objective of this report is to exploring the Biometric
application in management.
1.2.1.2 Specific Objectives
• To find out the internal and external Biometric systems application
management
• To identify the Biometric systems.
• To identify the depth of knowledge of the employee who serve.
• How Biometric systems deals with future course of action of pre-
determined goals.
• How Biometric systems helps to achievement of organizational
• To know Biometric systems facilities for various management.
Objectives:
6. 2.2.1 Population: The population of this research project is defined as fallow:
A. Element: Existing some clients of Biometric systems.
B. Unit: Individual clients of Biometric systems.
C. Extent: Al over the world.
D. Time: 28 Nov 2014 to 06 Feb 2015.
2.2.2 Data sources
The information and data for this report have been collected from both the primary and
sources.
a. Primary Data Sources
b. Secondary Data Sources
2.2.3 Data collection Method
Relevant data for this report will be collected primarily by direct investigations of
papers, documents, operational process and different personnel.
Methodology of the Study:
7. Biometrics is an authentication method that uses fingerprint or facial scans
and iris or voice recognition to identify users. A biometric scanning device
takes a user's biometric data, such as an iris pattern or fingerprint scan,
and converts it into digital information a computer can interpret and verify.
Since it is more difficult for a malicious hacker to gain access to a person's
biometric data, and it is unlikely that a user will.
A biometric system is a technological system that uses information about a
person (or other biological organism) to identify that person. Biometric
systems rely on specific data about unique biological traits in order to work
effectively. A biometric system will involve running data through
algorithms for a particular result, usually related to a positive identification
of a user or other individual.
BIOMETRIC SYSTEMS
8. Biometrics systems work by recording and comparing biometric characteristics. In many cases,
characteristics are recorded as images, but for speaker recognition a waveform is recorded, and
for signature recognition, time series data. For efficiency reasons, rather than using recorded
characteristics directly, it is usual to extract identifying features from the samples and encode
these features in a form that facilitates storage and comparison.
When an individual first uses a biometric system, their identifying features are enrolled as a
reference for future comparison.This reference may be stored in a central database or on a card
(or both) depending on the needs of the application.
When biometric recognition is required, the individual's biometric characteristics are recorded
again.This time however, the identifying features are compared by the system with the stored
reference to determine if there is a close match.
Work of biometric systems:
10. Accurate
Identification
Accountability
Easy and Safe for Use
Time Saving
User Friendly Systems
Security
Convenience
Versatility
Scalability
Biometric System in Management
11. 1 Unique: The various biometrics systems have been developed
around unique characteristics of individuals. The probability of 2
sharing the same biometric data is virtually nil.
2 Cannot be shared: Because a biometric property is an intrinsic
property of an individual, it is extremely difficult to duplicate or
cannot give a copy of your face or your hand to someone!).
3 Cannot be copied: Biometric characteristics are nearly
impossible to forge or spoof, especially with new technologies
that the biometric being identified is from a live person.
4 Cannot be lost: A biometric property of an individual can be lost
only in case of serious accident.
Biometrics secure for Management
12. The Biometric System may easily be
applicable to Library System
Management in three ways:
It maintains library patron records
very quickly, accurately, orderly.
It acts as a helpful management
tool for the librarian and other
managerial staff of the library.
It may continue for years together
without any further adding cost
after its installation.
Biometric System in Library
13. The major library areas where the biometric system can be used
successfully:
• Gate Checking
• Circulation Section
• Stack Entry Record
• Internet Searching
The day-to-day library operation and managements may easily be
covered with the application and use of biometric system. Some of
the major areas are:
Surveillance
Staff Attendance
Staff movement record
Biometric System in Library
16. RECOMMENDATION
Information types :biometric systems convert analog information into digital information
that computers can read. Though difficult to do, just like any other authentication
data captured from biometrics systems can be sniffed along the wire of insecure networks
replayed for malicious access.
Very difficult: Biometric imprints that are more esoteric and harder to duplicate present the
least risk of compromise. Iris patterns or electrophysiological signals are very difficult to
making devices using this type of biometrics harder to crack.
Can duplicates: Fingerprints, on the other hand, can be lifted from an everyday object and
used to gain access to a fingerprint reader. Fingerprints can also be copied and molded into
material, like chewing gum or putty. The same goes for voice and facial recognition, which
recorded or photographed to create duplicates for fooling biometric systems.
Typing speed: Other biometrics devices, such as the Bio-Password, measures a user's typing
speed and style to create a unique profile.
Secure servers: Despite the different levels of risk for different biometrics systems, the best
recommendation is to remain device agnostic. Also make sure all biometric data is stored on
17. Concluding Remarks
Biometrics is not a panacea. Implementation should be the result of
cost/benefit analysis stemming from a risk assessment. However, regulatory
constraints sometimes make our decision easy.The only thing possible at that
point is to select the solution that makes sense.
Making sense, or the reasonable and appropriate implementation of
biometrics, includes consideration of several factors.
Understand the limitations of the target operating environments.
Ensure the overall security context supports reference template safety.
Understand the probability of forgery and match it to the importance of that
which you are trying to protect.
Do not implement a biometrics solution that exposes business processes to a
potential business continuity event in the form of sensor or backend
authentication server loss.
Ask each vendor to provide reasonable proof of error rates for the products