|Posted on Thursday, February 19, 2004 - 07:23 am: ||
Your question seems to be, "At what kind of place or things are fingerprints being used as the only means of enabling access?"
I am guessing that you are trying to ask about biometrics and not positive identification of persons as used in law enforcement. The short answer is “none” if you really mean to ask what systems are using fingerprint biometrics as the “only” means of access. Because biometric systems do not have the robustness of much more expensive law enforcement technology for identifying criminals, it is very common for a person to not be recognized by a biometric system (even though they really are the person registered in the system). Therefore, there is always an override feature on biometric systems to enable a human security guard or system administrator to grant access even though the system could not “match” the person’s biometrics. This loophole in biometrics technology is standard practice to insure that such systems are user friendly enough to be acceptable as a business practice. Thus, imposters need to have good human interaction skills to convince the security guard or system administrator to ignore the biometric red light “no match” response and grant them access.
Here is a link to a website about biometrics:
Biometrics typically are designed for business processes where a person wants to be recognized. Conversely, law enforcement automated fingerprint identification systems (AFIS) are engineered to do the opposite - to screen for persons attempting to evade detection. Biometric fingerprint systems work well to replace PINs, passwords and ID bracelets (or similar tokens) for controlled groups of persons such as computer users or prison inmates. In those situations, the person who wants to use their computer or the prisoner who wants to come in from the exercise yard can be denied access until (often after repeated attempts) they carefully provide a fingerprint that the system is capable of matching.
By analogy, biometrics can be thought of as similar to the business process of an electronic card reader at a toll booth permitting a car to pass through without the inconvenience of stopping to manually pay each time they want to enter… while law enforcement AFIS would be more similar to an officer querying NCIC to see if the national law enforcement database indicates that a car is stolen or was involved in a crime.
The two technologies are apples and oranges insofar as positive identification versus being “close enough” to be considered a “match.”
|Posted on Wednesday, February 18, 2004 - 04:23 pm: ||
it's a project for school, im in police science.