Biometrics: Advanced Identity Verification : the Complete Guide
Biometric identity verification (BIV) offers a radical alternative to passports, PIN numbers, ID cards and driving licences. It uses physiological or behavioural characteristics such as fingerprints, hand geometry, and retinas to check a person's identity. It is therefore much less open to fraudulent use, which makes it ideal for use in voting systems, financial transactions, benefit payment administration, border control, and prison access.
This is the first book to provide business readers with an easy-to-read, non-technical introduction to BIV systems. It explains the background and then tells the reader how to get their system up and running quickly. It will be an invaluable read for practitioners, managers and IT personnel - in fact for anyone considering, or involved in, implementing a BIV system.
Julian Ashbourn was one of the pioneers in integrating biometric technology and has provided input into many prototype BIV systems around the world.
33 pages matching biometric pilot scheme in this book
Results 1-3 of 33
What people are saying - Write a review
We haven't found any reviews in the usual places.
Identification verification and templates
6 other sections not shown
accordingly addition administration Analytical Engine ATM machines automated benefits biometric device biometric functionality biometric identity verification biometric methodology biometric pilot scheme biometric reader biometric system biometric technology biometric template biometric verification capture card reader chip card communication components computer keyboards configured consider context County Bank customers database enrolment center ensure environment example project false accepts false rejects fingerprint reader function function function hand geometry Harkhuf identify implementation important individual installation integrate interact interesting intuitive iris scanning issues keyboard Khasekem large numbers magnetic stripe card matching offer online banking operating system organization overall participating partners particular performance perhaps perspective physical access control potential procedures project manager Proximity cards question relatively reliable reports retinal scanning server situation Smiley Card holders stored token transaction typical understand undertaken user's voice verification Whilst