You are on page 1of 21

Jakin ID Technology

+1-604-278-8888

Why Biometrics?
Fingerprint Patterns
Advanced Minutiae Based Algorithm
Identification vs. Authentication
Security
Applications
Versus other Biometric Technologies
Industry

Inventory access control devices that restrict entry into an


area of a retail establishment can be set up in a number of
ways. Before establishing an access control system, the
question to ask yourself is, How can I institute an access
control device that will not only safeguard my inventory but
also help to establish a concrete audit trail in case there is a
problem so that I can determine the cause? The only sure
way to do this is by using biometric technology.

Biometrics is a security solution based on

something you know, have, and are:


Know

Password, PIN

Have

Key, Smart Card

Are

Fingerprint, Face, Iris

Passwords are not reliable.


Too

many
Can be stolen
Forgotten

Protect Sensitive Information


Banking
Medical

Has been used since 14th century in China


Reliable

and trusted

Will never leave at home


Fingerprints are unique
Everyone

is born with one

80% of public has biometric recorded

There are three main fingerprint patterns: arches,


loops and whorls. Arches are found in about 5% of
fingerprint patterns encountered. The ridges run
from one side to the other of the pattern, making
no backward turn.

6 classes of patterns

Minutiae
Crossover: two ridges
cross each other
Core: center
Bifurcation: ridge
separates
Ridge ending: end point
Island: small ridge b/w 2
spaces
Delta: space between
ridges
Pore: human pore

Two main technologies used to capture image


of the fingerprint
Optical

use light refracted through a prism


Capacitive-based detect voltage changes in skin
between ridges and valleys

Identification Who are you?


1

: N comparison
Slower
Scan all templates in database

Authentication Are you John


Smith?
1

: 1 comparison
Faster
Scan one template

Accuracy
97%

will return correct results


100% deny intruders

Image
Minutiae

Encrypted data

Image

is retrieved and template created

is discarded

Cannot reconstruct the fingerprint from data

Several sensors to detect fake fingerprints


Cannot

Latent print residue (will be ignored)

Cannot

steal from previous user


use cut off finger

Temperature
Pulse
Heartbeat sensors
Blood flow

1 (worst) 5 (best)
Technology Accuracy Convenience Cost Size
Fingerprint

Voice
Face
Hand
Iris

1
2
3
5

5
3
3
2

5
4
2
3

5
3
2
3

Hot market
Lots of $$$

Want to protect information


Passwords are not reliable; forget
Fingerprints have been used for centuries
Fingerprints are unique; can verify
Very accurate
Lots of applications being developed
Hot market. Lots of $$$

Visit us at
www.jakinid.com
Call us at
+1-604-278-8888

RFID solutions
Access Control Solutions
Time and Attendance Solutions
Payroll Management Solutions
Web Payroll Management Solutions
Fingerprint Access Control
Fingerprint Time Attendance

You might also like