As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention.
Biometrics measure individuals' unique physical or behavioral characteristics to recognize or authenticate their identity. Common physical biometrics include fingerprints; hand or palm geometry; and retina, iris, or facial characteristics. Behavioral characters include signature, voice, keystroke pattern, and gait. Of all these biometrics, technologies for fingerprint and hand are the most developed.
Of all the above, a biometric is the most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten, and forging one is practically impossible. Biometrics can be integrated into any application that requires security, access control, and identification or verification of people.
Vistech products are based on finger print recognition technology which is very secure most non-intrusive and widely accepted the world over
» Finger Print Recognition
A fingerprint looks at the patterns found on a fingertip. There are a variety of approaches to fingerprint verification. Some emulate the traditional police method of matching pattern; others use straight minutiae matching devices; and still others are a bit more unique, including things like moiré fringe patterns and ultrasonics. A greater variety of fingerprint devices are available than for any other biometric.
Fingerprint verification may be a good choice for in-house systems, where you can give users adequate explanation and training, and where the system operates in a controlled
Environment. It is not surprising that the work-station access application area seems to be based almost exclusively on fingerprints, due to the relatively low cost, small size, and ease of integration of fingerprint authentication devices.
Vistech fingerprint recognition is based on minutiae matching and intelligent scanners that can detect when a live finger is presented.
» How It Works
Fingerprint systems translate illuminated images of fingerprints into digital code for further software such as enrollment (fingerprint registration) and verification (authentication of registered users).
The devices use the advanced SEIR method and CMOS image sensor to capture high contrast, high resolution fingerprint images that are virtually distortion-free. A series of powerful algorithms extract minutiae data from the image, mapping the distinguishing characteristics of fingerprint ridge ends, bifurcations, loops, splits, upper and lower cores.
This data is then converted into a digital template, and stored in a database. The actual fingerprint image is never stored, and cannot be constructed from templates. To identify or verify a fingerprint, a proprietary matching algorithm compares the new template made from the extracted minutiae points from the input fingerprint on the optical module to a previously stored sample. The entire matching process takes roughly one second. Authentication takes place either locally or on a server, depending on system configuration.