Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

[Q5] [15POINTS] Dissuss the security impact of a biometric device that sends sim

ID: 3724515 • Letter: #

Question

[Q5] [15POINTS] Dissuss the security impact of a biometric device that sends simply "yes' or "no" to the computer to show the user passed or failed authentication, verse aone that sends a full represenation of the biometric credential to be evaluted on the computer. For example, a user might insert a coded card ( with his or her biometric pattern secretly encoded) into a reder and then place a finger over a pint reader. The reader can then inform the computer that user did or did not match the pattern described on the coded card.

Explanation / Answer

There are two separate stages involved in using a biommetric system.First you have to go through a process called enrollment,where the system learns about all the people it will have to recognize each day.

During enrollment each person fingerprint are scanned,analysed,and then stoed in a coded form on a secure database.typically it takes less than a half second to store a person prints and the system works for over 99 percent pf typical users.

How the computer can compare fingerprints?

During enrollment or verification,each print is typically analyzed for very specific features called minutiae,where the lines in your finger print terminates pr split in two.The computer measures the distances and angles between these feaatures a bit like drawing lines between them.and then uses an algorithm(mathematical process)to turn this informaton into a unique numeric code.comparing fingerprints is then simply a matter of comparing their unique codes.The prints match,and the person gains access.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote