Biometrics

Introduction

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent.


Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies.


Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy. Utilized alone or integrated with other technologies such as smart cards, encryption keys and digital signatures, biometrics are set to pervade nearly all aspects of the economy and our daily lives. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs). This is because biometrics links the event to a particular individual (a password or token may be used by someone other than the authorized user), is convenient (nothing to carry or remember), accurate (it provides for positive authentication), can provide an audit trail and is becoming socially acceptable and inexpensive.
 

Physiological or Behavioral

To elaborate on this definition, physiological biometrics are based on measurements and data derived from direct measurement of a part of the human body. Fingerprint, iris-scan, retina-scan, hand geometry, and facial recognition are leading physiological biometrics.

Behavioral characteristics are based on an action taken by a person. Behavioral biometrics, in turn, are based on measurements and data derived from an action, and indirectly measure characteristics of the human body. Voice recognition, keystroke-scan, and signature-scan are leading behavioral biometric technologies. One of the defining characteristics of a behavioral biometric is the incorporation of time as a metric – the measured behavior has a beginning, middle and end.
 



Verification vs Identification

A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. An important issue in designing a practical system is to determine how an individual is identified. Depending on the context, a biometric system can be either a verification (authentication) system or an identification system.

There are two different ways to resolve a person's identity: verification and identification. Verification (Am I whom I claim I am?) involves confirming or denying a person's claimed identity. In identification, one has to establish a person's identity (Who am I?). Each one of these approaches has it's own complexities and could probably be solved best by a certain biometric system.

 

In day-to-day life most people with whom you do business verify your identity. You claim to be someone (your claimed identity) and then provide proof to back up your claim. For encounters with friends and family, there is no need to claim an identity. Instead, those familiar to you identify you, determining your identity upon seeing your face or hearing your voice.

These two examples illustrate the difference between the two primary uses of biometrics: identification and verification. 

Identification (1:N, one-to-many, recognition) – The process of determining a person’s identity by performing matches against multiple biometric templates. Identification systems are designed to determine identity based solely on biometric information. There are two types of identification systems: positive identification and negative identification. Positive identification systems are designed to find a match for a user’s biometric information in a database of biometric information. 

Positive identification answers the “Who am I?,” although the response is not necessarily a name – it could be an employee ID or another unique identifier. A typical positive identification system would be a prison release program where users do not enter an ID number or use a card, but simply look at a iris capture device and are identified from an inmate database. Negative identification systems search databases in the same fashion, comparing one template against many, but are designed to ensure that a person is not present in a database. This prevents people from enrolling twice in a system, and is often used in large-scale public benefits programs in which users enroll multiple times to gain benefits under different names.

Not all identification systems are based on determining a username or ID. Some systems are designed determine if a user is a member of a particular category. For instance, an airport may have a database of known terrorists with no knowledge of their actual identities. In this case the system would return a match, but no knowledge of the person’s identity is involved. 

Verification (1:1, matching, authentication) – The process of establishing the validity of a claimed identity by comparing a verification template to an enrollment template. Verification requires that an identity be claimed, after which the individual’s enrollment template is located and compared with the verification template. Verification answers the question, “Am I who I claim to be?” Some verification systems perform very limited searches against multiple enrollee records. For example, a user with three enrolled fingerprint templates may be able to place any of the three fingers to verify, and the system performs 1:1 matches against the user’s enrolled templates until a match is found. One-to-few. There is a middle ground between identification and verification referred to as one-to-few (1:few). This type of application involves identification of a user from a very small database of enrollees. While there is no exact number that differentiates a 1:N from a 1:few system, any system involving a search of more than 500 records is likely to be classified as 1:N. A typical use of a 1:few system would be access control to sensitive rooms at a 50-employee company, where users place their finger on a device and are located from a small database. 

Applications

Biometrics is a rapidly evolving technology which is being widely used in forensics such as criminal identification and prison security, and has the potential to be used in a large range of civilian application areas. Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. It can be used during transactions conducted via telephone and internet (electronic commerce and electronic banking). In automobiles, biometrics can replace keys with key-less entry devices.

 

Biometrics technologies

The primary biometric disciplines include the following:

Disciplines with reduced commercial viability or in exploratory stages include:

 

How it works

Biometric systems convert data derived from behavioral or physiological characteristics into templates, which are used for subsequent matching. This is a multi-stage process whose stages are described below.  

Enrollment - The process whereby a user’s initial biometric sample or samples are collected, assessed, processed, and stored for ongoing use in a biometric system. Enrollment takes place in both 1:1 and 1:N systems. If users are experiencing problems with a biometric system, they may need to re-enroll to gather higher quality data. 

Submission - The process whereby a user provides behavioral or physiological data in the form of biometric samples to a biometric system. A submission may require looking in the direction of a camera or placing a finger on a platen. Depending on the biometric system, a user may have to remove eyeglasses, remain still for a number of seconds, or recite a pass phrase in order to provide a biometric sample. 

Acquisition device – The hardware used to acquire biometric samples. The following acquisition devices are associated with each biometric technology:

Technology Acquisition Device
Fingerprint Desktop peripheral, PCMCIA card, mouse, chip or reader embedded in keyboard
Voice recognition Microphone, telephone
Facial recognition Video camera, PC camera, single-image camera
Iris-scan Infrared-enabled video camera, PC camera
Retina-scan Proprietary desktop or wall-mountable unit
Hand geometry Proprietary wall-mounted unit
Signature-scan Signature tablet, motion-sensitive stylus 
Keystroke-scan Keyboard or keypad

Biometric sample - The identifiable, unprocessed image or recording of a physiological or behavioral characteristic, acquired during submission, used to generate biometric templates. Also referred to as biometric data. The following sample types are associated with each biometric technology:   

Technology Biometric Sample
Fingerprint Fingerprint image
Voice recognition Voice recording
Facial recognition Facial Image
Iris-scan Iris Image
Retina-scan Retina Image
Hand geometry 3-D image of top and sides of hand and fingers
Signature-scan Image of signature and record of related dynamics measurements
Keystroke-scan Recording of characters typed and record of related dynamics measurements 

Feature extraction - The automated process of locating and encoding distinctive characteristics from a biometric sample in order to generate a template. The feature extraction process may include various degrees of image or sample processing in order to locate a sufficient amount of accurate data. For example, voice recognition technologies can filter out certain frequencies and patterns, and fingerprint technologies can thin the ridges present in a fingerprint image to the width of a single pixel. Furthermore, if the sample provided is inadequate to perform feature extraction, the biometric system will generally instruct the user to provide another sample, often with some type of advice or feedback. 

The manner in which biometric systems extract features is a closely guarded secret, and varies from vendor to vendor. Common physiological and behavioral characteristics used in feature extraction include the following: 

Technology Feature Extracted
Fingerprint Location and direction of ridge endings and bifurcations on fingerprint
Voice recognition Frequency, cadence and duration of vocal pattern
Facial recognition Relative position and shape of nose, position of cheekbones
Iris-scan Furrows and striations in iris
Retina-scan Blood vessel patterns on retina
Hand-scan Height and width of bones and joints in hands and fingers
Signature-scan Speed, stroke order, pressure, and appearance of signature
Keystroke-scan Keyed sequence, duration between characters

Template – A comparatively small but highly distinctive file derived from the features of a user’s biometric sample or samples, used to perform biometric matches. A template is created after a biometric algorithm locates features in a biometric sample. The concept of the template is one of biometric technology’s defining elements, although not all biometric systems use templates to perform biometric matching: some voice recognition system utilize the original sample to perform a comparison.

Depending on when they are generated, templates can be referred to as enrollment templates or verification templates. Enrollment templates are created upon the user’s initial interaction with a biometric system, and are stored for usage in future biometric comparisons. Verification templates are generated during subsequent verification attempts, compared to the stored template, and generally discarded after the comparison. Multiple samples may be used to generate an enrollment template – facial recognition, for example, will utilize several facial images to generate an enrollment template. Verification templates are normally derived from a single sample – a template derived from a single facial image can be compared to the enrollment template to determine the degree of similarity.  

Just as the feature extraction process is a closely held secret, the manner in which information is organized and stored in the template is proprietary to biometric vendors. Biometric templates are not interoperable – a template generated in vendor A’s fingerprint system cannot be compared to a template generated in vendor B’s fingerprint system.

Biometric decision-making is frequently misunderstood. For the vast majority of technologies and systems, there is no such thing as a 100% match, though systems can provide a very high degree of certainty. The biometric decision-making process is comprised of various components, as indicated below.

Matching - The comparison of biometric templates to determine their degree of similarity or correlation. A match attempt results in a score that, in most systems, is compared against a threshold. If the score exceeds the threshold, the result is a match; if the score falls below the threshold, the result is a non-match.



Biometric comparisons take place when proprietary algorithms process biometric templates. These algorithms manipulate the data contained in the template in order to make valid comparisons, accounting for variations in placement, background noise, etc. Without the vendor algorithm, there is no way to compare biometric templates – comparing the bits which comprise the templates does not indicate if they came from the same user. The bits must be processed by the vendor as a precondition of comparison.

The matching process involves the comparison of the match template, created upon sample submission, with the reference template(s) already on file. In 1:1 verification systems, there is generally a single match template matched against a reference template. In 1:N identification systems, the single match template can be matched against dozens, thousands, even millions of reference templates.

In most systems, reference and match templates should never be identical. An identical match is an indicator that some sort of fraud is taking place, such as the resubmission of an intercepted or otherwise compromised template.

Score – A number indicating the degree of similarity or correlation of a biometric match. Traditional verification methods – passwords, PINs, keys, and tokens - are binary, offering only a strict yes/no response. This is not the case with most biometric systems. Nearly all biometric systems are based on matching algorithms that generate a score subsequent to a match attempt. This score represents the degree of correlation between the match template and the reference template. There is no standard scale used for biometric scoring: for some vendors a scale of 1-100 might be used, others might use a scale of –1 to 1; some vendors may use a logarithmic scale and others a linear scale. Regardless of the scale employed, this verification score is compared to the system’s threshold to determine how successful a verification attempt has been.

Incidentally, many systems return a score during enrollment, referred to as an enrollment score or quality score. This score refers to how successful the extraction process was at finding distinctive features in the biometric sample. If the sample was rich in information, there will likely be a high enrollment score. This score is not used in the matching process, but might be used to determine whether a user can enroll successfully. A low quality score may indicate that the user cannot be reliable verified.

Threshold - A predefined number, often controlled by a biometric system administrator, which establishes the degree of correlation necessary for a comparison to be deemed a match. If the score resulting from template comparison exceeds the threshold, the templates are a “match” (though the templates themselves are not identical).

When a biometric system is set to low security, the threshold for a successful match is more forgiving than when a system is set to high security.

Decision – The result of the comparison between the score and the threshold. The decisions a biometric system can make include match, non-match, and inconclusive, although varying degrees of strong matches and non-matches are possible. Depending on the type of biometric system deployed, a match might grant access to resources, a non-match might limit access to resources, while inconclusive may prompt the user to provide another sample.

One of the most interesting facts about most biometric technologies is that unique biometric templates are generated every time a user interacts with a biometric system. As an example, two immediately successive placements of a finger on a biometric device generate entirely different templates. These templates, when processed by a vendor’s algorithm, are recognizable as being from the same person, but are not identical. In theory, a user could place the same finger on a biometric device for years and never generate an identical template.

Therefore, for most technologies, there is simply no such thing as a 100% match. This is not to imply that the systems are not secure – biometric systems may be able to verify identify with error rates of less than 1/100,000 or 1/1,000,000. However, claims of 100% accuracy are misleading and are not reflective of the technology’s basic operation.
 

Benefits

For employers

Reduced costs – password maintenance
Reduced costs – no buddy punching
Increased security – no shared or compromised passwords
Increased security – deter and detect fraudulent account access
Increased security – no badge sharing in secure areas
Competitive advantage – familiarity with advanced technology

For employees

Convenience – no passwords to remember or reset
Convenience – faster login
Security – confidential files can be stored securely
Non-repudiation – biometrically transactions difficult to refute

For consumers

Convenience – no passwords to remember or reset
Security – personal files, including emails, can be secured
Security – online purchases safer when enabled by biometric
Privacy – ability to transact anonymously  

For retailers (online and point-of-sale)

Reduced costs – biometric users less likely to commit fraud
Competitive advantage – first to offer secure transaction method
Security – account access much more secure than via password

For public sector usage

Reduced costs – strongest way to detect and deter benefits fraud
Increased trust – reduced entitlement abuse

 

Are Biometric Systems Difficult to Use?

Biometrics are much easier to use than one might expect. Here is a brief technology-by-technology summary of how one interacts with biometric systems.

Fingerprint. When prompted, the user gently places his or her finger on a postage-stamp sized optical or silicon surface. This surface, known as a platen, is built into a peripheral device, mouse, keyboard, or PCMCIA card. The user generally must hold the finger in place for 1-2 seconds, during which automated comparison and matching takes place. After a successful match, the user has access to programs, files, or resources. Typical verification time from “system ready” prompt: 2-3 seconds.

Facial recognition. User faces the camera, preferably positioned within 24 inches of the face. Generally, the system will locate one’s face very quickly and perform matches against the claimed identity. In some situations, the user may need to alter his facial aspect slightly to be verified. Typical verification time from “system ready” prompt: 3-4 seconds.

Voice recognition. User positions him or herself near the acquisition device (microphone, telephone). At the prompt, user either recites enrollment pass phrase or repeats pass phrase given by the system. Typical verification time from “system ready” prompt: 4-6 seconds.

Iris-scan. User positions him or herself near the acquisition device (peripheral or standalone camera). User centers eye on device so he or she can see the eye’s reflection. Depending on the device, the user is between 2-18 inches away. Capture and verification are nearly immediate.  Typical verification time from “system ready” prompt: 3-5 seconds.

Retina-scan. User looks into a small opening on a desktop or wall-mounted device. User holds head very still, looking at a small green light located within the device.  Typical verification time from “system ready” prompt: 10-12 seconds.

Hand geometry. User places hand, palm-down, on an 8 x 10 metal surface with five guidance pegs. Pegs ensure that fingers are placed properly, ensure correct hand position. Typical verification time from “system ready” prompt: 2-3 seconds.

Signature-scan. User positions himself to sign on tablet (if applicable). When prompted, user signs name in tablet’s capture area. Typical verification time from “system ready” prompt: 4-6 seconds.

Keystroke-scan.  User types his or her password or pass phrase. Typical verification time from “system ready” prompt: 2-3 seconds.

 

Security of biometrics template

If my template is compromised, does that mean that I can never use the biometric again?

Not in a well-designed system. If a criminal steals or guesses your password, it is very easy to have it changed. There is a fear, however, that if a criminal gets hold of a biometric template, the damage is irreparable - there is no way to change that part of your body. Although templates are often encrypted when in transit and storage in order to protect against such an occurrence, what happens if a template is compromised?

The answer depends on how well a biometric system is designed. If a system allows a template to be inserted into the verification process without ensuring that this template came from an actual placement, a compromised template can pose a problem. However, a well-designed system will ensure that the information it is analyzing is not a recording but is in fact a new sample.

One way to assure that a new template is being submitted is to seed the request for a sample. This involves the biometric system sending an encrypted random number (known as a seed) to the biometric sensor. This number can be encrypted such that only the sensor itself can decrypt the message. When returning the biometric template, the sensor also sends the seed number back (encrypted). This ensures that the template being sent was created immediately after the request for the template (as opposed to an old template that has been recorded and played back).

The size of a template varies by technology and vendor. It varies from 9 bytes to as much a 2kb. Fingerprint template is normally about 500Bytes in size. Templates can be stored in databases or files.

 

What Factors Cause Biometric Systems to Fail?

Biometric system performance varies according to sample quality and the environment in which the sample is being submitted. While it is not possible to definitely state if a biometric submission will be successful, it is possible to locate factors that can reduce affect system performance. 

The IBG Strike System details, technology-by-technology, aspects that work against a successful verification. Some of these strikes are listed below.

Fingerprint

Voice recognition

Facial recognition

Iris-scan

Retina-scan

Hand geometry

Signature-scan

In addition, for many systems, an additional strike occurs when a long period of time has elapsed since enrollment or since one’s last verification. If significant time has elapsed since enrollment, physiological changes can complicate verification. If time has elapsed since a user’s last verification, the user may have “forgotten” how he or she enrolled, and may place a finger differently or recite a pass phrase with different intonation. For the most part, a single strike will probably not materially affect the performance of a given system. However, as you have more and more strikes for a given submission, your chances of a successful verification diminish. 

These strikes do not include inherent characteristics such as age, ethnicity, or gender, which can also affect system accuracy. The performance of many biometric systems varies for specific populations.

 

 

Application design

As in all good application designs, it is the business process requirements which should drive the design - not the other way around. Similarly the specific type of biometric chosen, i.e., fingerprints, iris codes, hand geometry etc. should reflect the application requirements - the application should not be a slave to an individual biometric methodology.

A successful application development and deployment scenario may follow a path something like the following;

Identify the business and operational requirements clearly, together with any current problems and the effect they are having on the situation.

Develop and agree a suitable business process which has the potential to significantly improve on the current situation, given the current state of technology.

Quantify the operational logistics such as (in an access control context) number of people, time profile / distribution of transactions, type of entry point, target transaction time, environmental considerations, availability and profile of system operators and so on.

Analyse existing situation and processes in order to identify legacy requirements and system interaction - it may be necessary to retain or assure compatibility with certain existing processes.

Design a system architecture which accounts for all of the above whilst remaining open for future development and enhancement.

Design an operating methodology and user interface which satisfies the above requirements in an intuitive and attractive manner.

Choose the appropriate front end technology accordingly (i.e., biometric / biometric and chip card etc.) ensuring that the biometric methodology is the most suitable for this application.

Interface the biometric / token technology with your system.

Thoroughly test and document the system in house before demonstrating the system to the client and agreeing and documenting any design changes.

Develop and schedule an operator training programme together with the provision of system manuals as necessary.

Install and commission the system having surveyed the site and noted relevant conditions and with due consideration to existing systems.

Hand over the system after ensuring that operators have a comprehensive understanding of the functionality and that all operating data is present and correct.

In the above example, you will notice that the final choice of a biometric came relatively far down the list. We should only be considering this parameter once we have fully understood the business requirement and the potential benefit that adopting a biometric system might bring.

In defining the specification required, we should concern ourselves with perceived ease of use, acceptable transaction time, contingency measures for errors, where the biometric template should be stored, enrolment procedures and logistics and general compatibility and connectivity issues.

We should also understand the distinction between verification and identification. In short, verification is a straightforward one to one check whereby we are comparing a live biometric sample with a single stored template with a simple match or no match result. Identification is a different kettle of fish entirely as we may be seeking to compare a live biometric sample with hundreds, thousands or conceivably even millions of stored templates. The probability of errors multiplies with the number of templates in the database. Currently, there is really only one commercially available product which offers the promise of practical identification from a large database of templates. For the majority of applications we are probably going to be concerned with biometric verification..

We must also consider where the biometric template (the individual reference derived from taking a biometric sample or series of samples) will be stored. It may be that the template is stored on a token such as a chip card and input into the system by the user prior to verification. This would certainly allow for a large user base as well as a degree of portability between systems and would provide for automatic updating of templates if appropriate. Alternatively, we may decide to keep the templates on a central database and call them from either a card swipe or PIN input for comparison. This decision will naturally have an impact on system hardware and configuration - if we are maintaining a central database we had better be sure about our system host and it's communication with the biometric readers, not to mention the usual database maintenance and backup requirements.

Whilst we are on the subject of hardware, it is worth stressing the importance of understanding the cabling and line termination requirements of different communication protocols. Lack of attention to detail in this area can often result in temperamental performance and perceived intermittent faults which can be difficult to trace subsequently. Whilst this may seem like stating the obvious, it is surprising how often otherwise well designed systems are tripped over by poor installation practice.

You will have noticed that we have got a long way into this paper without trundling out the usual marketing promises about biometrics or contemplating the old chestnuts of false accepts / false rejects etc. This is deliberate - one can concentrate too much on the theoretical individual device performance issues. The performance we should concern ourselves with is that of the entire system, not individual components. In the real world, theoretical performance may be influenced greatly by other less quantitative parameters. For example, a badly sited reader which is difficult for individuals to use comfortably will almost certainly result in increased false rejects, even though the system may be functioning properly. Similarly, a lack of training or understanding among both system administrators and regular users will play havoc with your anticipated performance. The operational processes coupled to the perception and attitude of the user are as much of a performance criterion as biometric hardware specifications. These elements, coupled with overall system design and component performance combine to produce the Total System Performance (TSP). It is the TSP that we should have uppermost in our minds throughout the development and implementation of the entire project.

To put this into perspective, it would seem rather pointless to have lengthy discussions about the inclined valve angle on a one litre petrol engine which we are fitting into a three ton vehicle - we should be asking about power to weight ratios and what sort of engine we need to propel this vehicle at the required speed. The same is true of our biometric system. We must consider the system as a whole, together with our business related objectives for implementing such a system.

So far, we have discussed some of the issues inherent in a typical systems supplier / client situation. In certain cases, the end user (or retained systems house) may wish to buy in the component technology on an OEM basis and develop their own custom application according to precise requirements. In the early days of biometrics this would have been quite difficult with many of the proprietary products available. These days life is a lot easier for the application development team as several of the leading device manufacturers have taken the trouble to make available a Software Development Kit (SDK) for use with their product. This usually takes the form of a set of DLL's which the developer may call from his application in order to access various functions of the device. This allows the developer to concentrate on the user interface and program logic without having to get too involved with the low level coding detail.

This is certainly a step forward and is to be welcomed. However, it is a little device specific in the sense that if you decided later on to use a different front end biometric device, then you would need to rewrite your application accordingly. This may be acceptable in some instances, but what if you wish to use more than one type of biometric device on your system? This is not unreasonable. You may wish to use a dual biometric for high security reasons, or to use different biometrics in different areas for environmental reasons. This can complicate matters somewhat. It would be nice perhaps if there were a universally accepted biometric Application Programming Interface (API) which developers could use in order to mix biometric methodologies within a single system. In fact, there has been much work undertaken in this context and by the time you read this paper at least one such API should be freely available. The question is, will the biometric manufacturers be happy to comply with and support such an initiative? I hope that they will, but suspect that this may take a while to become embedded in biometric culture.

What of the future? The is no doubt that biometric technology is mature and eminently useable across a wide variety of advanced personal ID related applications. Both the systems integrator and the end user have a wider choice than ever of front end biometric components and it is easier than it has ever been to integrate these components into bespoke systems. Individual unit cost is still relatively high for biometric products, but this too is changing and several manufacturers are introducing lower cost OEM modules to the market place.

In short, if you have an operational problem that biometrics might solve there is no reason to sit on the fence any longer - biometrics are alive and well and available off the shelf at a location near you!

 

 

Related Links : RaviRaj Technologies  Biometricsinfo Fingerprintidproducts RFID-products Biometricsdata

all content in this site has been taken from IBGweb, Find Biometrics and other resources, the copyrights are owned by the respective owners.

Important search terms: biometric, biometrics, fingerprint, fingerprints, time attendance, access control, security, india, usa biometrics time attendance, biometrics access control, fingerprint time attendance, fingerprint access control, biometric time attendance, biometric access control, fingerprints time attendance, fingerprints access control, biometrics fingeprint time attendance, biometrics fingerprint access control, biometrics fingerprints time attendance, biometrics fingerprints access control, security systems, biometrics products, biometrics india, biometric india, fingerprints india, fingerprint india, time attendance india, access control india Biometrics resources, Biometric, biometrics products, biometrics technology, biometrics faq, biometrics research, biometrics white papers, biometrics books, biometrics tutorials, biometrics patents, biometrics organizations, fingerprint, Face, Iris, voice, hand geometry, signature verification, card scanning and recognition, biometrics time attendance access contorl security, identification, 1:N, 1:1, verification, ridge pattern minutiae points, minutia, ridges and valleys India: biometrics delhi, biometric delhi, fingerprints delhi, fingerprint delhi, time attendance delhi, access control delhi biometrics mumbai, biometric mumbai, fingerprints mumbai, fingerprint mumbai, time attendance mumbai, access control mumbai biometrics bangalore, biometric bangalore, fingerprints bangalore, fingerprint bangalore, time attendance bangalore, access control bangalore biometrics hyderabad, biometric hyderabad, fingerprints hyderabad, fingerprint hyderabad, time attendance hyderabad, access control hyderabad biometrics chennai, biometric chennai, fingerprints chennai, fingerprint chennai, time attendance chennai, access control chennai biometrics pune, biometric pune, fingerprints pune, fingerprint pune, time attendance pune, access control pune security india, American states: Alabama, Alaska, Arizona, Arkansas,California, Colorado, connecticut, Delaware, Florida, Georgia, Hawaii, Idaho State, llinois, Indiana,Iowa,Kansas,Kentucky,Louisiana,Maine,Maryland,Massachusetts,Michigan,Minnesota,Mississippi,Missouri,Montana, Nebraska, Nevada,New Hampshire,New Jersey,New Mexico,New York,North Carolina, North Dakota,Ohio,Oklahoma,Oregon,Pennsylvania, Rhode Island,South Carolina,South Dakota,Tennessee,Texas,Utah,Vermont,Virginia,Washington,West Virginia,Wisconsin,Wyoming Capital American popular cities: Albuquerque Atlanta Austin Baltimore Boise Boston Brooklyn Charlotte Chicago Cincinnati Cleveland Colorado Springs Columbus Dallas Denver Des Moines Detroit Houston Indianapolis Jacksonville Kansas City Las Vegas Los Angeles Memphis Miami Milwaukee Minneapolis Nashville New Orleans New York Omaha Orlando Philadelphia Phoenix Pittsburgh Portland Rochester Sacramento Salt Lake City San Antonio San Diego San Francisco San Jose Seattle Spokane Tampa Tucson Biometrics companies: AcSys Biometrics, ActivCard, Acuity Market Intelligence, Advanced Biometrics, Inc., Advanced Learning Institute, Affinitex, AIM, AiT, AND Corporation, Applied Biometric Products, Inc., Astro Datensystme AG, Atmel, Attrasoft, Audata Ltd, Aurora Biometrics, Aurora Computer Systems, AuthenTec, Avalanche Technologies, Aware, Inc., Axis Software Pvt. Inc., Bell ID, BERGDATA, Bio1, Biocentric Solutions, BioconX, Biodata, BioEnable Technologies Pvt. Ltd., BioID, BIO-key International, Biolink, Biometric Access Corporation, Biometric Domain, Biometric Group, Biometric Technology, Inc., Biometric Verification Inc., Biometrica Systems, Inc., Biometrics Canada Inc., Biometrics.co.za, Biometrika, Biometrix Int., BioNetrix, BioPassword, BioPassword Security Services, Inc, BioPay, Bioscrypt Inc., Bio-Sec Corporation, BioThentica Corporation, Buisness Systems Engineering, Inc., Buytel, Cambridge Neurodynamics, Cansec Systems Ltd., Cogent Systems, Cognitec AG, Communication Intelligence Corp., Comnetix Computer Systems, Configate, Cross Match Technologies, Inc., Cyber Sign, Daon, Databac, DataStrip, Inc., DELSY Electronic Components AG, Dermalog, Digital Biometrics, Digital Descriptor Sys., DigitalPersona, Domain Dynamics Ltd., Don Allan Associates, Ecomaus, eCryp, Inc., Endorse Systems Ltd., ErgoSys Ltd., Ethentica, eTrue, Evive Corporation, Exact ID, Ex-Cle S.A., EyeNetWatch.com, EyeTicket, Face Technologies, FindBiometrics, Fingerprint Cards, Fingerprint Society, Fingerprint Technologies, Fingersec, Foster and Freeman, Founder Fingerprint, Geometrix, Inc., Green Bit, Guardware Systems, Hectrix Limites, Heimann Biometric Systems GmbH, Hunno, Hyundai Information Technology, I/O Software, Inc., IBMC, Inc., Id Arts, ID Technologies, Id Teck, Ideamation, Inc., Idencom, IdentAlink Ltd., IDentification Systems, Identix, Inc., IDynta Systems, Image-metrics, Imagis, Indivos, Infineon Tech., Inroad, Intelnete Inc., Intuate Biometrics, Iridian Technologies, Isotech Inc., ITT Industries, Jasper Consulting, Inc, Keyware, Kingshad International, Konetix, Inc./TimeCentre, Labcal Technologies, LCI SmartPen, LEX Solutions, Inc, Mason Vactron Ltd, Mentalix, Inc., MESA, NEC Technologies, Inc., Net Security.Guide, Neurotechnologija, Ltd., Nexterm, Nexus, Northstar Recruiting, Inc., Novell, Nuance, NXS Security Group, Inc., Omron, Optel sp. z o.o., Opticom Technologies, Ltd., Ottawa Telephony Group Inc., PASS21, PenOp, Polaroid Id, Precise Biometrics, Print Electronics Equipments Pvt. Lt., Printrak, a Motorola Company, PrintScan International, Prism Consulting, Proglobo Biometric Technologies, Protocom Development Systems, Quintet, Inc., Recognition Systems, Inc., Ringdale Inc., SAFLINK, Sagem, SD Industries GmbH, SecuGen, SecuIT, SecureTech Solutions, Inc., Security Biometrics Inc., Sense Technologies, Sensormatic, SentryCom, Siemens AG, Skytale Data Security Solutions, Smart Biometrics, Startek Engineering Inc., STMicroelectronics, Suprema Inc., Symtron Technology, SyntheSys Secure Technologies, Inc., TMS, Incorporated, T-Netix, Touchless Sensor Technology AG, Triton Corp, True Touch Technologies, TRW, Inc., TSSI, Ultra-Scan Corp, Union Comm, Unisys Corp., Valyd Inc., Veincheck, Ventura Identification System, Veramark, Veridicom, VeriFone, Inc., VeriTouch Ltd., biometrics united states of america uk usa, biometrics italy germany france spain VeriVoice, Viisage Technology, Inc., Visiomed, Visionics, VisionSphere Technologies Inc., Vocent, Voice Security Systems, VoiceVantage LLC, WonderNet Ltd., Yuean Biometrics, Zefyr, Zn Vision Technologies AG, Jaypeetex, zeos infotech, future biometrics, print electronics, golwala group, vibgyor sales, pace, eviska systems, technocraft, tata honeywell, siemens india, sisl india, zicom security, tyco electronics, idteck, ts biometrics, tsbio, divya lectronics, biofirst, gissi Indian cities: Kottayam Ahmedabad Lucknow Aurangabad Ludhiana Bangalore Madurai Bhopal Manali Bhubaneshwar Mathura Kolkata Mount Abu Chandigarh Mumbai Chennai Nagpur Coimbatore Nainital Cuttack Noida Dalhousie Ooty Delhi Orchha Ernakulam Panaji Faridabad Patna Gandhinagar Port Blair Ghaziabad Pune Gurgaon Puri Guwahati Pushkar Gwalior Rajkot Haridwar Rameswaram Hyderabad Sanchi Imphal Shillong Indore Surat Jaipur Tiruchchirappalli Jalandhar Tirumala Kanyakumari Thanjavur Khandala Udaipur Kochi Vadodra odaikkanal Varanasi Khajuraho Vijayawada Rishikesh Kota Jaisalmer Jamshedpur Ranchi Thiruvananthapuram Amritsar Kanpur Bhavnagar Junagadh Diu Island Map Calangute Vasco da Gama Margoa Dehradun Porbandar Bharatpur Countries: Afghanistan Albania Algeria Andorra Angola Antigua and Barbuda Argentina Armenia Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bhutan Bolivia Bosnia and Herzegovina Botswana Brazil Brunei Darussalam Bulgaria Burkina Faso Burma (Myanmar) Burundi Cambodia Cameroon Canada Cape Verde Central African Republic Chad Chile China Colombia Comoros Congo Congo, Democratic Republic of the Costa Rica Côte d'Ivoire Croatia Cuba Cyprus Czech Republic D Denmark Djibouti Dominica Dominican Republic East Timor Ecuador Egypt El Salvador England (U.K.) Equatorial Guinea Eritrea Estonia EthiopiaFiji Finland France Gabon Gambia Georgia Germany Ghana Great Britain (U.K.) Greece Grenada Guatemala Guinea Guinea-Bissau Guyana Haiti Honduras Hungary Iceland India Indonesia Iran Iraq Ireland Israel Italy Jamaica Japan Jordan Kazakhstan Kenya Kiribati Korea, North Korea, South Kuwait Kyrgyzstan Laos Latvia Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Macedonia Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Mauritania Mauritius Mexico Micronesia Moldova Monaco Mongolia Morocco Mozambique MyanmarNamibia Nauru Nepal The Netherlands New Zealand Nicaragua Niger Nigeria Northern Ireland (U.K.) Norway Oman Pakistan Palau Palestinian State* Panama Papua New Guinea Paraguay Peru The Philippines Poland Portugal Qatar Romania Russia Rwanda St. Kitts and Nevis St. Lucia St. Vincent and The Grenadines Samoa San Marino São Tomé and Príncipe Saudi Arabia Scotland (U.K.) Senegal Serbia and Montenegro Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa Spain Sri Lanka Sudan Suriname Swaziland Sweden Switzerland Syria Taiwan Tajikistan Tanzania Thailand Togo Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United States Uruguay Uzbekistan Vanuatu Vatican City (Holy See) Venezuela Vietnam Wales (U.K.) Western Sahara Yemen Yugoslavia Zaire Zambia Zimbabwe biometrics: biometric, thumb punching, Fingerpunch, thumb impression, fingerprint control system, biometric control system face recognition, fingerprint recognition, finger scan, face scan, iris scan, iris recognition, voice recognition, signature biometrics, keystroke dynamics, dns fingerprinting, fingerprinting, afis, hand geometry, ridge pattern minutiae points, minutia, ridges and valleys, 1:N mathcing, identification ,verification, 1:1 matching biometrics software development, biometrics system integration, biometrics hardware development, biometrics embedded solutions, biometrics standalone PC based system development, biometrics outsourcing, biometrics offshore development india Other spelling mistakes: time attendance, time attendance, time attendence, attendiance, attindence access control, acess control, acces control, excess control, cntrl, contrl, security, surity, biometrics idnia, fingerprint idnia, indya, indian, indians Other technologies: card punching, barcode time attendance, smart cards time attendance, proximity cards, swipe cards, magnetic stripe, magstripe, optical card, multimedia card Time attendance: payroll, time office, HRMS india, hrd, proximity, cards, card system, id card, smart cards india, barcode india, proxy punching, time recorder, time recorders, time clock, time punching, time punch, time n track, timentrack, time track, time attendace track, time attendance software, time office reports, shift management, leave management, company holidays management, contract labour solutions Access control: safe and security, access control, door controller, dcu, fingerprint access, intruder alarm, fingerprint security, computer server room, advanced integrated door strike, magnetic, electromagnetic lock, home security, fingerprint door lock, fingerprint based lock EM lock, electric strike, electromagnetic strike, electromagnetic door lock, biometrics door lock, fullproof security door strike, deadbolt lock, door control system, door control panel, rs485, rs232, rj45, ethernet, tcp/ip, web based security system OEM fingerprint reader, network security, network, LAN, WAN, PKI encryption, PKI, software integration with fingerprint, fingerprint controlled software, software development kit, SDK, Airport Security, access control using fingerprints, encryption, VAR, Defence Security, Surveillance, Vehicle Monitoring, RFID, India fingerprint, India biometrics, India biometric, India Time office manager, descop, eyeDhamster, eyeDmouse, hamster electromagnetic lock, cmc, facts india, fingerprint criminal investigation, banking, banks, minutia, fingerscan v20, veriprint, sensar, iridian, iris scan, face recognition, eye recognition, police, security, cryptography, attendance software, time machine, hightech security, complete security, hand punch, handpunch, finger, finger print, finger access, bioscan, fingerprint scanner, biomouse, bioenterprise, biobanking, bioscanner, biotech, news, biometrics news, new products, security products, internet security, veridicom, biometric solutions, tata honeywell, zicom security, divya security, criminal investigation, web security, smart cards , smart card terminal, weigand, wiegand, access controller, it security, secure, hand geometry, fingerprint chip, infineon, timetech, alert access, hid, awid, prox, proximity cards, tracking, facial recognition, voice recognition, precise biometrics, biometrics research, china biometrics, import export biometrics, fingerprint terminal manufacturer, bioenable frt, bioterminal, fingerprint recognition terminal, windows security, PC security, multiple biometrics, avanti biometrics, msu, biometric digest, biometric news articles seminar show trade shows publications journal, advanced biometrics, Biometrics Exhibition and Conference, organizations, fingercards, ankari, digital persona, bioapi, bsp, biometrics standards, fingerprint pc authentication logon login boot security protection, new technology, human authentication, atm transactions, banking financial transaction security, network security, image processing, pattern matching, ibia, biometrics group, biometrics jobs employment requirements hrd human resources help events money dealership distributors dealers franchise, technosoft, sagem morpho, digital biometrics, visionics, veritouch, siemens security, free biometrics, free fingerprint software algorithms, free fingerprint sdk Fingerprint readers