subject: Knowing How to Operate Biometric Security System [print this page] Biometric systems consist of hardware and software. Hardware captures important characteristics of human and software interprets the results from reading the data. The software also determines whether the data is acceptable or not.
The most critical stage in building an effective biometric system is the data collection of the users. During data collection, each user starts from the administrators who control the system, and provides the examples of specific biometric system characteristics by interacting with the scanning hardware.
For example, you touch a finger to a fingerprint reader or you stand in front of a camera, so that the tools can capture the characteristics of the face or eyes. The system then purifies the precise characteristics of the reading and stores the data as a template. Then, you interact with biometric devices anymore, and system checks the relevant data into the template. If the software is fail to find the similarity, so more testing is needed. Next, when the procedure is complete, the system will operate.
In the future, when accessing the system, you will be tested by the equipment used, as you are required to explain the user name correctly. Then, the hardware channels the data into software, which checks the user templates. If there is a match, you will be allowed to access. If not, a message will report that the system can not recognize the user.
For example: if you try to log on to Windows NT or 1998 machine, the system will open only if you have written the user name and password at the login prompt correctly.