Abstract

In this chapter we shall focus upon the definition of a system and consider how identity verification has developed from simple physical access control systems to more sophisticated bespoke systems and, finally, identity verification as a service. Biometric identity verification has mirrored this general trend. An important part of this transition is echoed in networks which have developed from closed-loop wired networks using traditional protocols such as RS485 and RS422, through more sophisticated computer networks based upon Ethernet or token ring, and finally to the IP-based networks which may span continents. We also discuss applications and the impact, especially, of border control and law enforcement applications in bringing biometric technology to a much broader potential market. The fundamentals of the biometric registration process are explained in the context of systems administration and the additional factors which biometric technology introduces in this respect. We discuss system architectures and infrastructures and introduce the concept of application modelling via the Biometric and Token Technology Application Modelling Language (BANTAM). This chapter takes the concept of automated biometric identity verification and applies it to systems and applications.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.