50%(2)1 out of 2 people found this document helpful
This preview shows page 1 - 2 out of 3 pages.
Bailey 1Teddy BaileyMs. PedroEnglish 101October 15, 2014Access GrantedBiometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, that is compared with a digital code stored in the computer. If the digital code in the computer matches the personal characteristics code, the computer grants access. Examples of biometric devices include fingerprint radars and face recognition systems.A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer. [Ros14]. External fingerprint readers usually plug into a USB port. To save on desk space, some laptops include built-in fingerprint readers.A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to