Download presentation
Presentation is loading. Please wait.
Published byAmos Price Modified over 9 years ago
1
Juan Ortega 12/15/09 NTS490
2
Justification/purpose to deploy biometrics: The university decided to come to the 21’st century and upgrade the already implemented biometrics. Newer biometrics devices have a higher accuracy rate. Access-control system Potential for newer biometric devices. The new biometric devices will be used for in various facilities around the campus such as: Resident Halls Athletic facilities Limit dining-hall access
3
Fingerprint Recognition The best biometric device to implement for this specific scenario would be fingerprint recognition. Cheap Fast Small sized Low power Fairly accurate Easy-to-use Number of ridges and valleys on the surface of the finger. Ridges are the upper skin layer segments of the finger and valleys are the lower segments. The ridges form so-called minutia points ridge endings. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. Fingerprint biometrics. Retrieved December 15, 2009 from biometricnewsportal Web site: http://www.biometricnewsportal.com/fingerprint_biometrics.asphttp://www.biometricnewsportal.com/fingerprint_biometrics.asp
4
Because the previous biometric implementation happened in 1972, much of the installation, configuration, and operational processes will need to be modified for this new technology. The previous biometric deployment policy would also need to change, but the main principles will remain, some of them are: Public acceptability Practicality of capture Practicality of deployment ROI Biometrics Deployment of Machine Readable Travel Documents. Retrieved December 15, 2009 from aclu Web site: http://www.aclu.org/files/passports/TechnicalReport.pdfhttp://www.aclu.org/files/passports/TechnicalReport.pdf
5
1) Location of the centralized access-control system. 2)Total cost and the ROI must be calculated. 3) Compatibility with the current infrastructure. 4) Regulatory 5) Operational 6) Training and user acceptance.
6
1)Remove old biometric devices 2) Identify the locations where a biometric device is needed. 3) Depending on the device, some need to be screwed as a door handle, while others are just for identification. 4) If the devices are wireless, a wireless access point needs to be establish prior to the implementation. 5)Software for identification and verification needs to be installed. 6)Verification process begins to ensure all equipment and software is installed properly.
7
Installation Plan Make sure everything's installed. Everything’s tested Training Plan Initial user training for the biometric. Communication Plan Clear, timely and consistent communication. Schedule Maintenance Other deployment documents Risk Assessment Deployment Design
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.