Late 1 9th century an Argentine police official was the first person to keep fingerprint files. He classified fingerprints according to a system established by Sir Francis Gallon, an anthropologist related to Charles Darwin. Gallon later published a book, Fingerprints, that contained a classification system. His discovery that no two individuals share the same fingerprint, and his classification of the details of an individual’s fingerprint are largely used today. By the sass, fingerprint identification was used by law enforcement, the U. S. Military and the FBI as a form of identification (Amy Azalea). In 1 902 USA used its first synthetic fingerprint system (fingerprint identification). Http://www. FBI. Gob/about-us/Isis/fingerprints_biometrics/ fingerprint-overview B. Concluding Statements: Biometrics have been used early before the 20th century even without the use of technology today. Body Paragraph 2 A. Main Idea: The original use of Biometric Technology was for prisoners, police took a sample of their fingerprints to have their identity but their are plenty of other ways to have identification such as iris scans, facial scans, and others. 1 .
The New York state prison system began to use fingerprints for the identification of criminals in 1903 (Fingerprint Identification). 2. Hand Geometry measures users hands and fingers using a three dimensional perspective. (“Biometrics). 3. Iris scans is used with a camera and scans your eyes for a complete match (“Biometrics”). B. Conclusion: With the use of our technology biometric technicians are able to create new and different identification systems. Body Paragraph 3 A. Main Idea: Biometric technology is used for a variety of uses, but specifically for identification and verification. Biometric identification systems can help identify criminal and terrorism suspects. It can help easily to find criminals or suspects (Terrorism). 2. Verification system can reduce the risk of system security being compromised but also eliminates the traditional security (.NET. CSS). 3. With the use of authentication Systems it helps with having access and keeping personal or high secret work safe (.NET. CSS). B. Conclusion: Biometric Technology can help with keeping work and others safe with the use of the identification and verification systems.
Body Paragraph 4 A. Main Idea: Biometric technology are automated methods for identifying a person or verifying their their identity based on their physical characteristics. 1 . Both public and private sectors are looking for reliable and accurate ways to identify people using biometric technologies (Biometric Technology). 2. Authentication using biometrics can reduce identity theft and the need to remember passwords (Biometric Technology). 3. Identification cards are used by employees to access buildings and important information (Biometric Technology). B.
Conclusion: Biometric technology is being used with many genuineness and buildings and people don’t even know. Biometric technology is the best way to keep things safe. Body Paragraph 5 A. Main Idea: There are many positive things with Biometric technology. 1 . Using the Biometric systems you don’t have to remember passwords or anything else (Biometrics). 2. Provides an accurate access with fingerprints, retinal and iris scans (Technology). 3. With the automated identification systems it’s super fast and has minimal training to use (Technology). 4. Identity can be verified with documents that are lost, stolen, or altered (Technology).
B. Conclusion: With these positive advantages biometric technology is a easy and accurate way to identify someone’s true identity. Body Paragraph 6 A. Main Idea: Nothings perfect, there’s always a negative perk to something. With Biometric Technology their can be identity theft with fingerprints, signatures, and others. 1. With voice authentication background noise can alter the test and make it invalid (.NET. CSS). 2. Biometric identification is not one hundred percent foolproof, one person that is a terrorist is false positive by a biometric identification can now board the plane (Terrorism). Biometric devices violate privacy by taking thumb prints and scans to identify others (Terrorism). B. Conclusion: With the negative side to biometric technology scans can have a false positive. Meaning that it was a positive scan but it was a wrong identification of the person. Body Paragraph 7 A. How does biometric technology work? It’s not just a machine, it’s plenty more than that. 1 . Fingerprints are scanned, enhanced and then converted into templates ( Biometric Technologies). 2. Hand geometry is the width, height, and length of finger, distances between joints and the shape of the knuckles (Biometric Technologies). . Facial Recognition is mainly focuses on the structures of the face such as the upper outlines of eye sockets or the sides of the mouth (Biometric Technologies). B. Conclusion: Just because Biometric Technology uses machines doesn’t mean there is no work. Each little detail of the scans have ever little detail of the human fingerprints and facial structure. Body Paragraph 8 A. Main Idea: Biometrics is used for work and personal privacy. 1. Biometric hang geometry is used at McDonald’s and Crispy Creams for time management (Biometric Technologies).