Abstract
In this chapter we shall focus upon the definition of a system and consider how identity verification has developed from simple physical access control systems to more sophisticated bespoke systems and, finally, identity verification as a service. Biometric identity verification has mirrored this general trend. An important part of this transition is echoed in networks which have developed from closed-loop wired networks using traditional protocols such as RS485 and RS422, through more sophisticated computer networks based upon Ethernet or token ring, and finally to the IP-based networks which may span continents. We also discuss applications and the impact, especially, of border control and law enforcement applications in bringing biometric technology to a much broader potential market. The fundamentals of the biometric registration process are explained in the context of systems administration and the additional factors which biometric technology introduces in this respect. We discuss system architectures and infrastructures and introduce the concept of application modelling via the Biometric and Token Technology Application Modelling Language (BANTAM). This chapter takes the concept of automated biometric identity verification and applies it to systems and applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 Springer-Verlag London Limited
About this chapter
Cite this chapter
Ashbourn, J. (2011). Biometric Systems Defined. In: Guide to Biometrics for Large-Scale Systems. Springer, London. https://doi.org/10.1007/978-0-85729-467-8_3
Download citation
DOI: https://doi.org/10.1007/978-0-85729-467-8_3
Published:
Publisher Name: Springer, London
Print ISBN: 978-0-85729-466-1
Online ISBN: 978-0-85729-467-8
eBook Packages: Computer ScienceComputer Science (R0)