skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 74145 Find in a Library
Title: Positive Personal Identification
Journal: Datamation  Dated:(November 1978)  Pages:179-180,183-184,186
Author(s): D J Sykes
Date Published: 1978
Page Count: 5
Format: Article
Language: English
Country: United States of America
Annotation: This paper discusses positive personal identification techniques utilizing remote terminals such techniques are based on unique personal characteristics such as fingerprints, hand geometry, voiceprints, and signatures.
Abstract: Such techniques could be helpful in controlling access to unguarded areas and to time-shared computer systems as well as in verifying credit card or check transactions. Badges, keys, identification cards, and passwords can be transferred to unauthorized users or stolen; however, fingerprints, hand geometry, voice prints, and signatures may eventually be used in relatively inexpensive identification systems which are acceptable to the persons involved. A fingerprint identification process is based on the relative positions of ridge endings and joins, called 'minutiae.' An automatic system compares the minutiae of the person being identified with reference data for that person. The finger is placed on a suprous mercuric iodide sheet which reacts to the thermal conductivity of the ridges. An optical scanner registers variations in the reflectivity of the sheet. Hand geometry is based on the fact that the combinations of individual finger lengths vary from one person to another. The hand is placed on top of four arrays of photocells, and a high intensity light shines down onto the hand. The individual photocell outputs are digitized, and the resulting bit patterns are concatenated to produce a 20-byte identifier. Voice identification depends on the quantification of the sounds of a particular person when speaking certain words and on a comparison to reference data. A matrix which relates amplitude, frequency, and the time for each word spoken represents the speaker's voice. Automatic signature verification measures pen acceleration at the time the signature is written. A two-dimensional acceleration transducer is utilized, and data are also recorded on the time the pen is on and off the paper. Photographs, a diagram, and equipment sources are included.
Index Term(s): Business security; Computer aided operations; Computer privacy and security; Facility security; Personnel identification systems
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.