Recognition & Authentication; Last updated on       , a full moon day;

Also see: Network Design Principles; NEC; Recognition sounds easy, but it takes 30 years of strategic engineering development by planning;

e-PID Recognition Iris Recognition mobilePID Recognition PID Recognition PMD Recognition Remote Biometric Recognition Voice Recognition

 

...
No finger print capture needed A human being must be older than 6 months GSM telephony mobile network needed Finger print capture needed ... Any being ... ...
ATM machine's location needed to scan Scan once; No need to re-scan the human being; Mobile network needed to scan; Evolution of mobile devices and technology may cause to re-scan; Finger needed to scan; And, finger print pattern may vary by time;   Any location    
(Cryptology + digital signature + e-PID) to authenticate Image captured OR biometric coded GSM handheld needed to authenticate After capture, storage needed   No 3rd party device needed    
Biometric authentication Pattern matching Biometric authentication Pattern matching by retrieving captured storage to authenticate   No pattern matching needed    
    PIN is needed for verification 1 to 1; 1 to N verification   No 3rd party verification needed    
      API        
      GUI        
Commonly use in e-commerce Commercial Commercial Commercial   Till 2004, not commercial yet    
Touch-pass log-on finger image authentication not needed Touch-pass log-on finger image authentication not needed Touch-pass log-on finger image authentication not needed Touch-pass log-on finger image authentication not needed   No log-on touch-pass pad needed    

(Samsung (Authentication (EEPROM embedded smart card IC) (USIM) (UIM) (PKI) (Crypto-processor) (...) ))

In 2005, Fujitsu introduces Palm Vein Authentication System [better than finger vein]; Felica/Java Dual interface smart card for contact-less palm vein authentication [Dai Nippon Printing + Fujitsu + Sony];

 

Up