The ability to implement fingerprint ID systems in mobile
devices hinges on the confluence of two technology developments: the recent
commercial availability of very small, low power, high quality fingerprint sensors and the
introduction of a new generation of fast, powerful DSPs into mobile devices.
In this section
we review the engineering elements of designing fingerprint systems into the next generation mobile devices.
We briefly characterize the unique aspects of mobile fingerprint systems, develop the concept of operations for
mobile fingerprint systems,
and then examine the critical performance metrics used to control the system
design and ensure its adequacy. The fingerprint system is then decomposed into its basic
elements. Each of these is described along with some possible design approaches
and implementation alternatives. Lastly, we describe a prototype system
architecture based on the Texas Instruments' OMAP architecture, and discuss the
design and implementation of a demonstration system constructed using this
architecture.
In this chapter we have presented two of the most promising
techniques for user authentication within mobile handsets. Both speech and fingerprint techniques now exist and can be
implemented using compute power that is presently available on modern DSPs.
This chapter discussed the technical challenges faced by each method, and the
engineering trade-off decisions that must be made in order to obtain the
desired level of performance. The use of such technology is now dependent on
our ability to integrate it into the handset in a user friendly and efficient
manner
Reliable user identification capabilities
working together with secure communications capabilities can allow the mobile
wireless device to become a highly capable and secure personal controller for
the electronic systems that serve us. Whole new classes of applications
programs on the mobile device platform can now perform secure remote control of
everything from our investment portfolios to the locks on our homes and cars.
No comments:
Post a Comment