[{"@context":"https:\/\/schema.org\/","@type":"Article","@id":"https:\/\/www.olkam.cz\/biometrie-nove-metody-zabezpeceni-objektu\/#Article","mainEntityOfPage":"https:\/\/www.olkam.cz\/biometrie-nove-metody-zabezpeceni-objektu\/","headline":"Biometrie \u2013 nov\u00e9 metody zabezpe\u010den\u00ed objekt\u016f","name":"Biometrie \u2013 nov\u00e9 metody zabezpe\u010den\u00ed objekt\u016f","description":"Biometrie, resp. biometrika je pom\u011brn\u011b nov\u00fd v\u011bdeck\u00fd obor vych\u00e1zej\u00edc\u00ed ze zaveden\u00fdch forenzn\u00edch metod, jeho\u017e prost\u0159ednictv\u00edm je d\u00edky virtualizaci mo\u017en\u00e9 vytv\u00e1\u0159et specifick\u00e1 \u0159e\u0161en\u00ed zabezpe\u010dovac\u00edch syst\u00e9m\u016f zalo\u017een\u00fdch na identifikaci a ov\u011b\u0159en\u00ed nezam\u011bniteln\u00fdch &hellip; ","datePublished":"2020-03-04","dateModified":"2023-06-09","author":{"@type":"Person","@id":"https:\/\/www.olkam.cz\/author\/#Person","name":"","url":"https:\/\/www.olkam.cz\/author\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/93869824c8aa580f0d16049ad31e69846ffc925e0cbb2826cc9554f53943da69?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93869824c8aa580f0d16049ad31e69846ffc925e0cbb2826cc9554f53943da69?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"olkam.cz","logo":{"@type":"ImageObject","@id":"\/logo.png","url":"\/logo.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.olkam.cz\/wp-content\/uploads\/img_a372016_w4231_t1583327511.jpg","url":"https:\/\/www.olkam.cz\/wp-content\/uploads\/img_a372016_w4231_t1583327511.jpg","height":0,"width":0},"url":"https:\/\/www.olkam.cz\/biometrie-nove-metody-zabezpeceni-objektu\/","about":["V\u011bda"],"wordCount":479,"articleBody":"Biometrie, resp. biometrika je pom\u011brn\u011b nov\u00fd v\u011bdeck\u00fd obor vych\u00e1zej\u00edc\u00ed ze zaveden\u00fdch forenzn\u00edch metod, jeho\u017e prost\u0159ednictv\u00edm je d\u00edky virtualizaci mo\u017en\u00e9 vytv\u00e1\u0159et specifick\u00e1 \u0159e\u0161en\u00ed zabezpe\u010dovac\u00edch syst\u00e9m\u016f zalo\u017een\u00fdch na identifikaci a ov\u011b\u0159en\u00ed nezam\u011bniteln\u00fdch rys\u016f \u010d\u00e1st\u00ed lidsk\u00e9ho t\u011bla. Sou\u010dasn\u00e9 metody vyu\u017e\u00edvan\u00e9 v t\u00e9to oblasti jsou zalo\u017een\u00e9 na srovn\u00e1vac\u00ed technice, kter\u00e1 prost\u0159ednictv\u00edm datab\u00e1z\u00ed a stanoven\u00fdch podm\u00ednek p\u0159i\u0159ad\u00ed jedine\u010dn\u00e9 prvky dan\u00fdch rys\u016f konkr\u00e9tn\u00edmu \u010dlov\u011bku.&#13; Biometrick\u00e9 zabezpe\u010dovac\u00ed syst\u00e9my jsou standardem v budov\u00e1ch p\u0159echov\u00e1vaj\u00edc\u00edch nebo pracuj\u00edc\u00edch s vysoce citliv\u00fdmi daty. Vzhledem k mo\u017enosti integrace biometrick\u00fdch softwarov\u00fdch \u0159e\u0161en\u00ed se v\u0161ak st\u00e1le v\u00edce uva\u017euje o mo\u017enostech jejich zaveden\u00ed do b\u011b\u017en\u00fdch korpor\u00e1tn\u00edch syst\u00e9m\u016f, kter\u00e9 by v mnoh\u00e9m usnadnily identifikaci zam\u011bstnanc\u016f a rozvinuly zp\u016fsoby jejich monitorov\u00e1n\u00ed, je\u017e jsou krom\u011b sb\u011bru dat t\u00fdkaj\u00edc\u00edch se doch\u00e1zky d\u016fle\u017eit\u00e9 p\u0159edev\u0161\u00edm v souvislosti s po\u017e\u00e1rn\u00ed bezpe\u010dnost\u00ed a prevenc\u00ed pracovn\u00edch \u00faraz\u016f. Z\u00e1rove\u0148 se uplat\u0148uj\u00ed na pracovi\u0161t\u00edch s variabiln\u00edm omezen\u00edm vstupu \u010di p\u0159\u00edstupu k osobn\u00edm po\u010d\u00edta\u010d\u016fm.&#13; Ve v\u011bt\u0161\u00edch ale i men\u0161\u00edch podnic\u00edch jsou pro tyto \u00fa\u010dely je\u0161t\u011b st\u00e1le vyu\u017e\u00edv\u00e1ny syst\u00e9my na b\u00e1zi identifikace generovan\u00fdm \u010d\u00edslem zam\u011bstnance \u2013 piny, hesla, \u010dipy nebo identifika\u010dn\u00ed karty. D\u00edky pokro\u010dil\u00fdm \u0159e\u0161en\u00edm by se ov\u0161em uveden\u00e9 (a velmi snadno zciziteln\u00e9) n\u00e1stroje mohly zcela vytratit a b\u00fdt nahrazeny biometrikou jako velmi p\u0159esn\u00fdm prost\u0159edkem.&#13; Ov\u011b\u0159en\u00e9 a zaveden\u00e9 syst\u00e9my pracuj\u00ed nej\u010dast\u011bji s otisky prst\u016f nebo duhovkou oka, kter\u00e9 jsou skenov\u00e1ny speci\u00e1ln\u00edm za\u0159\u00edzen\u00edm nastaven\u00fdm tak, aby byla nasn\u00edman\u00e1 data p\u0159evedena do informace pro srovn\u00e1vac\u00ed software. Bezpe\u010dn\u011bj\u0161\u00ed syst\u00e9my vyu\u017e\u00edvaj\u00ed v\u011bt\u0161\u00edch ploch t\u011bla, na nich\u017e se nach\u00e1z\u00ed v\u00edce identifika\u010dn\u00edch prvk\u016f, jako jsou cel\u00e9 dlan\u011b nebo obli\u010dej.&#13; Nejnov\u011bj\u0161\u00ed biometrika se zam\u011b\u0159uje na skenov\u00e1n\u00ed krevn\u00edho \u0159e\u010di\u0161t\u011b. Jedn\u00e1 se o propracovan\u011bj\u0161\u00ed metodiku, jen\u017e sn\u00edm\u00e1 otisk c\u00e9vn\u00edho syst\u00e9mu ze h\u0159betu nebo dlan\u011b, p\u0159\u00edpadn\u011b z prstu. C\u00e9vn\u00ed syst\u00e9m je u ka\u017ed\u00e9ho jedince tvo\u0159en r\u016fzn\u011b tenk\u00fdmi \u017e\u00edlami a \u017eilkami. Oskenovan\u00e1 \u010d\u00e1st t\u011bla je zpracov\u00e1na do dvourozm\u011brn\u00e9 \u010dernob\u00edl\u00e9 s\u00edt\u011b (v r\u016fzn\u00fdch odst\u00ednech \u0161edi), kter\u00e1 je d\u00e1le srovn\u00e1v\u00e1na s datab\u00e1zovan\u00fdmi vzory. Aktu\u00e1ln\u011b se jedn\u00e1 z\u0159ejm\u011b o nejp\u0159esn\u011bj\u0161\u00ed biometrick\u00fd syst\u00e9m zabezpe\u010den\u00ed.&#13; &#13;                                                                                                                                                                                                                                                                                                                                                                                         4.1\/5 - (11 votes)        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometrie \u2013 nov\u00e9 metody zabezpe\u010den\u00ed objekt\u016f","item":"https:\/\/www.olkam.cz\/biometrie-nove-metody-zabezpeceni-objektu\/#breadcrumbitem"}]}]