{"id":1953,"date":"2021-07-29T10:18:24","date_gmt":"2021-07-29T10:18:24","guid":{"rendered":"https:\/\/www.wickersley.net\/?page_id=1953"},"modified":"2023-09-27T12:04:15","modified_gmt":"2023-09-27T12:04:15","slug":"biometrics","status":"publish","type":"page","link":"https:\/\/www.wickersley.net\/parents\/biometrics\/","title":{"rendered":"Biometrics"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\n<\/svg>\t\t<\/div>\n\t\t\t\t
\n\t\t\t\n\t\n<\/svg>\t\t<\/div>\n\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Biometrics<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

What are Biometrics?<\/h4>

Biometrics authentication is the automatic recognition of a living being using suitable body characteristics. By measuring an individual\u2019s physical features in an authentication inquiry and comparing this data with stored biometric reference data, the identity of a specific user is determined. There are many different biometric features that can be used for authentication purposes these include finger image, signature, iris, retina, DNA or any other unique characteristic. Once a characteristic has been chosen the next stage in the Biometric process is authentication. A biometric feature is saved on to a database. Once the data has been stored, a new scanning of the biometric feature is taken. If the comparison is positive, access to the appropriate application is granted.<\/p>

Biometrics and Security<\/h4>

Students, parents and staff can rest assured that the fingerprint images cannot be used by any other source for identification purposes. The system uses an image of the finger to create a mathematical algorithm and then discards the finger image; only the numbers remain and these cannot be reinterpreted back into a finger image.<\/p>

FAQ<\/h4>

Why do you need to take my child\u2019s finger image?<\/strong>
By taking an image of your child\u2019s finger we can turn this information into a digital signature.<\/p>

Can finger images be used by any other agency?<\/strong>
No, the software we use turns your child\u2019s finger image in to a mathematical algorithm. The image of the finger is then discarded. The information that is stored cannot be used to recreate an image of the child\u2019s finger.<\/p>

What happens when my child leaves the School?<\/strong>
When a student leaves school all data can be deleted very easily.<\/p>

How does it work?<\/strong>
When the child places his\/her finger on the scanner, the software matches their finger image with the unique digital signature held in the database.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\tBiometrics Information & Opt-In Form <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\tInformation for Schools using Biometrics<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\tBiometrics Data Policy<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"

Biometrics What are Biometrics? Biometrics authentication is the automatic recognition of a living being using suitable body characteristics. By measuring an individual\u2019s physical features in an authentication inquiry and comparing this data with stored biometric reference data, the identity of a specific user is determined. There are many different biometric features that can be used […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1529,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.wickersley.net\/wp-json\/wp\/v2\/pages\/1953"}],"collection":[{"href":"https:\/\/www.wickersley.net\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.wickersley.net\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.wickersley.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wickersley.net\/wp-json\/wp\/v2\/comments?post=1953"}],"version-history":[{"count":7,"href":"https:\/\/www.wickersley.net\/wp-json\/wp\/v2\/pages\/1953\/revisions"}],"predecessor-version":[{"id":9802,"href":"https:\/\/www.wickersley.net\/wp-json\/wp\/v2\/pages\/1953\/revisions\/9802"}],"up":[{"embeddable":true,"href":"https:\/\/www.wickersley.net\/wp-json\/wp\/v2\/pages\/1529"}],"wp:attachment":[{"href":"https:\/\/www.wickersley.net\/wp-json\/wp\/v2\/media?parent=1953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}