101
 @~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm = n` =<< Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd @~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn HC_@SRM^HSJH N@ EM _@KPSJNMN N@ EM JDBHSGMOJßD

Estudio sobre las tecnologías biométricas aplicadas a la seguridad

  • Upload
    inteco

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 1/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm = n` =<< Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

@~pnjh hcs` em ~`odhehkçm

cjhgê~sjom m|ejomnm m em `kpsjnmn

HC_@SRM^HSJH N@ EM _@KPSJNMN N@ EM JDBHSGMOJßD

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 2/100

 

@~pn jh hcs` em ~` odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn   \íkjdm 3 n` =<< Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

@njojÿd9 Njoj`gcs` 3<==

@e ―@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn‗ am jnh `emchsmnh |hs `e 

jkpj`d~` `}pj|h n` ~smcmih n`e Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd n` JD^@OH9 

\mceh \ês`y _md'Ihê !njs`oojÿd*

@npmsnh Íerms`y Mehdh !ohhsnjdmojÿd*

_pmdm n` em Bp`d~` Shnsçkp`y 

Empsm Kmsoçm \ês`y 

Osj~jdm Kp~jêss`y Chsk` 

Ohss`h `e`o~sÿdjoh n`e Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd9  hc`srm~hsjhLjd~`oh$`  

Em |s``d~` |pcejomojÿd |`s~`d`o` me Jd~j~p~h Dmojhdme n` ^`odhehkçm n` em Ohgpdjomojÿd !JD^@OH* z `~í cmih pdmejo`dojm S`ohdhojgj`d~h'Dh ohg`sojme ?$< @|mým n` Os`m~jr` Ohgghd z |hs `eeh `~í |`sgj~jnh oh|jms nj~sjcpjs zohgpdjoms |ùcejomg`d~` ~m hcsm cmih em ohdnjojhd` jkpj`d~`9

‣ S`ohdhojgj`d~h9 @e ohd~`djnh n` `~` jdbhsg` ` |p`n` s`|shnpojs ~h~me h |msojmeg`d~` |hs ~`so`sh oj~mdnh p|sho`n`dojm z amoj`dnh s`b`s`dojm `q|s`m ~md~h m JD^@OH ohgh m p j~jh {`c9 {{{$jd~`oh$`$ Njoahs`ohdhojgj`d~h dh |hnsí `d djdkùd omh pk`sjs }p` JD^@OH |s`~m m|hzh m njoah ~`so`sh h m|hzm `e ph }p` amo`n` p hcsm$

‣ Ph Dh Ohg`sojme9 @e gm~`sjme hsjkjdme z eh ~smcmih n`sjrmnh |p`n`d `s nj~sjcpjnh oh|jmnh z `qajcjnhgj`d~sm p ph dh ~`dkm bjd` ohg`sojme`$

Me s`p~jejyms h nj~sjcpjs em hcsm ~j`d` }p` n`ims cj`d oemsh eh ~êsgjdh n` em ejo`dojm n` `~m hcsm$ Mekpdm n` `~mohdnjojhd` |p`n` dh m|ejoms` j ` hc~j`d` `e |`sgjh n` JD^@OH ohgh ~j~pems n` eh n`s`oah n` mp~hs$ Dmnm `d `~mejo`dojm g`dhomcm h s`~sjdk` eh n`s`oah ghsme` n` JD^@OH$ a~~|9((os`m~jr`ohgghd$hsk(ejo`d (cz'do(?$<(`(  

@e |s``d~` nhopg`d~h opg|e` ohd em ohdnjojhd` n` moo`jcjejnmn n`e bhsgm~h \NB !\hs~mce` Nhopg`d~ Bhsgm~*$ Mç `~sm~m n` pd nhopg`d~h `~spo~psmnh z `~j}p`~mnh |shrj~h n` me~`sdm~jrm m ~hnh `e`g`d~h dh ~`q~pme gmsomnh n` jnjhgm zhsn`d n` e`o~psm mn`opmnh$

\msm mg|ejms jdbhsgmojÿd hcs` em ohd~spoojÿd n` nhopg`d~h \NB moo`jce` |p`n` ohdpe~ms em kpçm nj|hdjce` `d em`oojÿd Moo`jcjejnmn 4 Bhsgmojÿd 4 Gmdpme` z Kpçm n` em |íkjdm a~~|9(({{{$jd~`oh$` 

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 3/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ? n` =<< Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

ÇDNJO@

JD^SHNPOOJßD Z HCI@^JRH_ 

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$=<

=$=  \s``d~mojÿd  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$=<

=$3  @~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn  $$$$$$$$$$$$$$$$$$=3

3  NJ_@ÝH G@^HNHEßKJOH  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$=0

3$=  Bm` =9 Cù}p`nm z mdíejj nhopg`d~me$  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$=0

3$3  Bm` 39 Ohdpe~m m `q|`s~h  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$=2

3$?  Bm` ?9 @emchsmojÿd n`e jdbhsg` n` ohdoepjhd` bjdme` n`e |shz`o~h  $$$$$$$$$$$$$$$3=

3$>  Bm` >9 @emchsmojÿd n` pdm kpçm |sío~jom njsjkjnm m ppmsjh  $$$$$$$$$$$$$$$$$$$$$$$$$$$$3=

?  JD^SHNPOOJßD M EM_ ^@ODHEHKÇM_ CJHGÊ^SJOM_  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$33

?$=  Md~`o`n`d~`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$33

?$3  Ohdo`|~h oemr`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$3?

?$?  ^j|h ~êodjom z ~`odhehkçm m|ejomnm m em cjhg`~sçm  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$31

?$>  Ohg|msm~jrm n` ~êodjom z ~`odhehkçm cjhgê~sjom  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?:

>  MDÍEJ_J_ N@ EH_ \SHO@_H_ N@ JN@D^JBJOMOJßD  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>0

>$=  Mdíejj n` em ~êodjom m|ejomnm z ~j|h n` jn`d~jbjomojÿd  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>0

>$3  _j~`gm n` mp~`d~jomojÿd n` nhce` bmo~hs  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>;

0  C@D@BJOJH_ N@ EM P^JEJYMOJßD N@ EM_ ^@ODHEHKÇM_ CJHGÊ^SJOM_  $$$$$$$$$0<

0$=  \msm em `d~jnmn` ppmsjm  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$0<

0$3  \msm eh ppmsjh bjdme`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$03

2  P_H_ Z M\EJOMOJHD@_ N@ EM_ ^@ODHEHKÇM_ CJHGÊ^SJOM_  $$$$$$$$$$$$$$$$$$$$$$$$00

2$=  M|ejomojhd` mo~pme`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$02

2$3  M|ejomojhd` `d bm` n` n`mssheeh  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$2<

;  OM_H_ N@ ÊQJ^H  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$23

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 4/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm > n` =<< Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

;$=  Moo`h sí|jnh m bshd~`sm m`sh|hs~pmsjm !@|mým*  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$23

;$3  K`~jÿd n` mzpnm |ùcejom !\hehdjm*  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$20

1  GMSOH S@KPEM^HSJH  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$21

1$=  Dhsgm~jrm e`kme  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$21

1$3  Jdbhsg` Ipsçnjoh z ipsj|spn`dojm  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$;3

1$?  @~ídnms` jd~`sdmojhdme`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$;2

:  K@_^JßD N@ SJ@_KH_  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$;:

:$=  Mg`dmym z rped`smcjejnmn` `d eh |sho`h  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$;:

:$3  Gê~hnh n` hepojÿd z |s`r`dojÿd  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1>

=<  OHDOEP_JHD@_  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1;

=<$=  Ohdoepjhd` k`d`sme`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1;

=<$3  Bhs~me`ym z h|hs~pdjnmn`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$11

=<$?  N`cjejnmn` z |hjce` sj`kh  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1:

==  S@OHG@DNMOJHD@_  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:<

==$=  S`ohg`dnmojhd` njsjkjnm m em hskmdjymojhd`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:<

==$3  S`ohg`dnmojhd` njsjkjnm m em jdnp~sjm  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:3

==$?  S`ohg`dnmojhd` njsjkjnm m em Mngjdj~smojhd` \ùcejom  $$$$$$$$$$$$$$$$$$$$$$$$$$$$:?

==$> 

S`ohg`dnmojhd` |msm e`kjemnhs` z mk`d~` n` `~mdnmsjymojÿd 

$$$$$$$$$$$$$$$$$$:>

MD@QH J9 CJCEJHKSMBÇM  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:0

MD@QH JJ9 ÇDNJO@_ N@ ^MCEM_ KSÍBJOH_ @ JEP_^SMOJHD@_  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:;

Çdnjo` n` ~mcem  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:;

Çdnjo` n` ksíbjoh  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:;

Çdnjo` n` jep~smojhd`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:;

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 5/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

\PD^H_ OEMR@

JD^@OH ohd em gjjÿd n` m|hs~ms rmehs z n`mssheems em _hoj`nmn n`e Ohdhojgj`d~h m~smrê n` |shz`o~h `d `e gmsoh n` em jddhrmojÿd z em ~`odhehkçm |pcejom `e @~pnjh hcs` 

em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn $

@d `e g`somnh `qj~`d gùe~j|e` hepojhd` cjhgê~sjom njb`s`dojmnm ~md~h |hs em ~êodjom

}p` `g|e`md ohgh |hs em bpdojhdmejnmn }p` hbs`o`d jd `gcmskh ~hnm `eem `~íd

hsj`d~mnm me s`ohdhojgj`d~h n` |`shdm bçjom$ @~m bjdmejnmn ùe~jgm p|hd` `e

~sm~mgj`d~h n` nm~h n` omsío~`s |`shdme |hs eh }p` em |sjrmojnmn ` ohdrj`s~` `d pd

m|`o~h `|`ojmeg`d~` s`e`rmd~` `d `e ígcj~h n` em cjhg`~sçm$

Em g`~hnhehkçm p~jejymnm |msm em s`mejymojÿd n`e `~pnjh z em ohd`op`d~` |pcejomojÿd n`e|s``d~` jdbhsg` `~í bpdnmg`d~mnm `d nh m|`o~h ohg|e`g`d~msjh$

@d |sjg`s epkms ` cmm `d `e mdíejj nhopg`d~me |msm eh opme ` amd jdr`d~msjmnh em

bp`d~` n` jdbhsgmojÿd }p` nj|hd`d z |pcejomd `~pnjh jdbhsg` h ~smcmih

s`emojhdmnh ohd em cjhg`~sçm z ` amd mdmejymnh em |sjdoj|me` ohdoepjhd` n` m}p`eeh

jdbhsg` }p` ohd~j`d`d jdbhsgmojÿd mo~pme z ù~je |msm s`mejyms `~` `~pnjh$

\msme`emg`d~` ` am ohdpe~mnh g`njmd~` `d~s`rj~m m njb`s`d~` mo~hs` n` em jdnp~sjm

n` em cjhg`~sçm m djr`e gpdnjme jdrheposmdnh m bmcsjomd~` nj~sjcpjnhs` `q|`s~h `d

n`s`oah ohdpe~hs` ` jdr`~jkmnhs`$ Mç gjgh ` am s`mejymdnh pd mdíejj n`~meemnh

n` nh omh n` êqj~h s`ohdhojnh jd~`sdmojhdmeg`d~`$

@~m njr`sjnmn n` ohe`o~jrh |ms~joj|md~` `d `e `~pnjh |`sgj~` ipd~h me mdíejj n` eh

jdbhsg` z s`|hs~` ohdho`s `e `~mnh mo~pme n` eh j~`gm cjhgê~sjoh n`n`

njb`s`d~` |pd~h n` rj~m jn`d~jbjomdnh mç eh |sjdoj|me` |pd~h m bmrhs z h|hs~pdjnmn`

z eh |pd~h `d ohd~sm z |hjce` sj`kh }p` mbshd~md mo~pmeg`d~`$

J$ Jd~shnpoojÿd m em ~`odhehkçm cjhgê~sjom

@e mdíejj nhopg`d~me am |`sgj~jnh em jn`d~jbjomojÿd n` em |sjdoj|me` ~êodjom

cjhgê~sjom `qj~`d~`$ _j cj`d mekpdm n` `eem mùd ` `dop`d~smd `d `~mnh n`

gmnps`y jdpbjoj`d~` |msm |hn`s `dohd~sms` `d `e g`somnh n` pdm bhsgm `bjoj`d~` z

smyhdmce` `d opmd~h m oh~` gpoam h~sm ` `dop`d~smd pbjoj`d~`g`d~` gmnpsm z

hbs`o`d mo~pmeg`d~` hepojhd` n` mp~`d~jomojÿd `d gpz njr`sh ígcj~h$

Em ~êodjom cjhgê~sjom `qj~`d~` ` oemjbjomd `d bpdojÿd n`e smkh apgmdh mdmejymnh

`e opme |p`n` `s bjjheÿkjoh ‟nhdn` `dohd~smgh `e s`ohdhojgj`d~h n` ap`eem nmo~jems n`

jsj n` s`~jdm z n` sh~sh `d~s` h~sh‟ h n` ohg|hs~mgj`d~h ‟nhdn` ` `dop`d~smd `e

s`ohdhojgj`d~h n` rhy n` bjsgm h n` em gmd`sm n` mdnms `d~s` h~sh‟$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 6/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

@e `~pnjh s`r`em }p` `e s`ohdhojgj`d~h n` ap`eem nmo~jems z `e s`ohdhojgj`d~h n` jsj hd

em ~êodjom mo~pmeg`d~` gí `q~`dnjnm `d `e `o~hs n` em cjhg`~sçm$ Eh |sjdoj|me`

gh~jrh n` em `q|mdjÿd n` mgcm ~êodjom ` cmmd |sjdoj|meg`d~` `d }p` ` ~sm~m n`

gê~hnh n` mp~`d~jomojÿd gpz |hoh jd~spjrh ohd eh ppmsjh bjdme` z `d }p` mgcm

~êodjom bp`shd n` em |sjg`sm `d `s ohdo`cjnm eh }p` am |`sgj~jnh |hs pd emnh p

gmzhs n`mssheeh z `rhepojÿd amojm pdm s`npoojÿd n` oh~` n` jg|e`g`d~mojÿd z |hs

h~sh emnh em ohdbjmdym |hs |ms~` n` eh ojpnmnmdh }p` s`npo` em s`j~`dojm jdjojme me ph

n` dp`rm ~`odhehkçm$

JJ$ Mdíejj n` eh |sho`h n` jn`d~jbjomojÿd cmmnh `d cjhg`~sçm

@e |shks`jrh mrmdo` n` em ~`odhehkçm cjhgê~sjom am p|p`~h em |shks`jÿd n` em

bhsgm pdjghnme m j~`gm n` mp~`d~jomojÿd n` nhce` bmo~hs }p` |p`n`d jdohs|hsms gín` pdm ~`odhehkçm cjhgê~sjom ‟cjhg`~sçm cjghnme‟ h ohgcjdms `e ph n` em cjhg`~sçm ohd

h~sh j~`gm ohgh ~msi`~m n` jn`d~jbjomojÿd h ohd~sm`ým$ @ |hs `eeh }p` eh `q|`s~h

`ýmemd }p` em ohgcjdmojÿd n` ~êodjom cjhgê~sjom ohd h~sh j~`gm n`

s`ohdhojgj`d~h ` amcj~pmeg`d~` pd m|`o~h oemr` |msm `e êqj~h n` eh j~`gm n`

mp~`d~jomojÿd$

JJJ$ C`d`bjojh n` em p~jejymojÿd n` em ~`odhehkçm cjhgê~sjom

Em m|ejomojÿd n` ~`odhehkçm cjhgê~sjom s`|hs~m njb`s`d~` c`d`bjojh ~md~h |msm em

hskmdjymojhd` ohgh |msm eh |sh|jh ppmsjh$

Eh c`d`bjojh |msm em `d~jnmn` ` o`d~smd `d `e mpg`d~h n` eh djr`e` n` `kpsjnmn

em s`npoojÿd n` em |hjcjejnmn` n` bsmpn` jd~`sdh z em s`npoojÿd `d eh oh~` n`

gmd~`djgj`d~h n` eh j~`gm n` `kpsjnmn z mp~`d~jomojÿd$

\hs p |ms~` eh ppmsjh |p`n`d r`s ohgh mpg`d~m p ohghnjnmn me dh ~`d`s }p`

s`ohsnms gùe~j|e` z ohg|e`im ohd~sm`ým |hnsíd s`mejyms ~smgj~mojhd` s`gh~m ohd

gmzhs `kpsjnmn z `d `e omh n` h|`smojhd` |s``dojme` |hnsíd r`s s`npojnh eh

~j`g|h n` `|`sm$ \hs h~sm |ms~` p |sjrmojnmn |p`n` r`s` s`bhsymnm j `e moo`h m pnm~h |`shdme` ` s`mejym g`njmd~` mp~`d~jomojÿd cjhgê~sjom$

JR$ Ph z m|ejomojhd` n` em ~`odhehkçm cjhgê~sjom

Jdn`|`dnj`d~`g`d~` n` em ~êodjom `g|e`mnm eh j~`gm cjhgê~sjoh hd p~jejymnh `d

gpz njr`sh `d~hsdh z ohd gpz njr`sm bjdmejnmn`$

@d cm` m em `d~s`rj~m s`mejymnm em |sjdoj|me bjdmejnmn |msm em opme ` p~jejymd j~`gm

cjhgê~sjoh ` `e ohd~she n` moo`h !~md~h bçjoh ohgh eÿkjoh* m `njbjojh yhdm

s`~sjdkjnm z j~`gm n` jdbhsgmojÿd$ _jd `gcmskh `d `e g`somnh mo~pmeg`d~` ``dop`d~smd ~êodjom cjhgê~sjom `g|e`mnm ohd hci`~jrh ohgh `e ohd~she n` |s``dojm

`e ohd~she n` bshd~`sm em epoam ohd~sm `e bsmpn` z em jdr`~jkmojÿd n` n`ej~h$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 7/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Em p~jejymojÿd n` j~`gm n` s`ohdhojgj`d~h cmmnh `d cjhg`~sçm p|hd` ksmdn`

c`d`bjojh |msm em hskmdjymojhd` h `d~jnmn` }p` eh jg|emd~md `d m|`o~h ohgh em

s`npoojÿd n` oh~` `e mpg`d~h n` em `kpsjnmn z em `bjoj`dojm z em g`ihsm n` em jgmk`d

ohs|hsm~jrm$ ^mgcjêd p|hd` ksmdn` c`d`bjojh |msm eh ppmsjh bjdme` `d s`emojÿd m

p ohghnjnmn s`npoojÿd n` ~j`g|h n` `|`sm |hjcjejnmn n` s`mejyms ~smgj~mojhd`

s`gh~m z gmzhs mermkpmsnm n` p |sjrmojnmn `d~s` h~sm$

_` |p`n` n`~moms ~mgcjêd pdm `sj` n` m|ejomojhd` `d bm` n` n`mssheeh }p` amd jnh

jn`d~jbjomnm `d `e mdíejj nhopg`d~me z ohg`d~mnm |hs eh `q|`s~h }p` amd

ohemchsmnh `d `e |sho`h n` ohdpe~m$ Mo~pmeg`d~` ` `~íd n`mssheemdnh hepojhd`

|msm bmojej~ms em mp~`d~jomojÿd m nj~mdojm r`sjbjoms njb`s`d~` g`njh n` |mkh z g`ihsms eh

j~`gm n` ohd~she |ms`d~me z n` rjkjemdojm `d k`d`sme$ @ `|`ojmeg`d~` s``ýmce` `e

n`mssheeh }p` ` `~í |shnpoj`dnh n` j~`gm cjhgê~sjoh |msm em mp~`d~jomojÿd n`ppmsjh }p` s`mejymd ~smdmoojhd` g`njmd~` ~`eêbhdh gÿrje`$ 

R$ Omh n` êqj~h

@d `e |s``d~` `~pnjh ` amd `e`oojhdmnh nh omh n` êqj~h `|`oçbjoh

|sjdoj|meg`d~` |hs p njr`sjnmn `d opmd~h m bjdmejnmn z ~`odhehkçm `g|e`mnm9

‣ Moo`h sí|jnh m bshd~`sm m`sh|hs~pmsjm `d @|mým$

‣ K`~jÿd n` mzpnm |ùcejom `d \hehdjm$

@d mgch omh n`~mom em ohghnjnmn |msm eh ppmsjh }p` am p|p`~h em jg|emd~mojÿd

n` j~`gm cjhgê~sjoh z em `bjoj`dojm ohd`kpjnm |hs |ms~` n` em hskmdjymojhd` em

opme` amd |hnjnh n`~jdms p s`opsh }p` |s`rjmg`d~` n`~jdmcmd me s`ohdhojgj`d~h

n` |`shdm m h~sm bpdojhd`$

RJ$ Gmsoh s`kpem~hsjh 

Eh nm~h cjhgê~sjoh hd ohdjn`smnh nm~h n` omsío~`s |`shdme |hs em njb`s`d~`

mp~hsjnmn` dmojhdme` z `psh|`m n` |sh~`oojÿd n` nm~h$ @ |hs `eeh }p` n`c`dm|ejoms` eh |sjdoj|jh `~mce`ojnh `d em E`z Hskídjom n` \sh~`oojÿd n` Nm~h n`

Omsío~`s \`shdme z em g`njnm n` `kpsjnmn `~mce`ojnm `d p S`kemg`d~h n`

N`mssheeh$

@d `e |s``d~` jdbhsg` ` |p`n` hc`srms pdm s`ohe`oojÿd n` e`kjemojÿd z ipsj|spn`dojm

n` m|ejomojÿd `ýmemnh |hs eh `q|`s~h ohdpe~mnh mç ohgh eh |sjdoj|me` `~ídnms`

mhojmnh m omnm ~êodjom cjhgê~sjom$

_`kùd `ýmemd eh `q|`s~h em s`kpemojÿd mo~pme `d @|mým `d gm~`sjm n` |sh~`oojÿd n`

nm~h ` pbjoj`d~` |msm s`kpems `e ígcj~h n` em cjhg`~sçm$ _jd `gcmskh n` omsm m pdjbjoms

osj~`sjh z m~`dn`s m pdm `|`ojme `djcjejnmn n` em |hcemojÿd |hnsçm `s ohdr`dj`d~`

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 8/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

n`mssheems pdm s`kpemojÿd `|`oçbjom |msm em cjhg`~sçm$ \msm `eeh ` n`c`sçm `rj~ms pdm

dhsgm~jrm `qo`jrmg`d~` sçkjnm }p` jg|jnm h njbjope~` `e ph n` em cjhg`~sçm h }p` dh `

|p`nm mnm|~ms bíojeg`d~` m eh bp~psh n`mssheeh$

\msme`emg`d~` eh `q|`s~h ~mgcjêd `ýmemd em ohdr`dj`dojm n` mrmdyms `d em s`kpemojÿd

e`kjem~jrm s`em~jrm m em p|emd~mojÿd n` jn`d~jnmn pdm n` em gmzhs` mg`dmym

jn`d~jbjomnm$

\hs h~sh emnh ` hc`srm `d em ipsj|spn`dojm mdmejymnm em osj~jojnmn n` em d`o`jnmn n`

nms opg|ejgj`d~h me n`c`s n` jdbhsgmojÿd `~mce`ojnh `d em EH\N |hs |ms~` n` em

`d~jnmn` }p` jg|emd~md j~`gm n` s`ohdhojgj`d~h cjhgê~sjoh |msm p `g|e`mnh$

RJJ$ K`~jÿd n` sj`kh

Dh hc~md~` `d em `emchsmojÿd n`e |s``d~` `~pnjh ` amd jn`d~jbjomnh pd ohdipd~h n`

mg`dmym z rped`smcjejnmn` jd~sçd`omg`d~` ejkmnh m em p~jejymojÿd n` ~`odhehkçm n`

s`ohdhojgj`d~h cmmnm `d cjhg`~sçm$ @d `~` `d~jnh eh `q|`s~h n`~momd

|sjdoj|meg`d~` em jkpj`d~`9

‣  Jnhd`jnmn n` em jg|emd~mojÿd9 @ d`o`msjh pd mdíejj |s`rjh |msm ee`rms m omch

em jg|emd~mojÿd n` j~`gm m|sh|jmnh$

  _p|emd~mojÿd n` jn`d~jnmn9 Ohgh `d ~hnh j~`gm n` mp~`d~jomojÿd ` pdm n`em |sjdoj|me` mg`dmym$ 

‣  Me~`smojÿd n` smkh9 @d homjhd` rhepd~msjm h jdrhepd~msjmg`d~` eh smkh

cjhgê~sjoh n` em |`shdm |p`n`d r`s` me~`smnh$

‣  Mo`|~mojÿd ope~psme9 Em jnjhjdosmjm ope~psme n` omnm |mç |p`n` p|hd`s pd

jdohdr`dj d~` |msm em jg|emd~mojÿd n` n`~`sgjdmnh j~`gm n` s`ohdhojgj`d~h$

‣  N`ohdhojgj`d~h9 @d homjhd` em `d~jnmn` }p` |hnsçmd `~ms jd~`s`mnm

n`ohdho`d em omejnmn h `e mcmdjoh n` |shnpo~h z p~jejnmn` nj|hdjce`$

‣  \`so`|ojÿd d`km~jrm9 \`so`|ojÿd n` mp`dojm n` |sjrmojnmn |hs |ms~` n` eh

ppmsjh$

Ohd `e hci`~jrh n` k`~jhdms eh sj`kh jn`d~jbjomnh eh `q|`s~h `ýmemd gê~hnh `

hepojÿd z |s`r`dojÿd n` eh gjgh }p` bmojej~md em jg|emd~mojÿd `qj~hm n` j~`gm

cjhgê~sjoh$ @d `~` `d~jnh omc` n`~moms em n`~`oojÿd n` rjnm em p~jejymojÿd n`

cjhg`~sçm `d ghrjgj`d~h `e megmo`dmgj`d~h `kpsh n` gp`~sm em bhsgmojÿd n` eh

ppmsjh bjdme` z em s`mejymojÿd n` pd mdíejj |s`rjh m em jg|emd~mojÿd$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 9/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm : n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

RJJJ$ S`ohg`dnmojhd` z cp`dm |sío~jom

\hs ùe~jgh npsmd~` `e |sho`h n` `emchsmojÿd n`e |s``d~` `~pnjh ` am s`oh|jemnh pd

ohdipd~h n` s`ohg`dnmojhd` njsjkjnm m eh njb`s`d~` mo~hs` n`e `o~hs n` em cjhg`~sçmnhdn` omc` n`~moms em jkpj`d~`$

‣ S`mejymojÿd n` pd mdíejj n`~meemnh |s`rjh m em jg|emd~mojÿd$

‣ P~jejymojÿd n` ~`odhehkçm n` omejnmn$

‣ Jdbhsgms z bhsgms m eh ppmsjh n` eh j~`gm$

‣ Kmsmd~jyms em `kpsjnmn n` eh nm~h cjhgê~sjoh$

‣ Mejd`mgj`d~h `d~s` g`somnh ` jdr`~jkmnhs`$

‣ Njrpekmojÿd amojm em ojpnmnmdçm ` jdr`sjÿd `d n`mssheeh n` dp`rm ~`odhehkçm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 10/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

= JD^SHNPOOJßD Z HCI@^JRH_

=$= \S@_@D^MOJßD

=$=$= Jd~j~p~h Dmojhdme n` ^`odhehkçm n` em Ohgpdjomojÿd

@e Jd~j~p~h Dmojhdme n` ^`odhehkçm n` em Ohgpdjomojÿd _$M$ !JD^@OH* ` pdm

hoj`nmn `~m~me mnosj~m me Gjdj~`sjh n` Jdnp~sjm ^psjgh z Ohg`sojh m ~smrê n` em

_`os`~msçm n` @~mnh n` ^`e`ohgpdjomojhd` z |msm em _hoj`nmn n` em Jdbhsgmojÿd$

JD^@OH ` pd o`d~sh n` n`mssheeh n` omsío~`s jddhrmnhs z n` jd~`sê |ùcejoh n` ígcj~h

dmojhdme }p` ` hsj`d~m m em m|hs~mojÿd n` rmehs m em jdnp~sjm z m eh ppmsjh z m em

njbpjÿd n` em dp`rm ~`odhehkçm n` em jdbhsgmojÿd z em ohgpdjomojÿd !^JO* `d @|mým

`d oemsm jd~hdçm ohd @psh|m$

_p hci`~jrh bpdnmg`d~me ` `srjs ohgh jd~spg`d~h |msm n`mssheems em _hoj`nmn n` em

Jdbhsgmojÿd ohd mo~jrjnmn` |sh|jm `d `e ígcj~h n` em jddhrmojÿd z `e n`mssheeh n`

|shz`o~h mhojmnh m em ^JO cmídnh` `d ~s` |jems` bpdnmg`d~me`9 em jdr`~jkmojÿd

m|ejomnm em |s`~mojÿd n` `srjojh z em bhsgmojÿd$

Em gjjÿd n` JD^@OH ` m|hs~ms rmehs ` jddhrmojÿd m eh ojpnmnmdh m em \ZG@_ m em

Mngjdj~smojhd` \ùcejom z me `o~hs n` em ~`odhehkçm n` em jdbhsgmojÿd m ~smrê n`e

n`mssheeh n` |shz`o~h }p` ohd~sjcpzmd m s`bhsyms em ohdbjmdym `d eh `srjojh n` em_hoj`nmn n` em Jdbhsgmojÿd `d dp`~sh |mç |shghrj`dnh mn`gí pdm eçd`m n`

|ms~joj|mojÿd jd~`sdmojhdme$

\msm eeh JD^@OH n`mssheem mo~pmojhd` d em jkpj`d~` eçd`m9

‣  _`kpsjnmn ^`odheÿkjom9 JD^@OH `~í ohg|shg`~jnh ohd em |shghojÿd n`

`srjojh n` em _hoj`nmn n` em Jdbhsgmojÿd omnm r`y gí `kpsh }p` |sh~`imd

eh nm~h |`shdme` n` eh jd~`s`mnh p jd~jgjnmn em jd~`ksjnmn n` p

jdbhsgmojÿd z `rj~`d m~m}p` }p` |hdkmd `d sj`kh eh `srjojh |s`~mnh$ Z |hs

p|p`~h }p` kmsmd~jo`d pd opg|ejgj`d~h `~sjo~h n` em dhsgm~jrm e`kme `dgm~`sjm n` ^JO$ \msm `eeh ohhsnjdm nj~jd~m jdjojm~jrm |ùcejom `d ~hsdh m em

`kpsjnmn n` em ^JO }p` ` gm~`sjmejymd `d em |s`~mojÿd n` `srjojh |hs |ms~`

n`e Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd `e O`d~sh n` S`|p`~m m

Jdojn`d~` n` _`kpsjnmn `d ^`odhehkçm n` em Jdbhsgmojÿd !JD^@OH'O@S^* ohd

p O`d~sh N`gh~smnhs n` ^`odhehkçm n` _`kpsjnmn z em Hbjojdm n` _`kpsjnmn

n`e Jd~`sdmp~m n` eh }p` ` c`d`bjojmd ojpnmnmdh \ZG@_ Mngjdj~smojhd`

\ùcejom z `e `o~hs ~`odheÿkjoh$

‣  Moo`jcjejnmn9 JD^@OH |shgp`r` `srjojh n` em _hoj`nmn n` em Jdbhsgmojÿdgí moo`jce` }p` p|sjgmd em cmss`sm n` `qoepjÿd opme}pj`sm }p` `m em

njbjope~mn h oms`dojm ~êodjom bhsgm~jrm `~o$ jdoeph njom|mojnmn }p` ~`dkmd p

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 11/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm == n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

ppmsjh$ Z }p` bmojej~`d em jd~`ksmojÿd |shks`jrm n` ~hnh eh ohe`o~jrh n`

ppmsjh n` ghnh }p` ~hnh `eeh |p`nmd c`d`bjojms` n` em h|hs~pdjnmn` }p`

hbs`o` em _hoj`nmn n` em Jdbhsgmojÿd$ Mjgjgh n`mssheem |shz`o~h `d `e ígcj~h

n` em moo`jcjejnmn hsj`d~mnh m kmsmd~jyms `e n`s`oah n` ojpnmnmdh z `g|s`m

m s`emojhdms` e`o~sÿdjomg`d~` ohd em MM$\\$

‣  Omejnmn ^JO9 JD^@OH |shgp`r` pdh `srjojh n` em _hoj`nmn n` em Jdbhsgmojÿd

}p` omnm r`y `md n` gmzhs omejnmn }p` kmsmd~jo`d pdh mn`opmnh djr`e` n`

`srjojh eh opme ` ~smnpo` `d pdm gmzhs shcp~`y n` m|ejomojhd` z j~`gm pd

ohg|shgjh `d em nj|hdjcjejnmn z eh ~j`g|h n` s`|p`~m pd mn`opmnh h|hs~`

|msm eh ppmsjh pdm jdbhsgmojÿd |s`ojm z oemsm hcs` em `rhepojÿd n` em

bpdojhdmejnmn` n` eh `srjojh z `d s`pg`d `srjojh omnm r`y g`ihs`$ @d

`~m eçd`m jg|pem em ohg|`~j~jrjnmn n` em jdnp~sjm n`e _hb~{ms` m ~smrê n` em|shghojÿd n` em g`ihsm n` em omejnmn z em o`s~jbjomojÿd n` em `g|s`m z

|shb`jhdme` n` em jdk`dj`sçm n`e hb~{ms`$

‣  Bhsgmojÿd9 em bhsgmojÿd ` pd bmo~hs n`~`sgjdmd~` |msm em m~smoojÿd n` ~me`d~h z

|msm em g`ihsm n` em ohg|`~j~jrjnmn n` em `g|s`m$ \hs `eeh JD^@OH jg|pem em

bhsgmojÿd n` pdjr`sj~msjh z |shb`jhdme` `d em ~`odhehkçm gí n`gmdnmnm

|hs em jdnp~sjm$

=$=$3 Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd

@e Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd ` jd`s~m n`d~sh n` em eçd`m `~sm~êkjom

n` mo~pmojÿd n` JD^@OH `d gm~`sjm n` _`kpsjnmn ^`odheÿkjom$

Dmo` ohd `e hci`~jrh n` n`osjcjs n` gmd`sm n`~meemnm z j~`gí~jom `e djr`e n` `kpsjnmn

z ohdbjmdym `d em _hoj`nmn n` em Jdbhsgmojÿd z n` k`d`sms ohdhojgj`d~h `|`ojmejymnh `d

em gm~`sjm$ N` `~` ghnh ` `dop`d~sm me `srjojh n` eh ojpnmnmdh em `g|s`m z em

mngjdj~smojhd` |ùcejom `|mýhem |msm n`osjcjs mdmejyms m`hsms z njbpdnjs em ope~psm

n` em `kpsjnmn n` em jdbhsgmojÿd z em `'ohdbjmdym$

@e Hc`srm~hsjh am nj`ýmnh pd \emd n` Mo~jrjnmn` z @~pnjh ohd `e hci`~h n` |shnpojsohdhojgj`d~h `|`ojmejymnh z ù~je `d gm~`sjm n` `kpsjnmn |hs |ms~` n` JD^@OH mç

ohgh n` `emchsms s`ohg`dnmojhd` z |sh|p`~m }p` n`bjdmd ~`dn`dojm ríejnm |msm em

~hgm n` n`ojjhd` bp~psm |hs |ms~` n` eh |hn`s` |ùcejoh$

N`d~sh n` `~` |emd n` moojÿd ` s`mejymd emchs` n` jdr`~jkmojÿd mdíejj `~pnjh

m`hsmgj`d~h z njrpekmojÿd }p` m~`dn`síd `d~s` h~sm m em jkpj`d~` `~sm~`kjm9

‣ @emchsmojÿd n` `~pnjh ` jdbhsg` |sh|jh `d gm~`sjm n` `kpsjnmn n` em

^`odhehkçm n` em Jdbhsgmojÿd z em Ohgpdjomojÿd ohd `|`ojme êdbmj `d em_`kpsjnmn d Jd~`sd`~$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 12/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =3 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣ _`kpjgj`d~h n` eh |sjdoj|me` jdnjomnhs` z |heç~jom |ùcejom s`emojhdmnm ohd

em `kpsjnmn n` em jdbhsgmojÿd z em ohdbjmdym `d `e ígcj~h dmojhdme `

jd~`sdmojhdme$

‣ K`d`smojÿd n` pdm cm` n` nm~h }p` |`sgj~m `e mdíejj z `rmepmojÿd n` em

`kpsjnmn z em ohdbjmdym ohd pdm |`s|`o~jrm ~`g|hsme$

‣ Jg|peh n` |shz`o~h n` jdr`~jkmojÿd `d gm~`sjm n` `kpsjnmn ^JO$

‣ Njbpjÿd n` `~pnjh ` jdbhsg` |pcejomnh |hs h~sm `d~jnmn` z hskmdjgh

dmojhdme` ` jd~`sdmojhdme` mç ohgh n` jdbhsgmojÿd hcs` em mo~pmejnmn

dmojhdme z `psh|`m `d gm~`sjm n` em `kpsjnmn z ohdbjmdym `d em _hoj`nmn n` em

Jdbhsgmojÿd$

‣ M`hsmgj`d~h m em Mngjdj~smojhd` \ùcejom `d gm~`sjm n` `kpsjnmn n` em

jdbhsgmojÿd z ohdbjmdym mç ohgh `e m|hzh m em `emchsmojÿd `kpjgj`d~h z

`rmepmojÿd n` |heç~jom |ùcejom `d `~` ígcj~h$

=$3 @_^PNJH _HCS@ EM_ ^@ODHEHKÇM_ CJHGÊ^SJOM_ M\EJOMNM_ M EM

_@KPSJNMN

@e |s``d~` `~pnjh psk` n` em d`o`jnmn n` ohdho`s `e djr`e n` n`mssheeh z ohdbjmdym

n` em ~`odhehkçm cjhgê~sjom mç ohgh p om|mojnmn |msm mbshd~ms eh sj`kh `qj~`d~`

z p bp~psm eçd`m n` n`mssheeh$

\msm em s`mejymojÿd n`e gjgh ` |emd~`md pdm `sj` hci`~jrh }p` ` n`mssheemd m

ohd~jdpmojÿd$

=$3$= Hci`~jrh k`d`sme`

@e hci`~jrh k`d`sme n` `~` `~pnjh ` `e mdíejj n` em ~êodjom cjhgê~sjom `qj~`d~`

p njb`s`d~` ph z m|ejomojhd` mg`dmym z rped`smcjejnmn` m em }p` `~íd

`q|p`~m em ~`odhehkçm cjhgê~sjom$ @~` mdíejj ` cmmsí `d em |`so`|ojÿd n`

`q|`s~h `d njr`sh omg|h mç ohgh `d em nhopg`d~mojÿd zm |pcejomnm$

H~sh hci`~jrh n` `~` mdíejj ` em |sh|p`~m n` s`ohg`dnmojhd` n` mo~pmojÿd h cp`dm

|sío~jom m ppmsjh |`}p`ým z g`njmdm `g|s`m jdnp~sjm z Mngjdj~smojhd`

\ùcejom |msm jg|pems `e opg|ejgj`d~h n` `~ídnms` `e ohdhojgj`d~h z `e n`mssheeh n`

em cjhg`~sçm$

=$3$3 Hci`~jrh `|`oçbjoh

Eh md~`sjhs` hci`~jrh ` n`kehmd h|`sm~jrmg`d~` `d eh jkpj`d~` hci`~jrh

`|`oçbjoh }p` |`sgj~`d mn`gí hsj`d~ms em `~spo~psm ~`gí~jom n`e |s``d~` jdbhsg`$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 13/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Jd~shnpoojÿd m em ~`odhehkçm cjhgê~sjom

‣ N`osjcjs `e ohdo`|~h n` cjhg`~sçm eh md~`o`n`d~` `qj~`d~` mç ohgh

ohdo`|~h oemr` s`emojhdmnh$

‣ Jn`d~jbjoms eh ~j|h n` ~`odhehkçm cjhgê~sjom `qj~`d~` `d `e g`somnh$

‣ @~mce`o`s pdm ohg|msm~jrm n` em njb`s`d~` ~`odhehkçm jn`d~jbjomnm

oemjbjoídnhem `d bpdojÿd n` p ksmnh n` gmnps`y z n` jg|emd~mojÿd `d `e

g`somnh ohdjn`smdnh ~mgcjêd `d~s` h~sh m|`o~h ohgh em s`emojÿd

oh~`(c`d`bjojh$

Mdíejj n` eh |sho`h n` jn`d~jbjomojÿd cmmnh `d cjhg`~sçm

‣ N`osjcjs em ~êodjom m|ejomnm z eh ~j|h n` jn`d~jbjomojÿd$

‣ Ohg|msms em ~`odhehkçm cjhgê~sjom bs`d~` m h~sh ~j|h n` j~`gm n`

jn`d~jbjomojÿd n`osjcj`dnh em |hjce` r`d~mim$

‣ Mdmejyms em mp~`d~jomojÿd n` nhce` bmo~hs `d s`emojÿd m em cjhg`~sçm$

C`d`bjojh n` em p~jejymojÿd n` em ~`odhehkçm cjhgê~sjom

‣ Jn`d~jbjoms em r`d~mim }p` em cjhg`~sçm s`|hs~m m eh ppmsjh

‣ Jn`d~jbjoms eh |pd~h oemr` n`e c`d`bjojh |msm em hskmdjymojhd` me jg|emd~ms

j~`gm cjhgê~sjoh$

Ph z m|ejomojhd` n` em ~`odhehkçm cjhgê~sjom

‣ Mdmejyms ` jn`d~jbjoms em |sjdoj|me` m|ejomojhd` mo~pme` n` em cjhg`~sçm$

‣ Jn`d~jbjoms eh njb`s`d~` `o~hs` n` `|`ojme s`e`rmdojm `d `e ígcj~h cjhgê~sjoh$

‣ @~pnjms em |hjcjejnmn` n` `q|mdjÿd m h~sm ís`m n` em ~`odhehkçm m g`njh

|emyh$

‣ Ohdho`s em ís`m n` jdr`~jkmojÿd }p` s`pe~`d jd~`s`md~` |msm `e n`mssheeh `

jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom `d `e g`somnh$

S`kpemojÿd9 e`kjemojÿd z `~ídnms` jd~`sdmojhdme` n`mssheemnh

‣ Jn`d~jbjoms z mdmejyms em e`kjemojÿd mo~pmeg`d~` m|ejomce`$

‣ Jn`d~jbjoms eh `~ídnms` jd~`sdmojhdme `qj~`d~`$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 14/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm => n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

K`~jÿd n` sj`kh

‣ Jn`d~jbjoms em mg`dmym z rped`smcjejnmn` }p` |p`nmd ohg|shg`~`s em

`kpsjnmn h em ohdbjmdym `d `~h |sho`h$

‣ Mdmejyms eh gê~hnh n` hepojÿd z |s`r`dojÿd }p` |`sgj~`d k`~jhdms eh sj`kh

jn`d~jbjomnh |s`rjmg`d~ $

S`ohg`dnmojhd`

‣ Ohdho`s em cp`dm |sío~jom s`em~jrm m eh ghg`d~h n` n`ojjÿd `

jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom `d |`}p`ým z g`njmdm `g|s`m$

‣ Mdmejyms `e ph n` `~ídnms` mp~h's`kpemojÿd z ís`m n` n`mssheeh `d emjdnp~sjm cjhgê~sjom$

‣ Jn`d~jbjoms |heç~jom n` jd~mpsmojÿd z ohdoj`dojmojÿd s`ohg`dnmce` |msm em

Mngjdj~smojhd` \ùcejom$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 15/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

3 NJ_@ÝH G@^HNHEßKJOH

@~m jdr`~jkmojÿd ` am n`mssheemnh jkpj`dnh pd `dbh}p` opmej~m~jrh me ~j`g|h }p` `amd p~jejymnh nm~h opmd~j~m~jrh |sho`n`d~` n` h~sm jdr`~jkmojhd` ohgh

ohg|e`g`d~h$ Em bm` `d }p` ` am mchsnmnh amd jnh9

‣ Bm` =9 S`oh|jemojÿd z `~pnjh n` jdbhsg`$

‣ Bm` 39 @d~s`rj~m m `q|`s~h `jÿd n` ~smcmih z m|hs~mojÿd 3$<$

‣ Bm` ?9 @emchsmojÿd n`e jdbhsg` n` ohdoepjhd` bjdme` n`e |shz`o~h$

Bm` >9 @emchsmojÿd n` pdm kpçm |sío~jom njsjkjnm m ppmsjh hcs` `kpsjnmn zohdbjmdym `d `e ph n` em ~`odhehkçm cjhgê~sjom$

3$= BM_@ =9 CÙ_]P@NM Z MDÍEJ_J_ NHOPG@D^ME$

@~m `~m|m am mcmsomnh `e mdíejj n` em j~pmojÿd mo~pme n` em ~`odhehkçm cjhgê~sjom

`d s`emojÿd m p ksmnh n` gmnps`y r`d~mim jdohdr`dj`d~` mç ohgh em ~`dn`dojm

bp~psm `d bpdojÿd n` em jdnp~sjm h `e `o~hs$

\msm em ohd`opojÿd n` `~h hci`~jrh ` amd jdr`d~msjmnh em bp`d~` n` jdbhsgmojÿd

}p` nj|hd`d z |pcejomd `~pnjh jdbhsg` z(h ~smcmih s`emojhdmnh ohd em cjhg`~sçm$

Bjdmeg`d~` ` amd mdmejymnh z `q~smçnh em |sjdoj|me` ohdoepjhd` n` m}p`eeh jdbhsg`

}p` ohd~j`d`d jdbhsgmojÿd mo~pme z ù~je |msm `e |s``d~` `~pnjh$

@ jg|hs~md~` n`~moms }p` pdm ksmd |ms~` n` `~m |pcejomojhd` |`s~`d`o`d m

`d~jnmn` |ùcejom h |sjrmnm opzh ígcj~h n` `~pnjh ` j~ùm `d Dhs~`mgêsjom !@~mnh

Pdjnh z Omdmní* p h~sh |mç` `psh|`h gí n`mssheemnh n`n` `e |pd~h n` rj~m n`e

hci`~h n`e |s``d~` `~pnjh$

@d `e Md`qh J9 Cjcejhksmbçm ` jdoepz` pdm s`emojÿd n` em |pcejomojhd` ohdjn`smnm `d em

s`mejymojÿd n`e jdbhsg`$ ^hnm `eem hd |sh|j`nmn n` em jkpj`d~` `d~jnmn`9

‣ Mjs Pdjr`sj~z

‣ O`d~sme Jd~j~p~` hb ^`oadhehkz hb

Fhfsmiams

‣ O`d~s` bhs @psh|`md \hejoz

_~pnj`

‣ Ohg|e`~` Ohdpe~md~ [hsen{jn`

‣ Ohg|p~`s Em{ " _`opsj~z

S`rj`{

‣ N`ehj~~`

‣ Êohe` \hez~`oadj}p` Bênêsme` n`

Empmdd`

‣ @psh|`md Ohggj~`` bhs_~mdnmsjym~jhd

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 16/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣ Bhss`~`s

‣ Kms~d`s

‣ Jd~j~p~` hb @e`o~sjome mdn

@e`o~shdjo @dkjd``s

‣ J}sm Pdjr`sj~z

‣ Gjoajkmd _~m~` Pdjr`sj~z

‣ Dm~jhdme Jd~j~p~` hb _~mdnmsn

mdn ^`oadhehkz !DJ_^*

‣ _sj Imzmoamgmsmi`dnsm Ohee`k`

hb @dkjd``sjdk

‣ ^spc MK

‣ Pdjÿd @psh|`m

‣ Pdjr`sjnmn Omseh JJJ n` Gmnsjn

‣ Pdjr`sjnmn n` N`p~h

‣ Pdjr`sjnmn n`e \mç Rmoh

‣ Pdjr`sj~ì nj Chehkdm

‣ Pdjr`sj~z hb Msfmdm

‣ Pdjr`sj~z hb F`cmdkmmd

3$3 BM_@ 39 OHD_PE^M M @Q\@S^H_

@~m bm` n`e |shz`o~h ` am n`~jdmnh m ohdpe~ms em h|jdjÿd n` `q|`s~h hcs` eh

njb`s`d~` ígcj~h n` mdíejj |sh|p`~h |msm `e `~pnjh$

3$3$= _`e`oojÿd n` `q|`s~h

Eh |`sbje` }p` amd mcmsomnh eh `q|`s~h |ms~joj|md~` `d em jdr`~jkmojÿd hd ehjkpj`d~`9

‣  Bmcsjomd~` n` j~`gm cjhgê~sjoh9 hbs`o`d em rjjÿd n`e bmcsjomd~` n` `~`

~j|h n` j~`gm m|hs~mdnh `|`ojmeg`d~` p |`s|`o~jrm hcs` `e n`mssheeh n`e

g`somnh em n`cjejnmn` z cmss`sm mo~pme` mn`gí n` em `q|`o~m~jrm }p`

~j`d` em jdnp~sjm$ \p`n`d m|hs~ms p ohdhojgj`d~h hcs` `e gmsoh s`kpem~hsjh

mo~pme z eh `~ídnms`$

‣  Nj~sjcpjnhs` n` j~`gm cjhgê~sjoh9 m|hs~md em rjjÿd n`n` pd |pd~h n`

rj~m n` d`khojh z n`gmdnm n` oej`d~` `d opmd~h me g`somnh mo~pme n` j~`gmcjhgê~sjoh em d`o`jnmn` n` eh oej`d~` z em cmss`sm m em }p` ` `dbs`d~md m

em ahsm n` moo`n`s m `~` ~j|h n` hepojhd`$

‣  Jd~`ksmnhs` ( ohdpe~hs`9 ohd~sjcpz`d m em jdr`~jkmojÿd ohd p `q|`sj`dojm `d

em jg|emd~mojÿd n` j~`gm cjhgê~sjoh hcs` ~hnh n`n` `e |pd~h n` rj~m n` em

cp`dm |sío~jom n` `kpsjnmn z n` eh sj`kh }p` ` n`c`d ~`d`s `d op`d~m `d

`e ghg`d~h n` em mnh|ojÿd n` `~m ~`odhehkçm$ ^mgcjêd |p`n`d ohg|e`g`d~ms

em rjjÿd `qj~`d~` hcs` em d`o`jnmn` n` eh oej`d~` z `e ph }p` mo~pmeg`d~`

`~íd ~`dj`dnh em ~`odhehkçm cjhgê~sjom$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 17/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣  @q|`s~h `d `kpsjnmn jdbhsgí~jom9 csjdnmd pdm rjjÿd gí hci`~jrm hcs` `e

ph z m|ejomojÿd n` em ~`odhehkçm cjhgê~sjom s`|`o~h m em `kpsjnmn n` em

jdbhsgmojÿd jn`d~jbjomojÿd n` |`shdm z ohd~she n` moo`h$ ^mgcjêd s`pe~m

s`e`rmd~` p ohdhojgj`d~h hcs` eh sj`kh z n`cjejnmn` n` `~` ~j|h n`

~`odhehkçm z em cp`dm |sío~jom m ~`d`s `d op`d~m |msm p n`|ej`kp` z ph

`bjomy$

‣  @q|`s~h `d n`s`oah `d dp`rm ~`odhehkçm9 hbs`o`d me `~pnjh p rjjÿd n`n`

`e |pd~h n` rj~m ipsçnjoh hcs` em |s`ompojhd` z(h ejgj~mojhd` `qj~`d~` `d em

m|ejomojÿd n` `~` ~j|h n` ~`odhehkçm$

‣  Ppmsjh bjdme`9 m|hs~md me `~pnjh em `q|`sj`dojm n`e oej`d~` bjdme m em ahsm n`

mnh|~ms ~`odhehkçm cjhgê~sjom z em |hjce` d`o`jnmn` }p` |p`n`d opcsjs ohdem gjgm$ _p |ms~joj|mojÿd mzpnm ~mgcjêd m mdmejyms em cmss`sm n` `d~smnm

`qj~`d~` z hc~`d`s pdm rjjÿd hcs` `e ksmnh n` m|ejomojÿd n` em gjgm `d em

mo~pmejnmn$ M}p`eeh ppmsjh }p` amzmd mchsnmnh |shz`o~h n` jg|emd~mojÿd n`

`~` ~j|h n` ~`odhehkçm mzpnmsíd m ohd~`g|ems `e om~íehkh n` cp`dm |sío~jom$

‣  Jdr`~jkmnhs` ( momnêgjoh9 ohd~sjcpz`d ohd p h|jdjÿd hcs` `e bp~psh n` `~`

~j|h n` ~`odhehkçm z eh ohdnjojhdmd~` `qj~`d~` `d s`emojÿd m p `rhepojÿd z

mn`opmojÿd m dp`rm d`o`jnmn`$ ^mgcjêd m|hs~md me |shz`o~h p rjjÿd hcs`

h~sh ~j|h n` m|ejomojhd` }p` |p`n`d ~`d`s `~m ~`odhehkçm$

‣  @q|`s~h jd~`sdmojhdme`9 csjdnmd me |shz`o~h pdm rjjÿd jd~`ksme n`e `~mnh n`

n`mssheeh n` `~m ~`odhehkçm bp`sm n`e ígcj~h dmojhdme z em `rhepojÿd }p` |p`n`

~`d`s `~m jdnp~sjm n` gmd`sm gí kehcme$ ^mgcjêd m|hs~md ohdhojgj`d~h hcs`

opíe` hd eh eçn`s` n`n` pd |pd~h n` rj~m n` bmcsjomojÿd ` jg|emd~mojÿd n`

hepojhd` cjhgê~sjom$

‣  Omh n` êqj~h9 hbs`o`d `i`g|eh hcs` jg|emd~mojhd` n` hepojhd`

cjhgê~sjom !~md~h m |`}p`ým `omem ohgh n`|ej`kp` gí jkdjbjom~jrh*

jep~smdnh `e |sho`h n` mnh|ojÿd n` `~` ~j|h n` ~`odhehkçm z mdmejymdnh ehc`d`bjojh m|hs~mnh |hs p jg|emd~mojÿd$

_` `ýmemd m ohd~jdpmojÿd em jd~j~pojhd` z |shb`jhdme` }p` amd ohemchsmnh `d em

s`mejymojÿd n`e `~pnjh9

‣  Mkdj~jh$ Imrj`s Om~mýh z Gms~m Kmsoçm'Khgms _hojh bpdnmnhs z Njs`o~hsm n` 

~`odhehkçm$ 

‣  Mrmehd Cjhg`~sjo$ Jhd H~mypm z Imrj`s \ês`y _~sm~`kjo moohpd~ gmdmk`s z 

\shi`o~ gmdmk`s$ 

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 18/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣  Cz^`oa$ _`cm~jíd Khdyíe`y Mdnjdh S`|hdmce` n`e n`|ms~mg`d~h n` 

bjsg{ms`$ 

‣  Omjqm \`d`nê$ Gmsjh ^hss` Mdmej~m n` `kpsjnmn$ 

‣  O`d~sh |`s em _oj`dym% em _hoj`~ì ` em Oj~~mnjdmdym n` Shgm $ @gjejh Ghsnjdj

Njs`o~hs$

‣  Ohdjkejh Dmyjhdmee` n`ee` Sjo`soa` !ODS*$ Gmsjh _mrm~mdh _`djhs 

s``msoa`s$ 

‣  N`ehj~~` Mchkmnh$ Dhsgmd A`ofa Njs`o~hs$ 

‣  N`ehj~~`$ _sjdj _pcsmgmdjmd Njs`o~hs$ 

‣  @op`em Pdjr`sj~msjm n` Gm~msÿ$ Gmsoh Bmùdn`y Njs`o~hs$ 

‣  Kmd`~`o$ I`ù ^`i`nhs Smgÿd Eehsom z Gj}p`e Ghsm S " N _hb~{ms` `dkjd``s 

z K`s`d~`$ 

‣  Ksp|h Ohg`q$ Ipmd Kmsoçm ` Jkdmojh Rjeme~m Njs`o~hs n` h|`smojhd` z Omejnmn$ 

‣  Ksp|h _|`o$ Gmsjm n`e Omsg`d Khdyíe`y A`sdídn`y z Md~hdjh ^hgmm

Njs`o~hsm ohg`sojme z Njs`o~hs n` J&N$ 

‣  Kpmsnjm Ojrje$ Ihê Ipmd Epo`dm Ghejdm ^`dj`d~` Ohshd`e$ 

‣  Aj~moaj$ \`~`s Ihd` Cpjd` Gmdmk`s$ 

‣  AS Moo`$ Osj~jdm _js`sm S`|hdmce` ipsçnjoh$ 

‣  Jomsrjjhd$ Me`imdnsh Amsh Njs`o~hs ohg`sojme$ 

‣  Jdnsm$ Nmrjn \ês`y K`s`d~` n` `kpsjnmn$ 

‣  Ghcc``e$ Ihê Epj Ap`s~m Njs`o~hs k`d`sme$ 

‣  Dm~jhdme Jd~j~p~` hb _~mdnmsn mdn ^`oadhehkz !DJ_^*$ Ns$ @emjd` D`{~hd

_`djhs Mnrjhs bhs Jn`d~j~z ^`oadhehkj`$ 

‣  _md Ihê _~m~` Pdjr`sj~z$ Ijg [mzgmd Njs`o~hs n`e n`|ms~mg`d~h ‑Dm~jhdme 

Cjhg`~sjo ^`~ O`d~`s‚$

‣  ^s`n`$ Mebhdh S`|s`m I`b` n` \shnpo~h Rjn`h _p|`srjjÿd$ 

‣  Pdjr`sjnmn Mp~ÿdhgm n` Gmnsjn$ Jkdmojh Kmssh~` \shb`hs$ 

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 19/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣  Pdjr`sjnmn Mp~ÿdhgm n` Gmnsjn$ Imrj`s Hs~`km'Kmsoçm Njs`o~hs n`e M^R_ ‟ 

Ís`m n` ^sm~mgj`d~h n` Rhy z _`ýme`$ 

‣  Pdjr`sjnmn Omseh JJJ n` Gmnsjn$ Smùe _ídoa`y S`jeeh Njs`o~hs n`e KP^J ' Ksp|h Pdjr`sj~msjh n` ^`odhehkçm n` Jn`d~jbjomojÿd$ 

‣  Pdjr`sjnmn n` em \megm n` Ksmd Omdmsjm$ Gjkp`e Ídk`e B`ss`s z Omseh

^smrj`h Jdr`~jkmnhs`$ 

‣  RmdjH_$ Ihsk` Psjh O@H$ 

N`n` JD^@OH ` e` mksmn`o` p ohemchsmojÿd z nj|hdjcjejnmn$

3$3$3 S`mejymojÿd n` `d~s`rj~mEm `d~s`rj~m n`mssheemnm ohd eh `q|`s~h amd `kpjnh `e jkpj`d~` kpjÿd9

m* \s``d~mojÿd z n`~mee` n`e `q|`s~h9 |s``d~mojÿd |sjdoj|me` omg|h n`

mo~pmojÿd z `q|`sj`dojm `d |shz`o~h cjhgê~sjoh$ 

c* Gmnps`y n` em ~`odhehkçm cjhgê~sjom9 k`d`sme z `kùd ~`odhehkçm z

`o~hs`$ S`b`s`dojm m omh n` êqj~h ohdhojnh$ 

o* S`kpemojÿd m|ejomce`9 h|jdjÿd hcs` em e`kjemojÿd z em `~mdnmsjymojhd`

`qj~`d~` z em d`o`jnmn` bp~psm me s`|`o~h$ 

n* Sj`kh z mg`dmym n` em ~`odhehkçm cjhgê~sjom9 jdohdr`dj`d~` m em ahsm

n` em jg|emd~mojÿd m|`o~h n` g`ihsm mg`dmym ohd~she` ohg|`dm~hsjh z

ompm n` em rped`smcjejnmn` n` em ~`odhehkçm cjhgê~sjom$ 

`* S`ohg`dnmojhd`9 c`d`bjojh n` em jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom z

s`ohg`dnmojhd` m ppmsjh jdnp~sjm e`kjemnhs` z Mngjdj~smojhd` \ùcejom$

b* H|jdjÿd n` eh ojpnmnmdh9 |`so`|ojÿd k`d`sme n` eh ojpnmnmdh hcs` em~`odhehkçm cjhgê~sjom$

k* Bp~psh n` em ~`odhehkçm cjhgê~sjom9 rjjÿd hcs` `e bp~psh m g`njh z emskh

|emyh eçd`m n` jdr`~jkmojÿd gí jd~`s`md~` z `o~hs` |shoejr` m em

jg|emd~mojÿd$

3$3$? Jdr`~jkmojÿd opmej~m~jrm 3$<

Ohgh ohg|e`g`d~h m em bm` opmej~m~jrm `~sjo~p `dp |msm mg|ejms em |ms~joj|mojÿd n`

h~sh `|`ojmej~m mç ohgh s`omcms em h|jdjÿd n` h~sh jd~`s`mnh `d em gm~`sjm ` am

s`mejymnh pdm ohdpe~m m bhsh |shb`jhdme` g`njmd~` em |shghojÿd n` n`cm~` `dEjdf`nJd pdm n` em gmzhs` s`n` |shb`jhdme` n`e gpdnh `d Jd~`sd`~$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 20/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Mç n`d~sh n`e ksp|h ―Cjhg`~sjo D`~{hsf " Bhspg‗ ‚ ‟ ksp|h `qj~`d~` ohd md~`sjhsjnmn m

`~m jdr`~jkmojÿd z ohd~j~pjnh |hs ?$<<< |shb`jhdme` n` em cjhg`~sçm ‟ ` amd emdymnh

pdm `sj` n` |s`kpd~m mo`som n` `q|`sj`dojm omh n` êqj~h cmss`sm `d em

jg|e`g`d~mojÿd z bp~psh n` em cjhg`~sçm$ Em ohdoepjhd` me s`|`o~h ` amd pgmnh m

em zm hc~`djnm `d em `d~s`rj~m s`mejymnm$

3$3$> _`jÿd n` ~smcmih

Em bm` n` jdr`~jkmojÿd opmej~m~jrm ` am ohg|e`~mnh ohd pdm `jÿd n` ~smcmih `d em }p`

` amd `q|p`~h em |sjdoj|me` ohdoepjhd` hc~`djnm npsmd~` em jdr`~jkmojÿd |msm p

rmehsmojÿd |hs |ms~` n`e |md`e n` `q|`s~h$

\msm em s`mejymojÿd n` `~m `jÿd n` mdíejj n` ohdoepjhd` ` am `g|e`mnh pdm

a`ssmgj`d~m hb~{ms` !\h{`s Rh~`*% n` bíoje ph }p` |`sgj~` k`~jhdms s`pdjhd` `dksp|h n` bhsgm jd~`smo~jrm `q|ehsmdnh em nj~jd~m h|jdjhd` z |hjcjejnmn` }p` ` rmd

|emd~`mdnh z hc~`dj`dnh m}p`eem ohdjn`smojhd` }p` op`d~md ohd gmzhs mo`|~mojÿd

!ksmojm m pd em p~jejymojÿd n` pdh ~`sgjdme` n` rh~mojÿd jdmeígcsjoh }p` p~jejymd eh

mj~`d~` m em s`pdjÿd |msm mdmejyms omnm m|`o~h m n`cm~js*$

Mn`gí m |ms~js n` em |s`|msmojÿd jdjojme n` eh ~`gm m ~sm~ms `d em s`pdjÿd ` |hjce`

mýmnjs ghnjbjoms h `ejgjdms jdbhsgmojÿd m g`njnm }p` mrmdym `e n`cm~` `d bpdojÿd n` eh

a`oah s`ohkjnh$ @~m omsmo~`sç~jom bmojej~m em k`~jÿd n` s`pdjhd` n` bhsgm njdígjom z

be`qjce` |`sgj~j`dnh hc~`d`s ohdoepjhd` d ~j`g|h s`me$

_` |emd~`mshd pd ~h~me n` =1 ohdoepjhd` }p` bp`shd rmehsmnm z rh~mnm |hs eh

jkpj`d~` q|`s~h9

‣ Imrj`s Om~mýh !Mkdj~jh*

‣ Jhd H~mypm z Imrj`s \ês`y !Mrmehd Cjhg`~sjo*

‣ _`cm~jíd Khdyíe`y !Cz~`oa*

‣ Smùe Mehdh !Omseh JJJ n` Gmnsjn*

‣ Dhsgmd A`ofa !N`ehj~~` Mchkmnh*

‣ Smgÿd Eehsom !Kmd`~`o*

‣ Nmdj`e Op`~m !Jdnsm*

‣ \mceh \ês`y !JD^@OH*

‣ Ihsk` Psjh !RmdjH_*

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 21/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Em ohdoepjhd` hc~`djnm `d `~m `jÿd ` amd ~`djnh `d op`d~m |msm s`bs`dnms

m|`o~h n`~`o~mnh z moemsms n`~`sgjdmnm op`~jhd`$

3$? BM_@ ?9 @EMCHSMOJßD N@E JDBHSG@ N@ OHDOEP_JHD@_ BJDME@_ N@E\SHZ@O^H

Pdm r`y bjdmejymnm em `~m|m ohss`|hdnj`d~` m eh ~smcmih n` jdr`~jkmojÿd `

nhopg`d~md z `q|hd`d em ohdoepjhd` meomdymnm `d `e jdbhsg` bjdme$

@d em `emchsmojÿd n`e |s``d~` jdbhsg` ` s`ohk` `e mdíejj z em ohdoepjhd` n` em

jdr`~jkmojÿd ipd~h ohd em s`ohg`dnmojhd` n` mo~pmojÿd njsjkjnm m eh ppmsjh m em

jdnp~sjm z m em Mngjdj~smojhd` \ùcejom$

3$> BM_@ >9 @EMCHSMOJßD N@ PDM KPÇM \SÍO^JOM NJSJKJNM M P_PMSJH_@d |msme`eh m em s`mejymojÿd n`e `~pnjh hcs` `e djr`e n` n`mssheeh z ohdbjmdym n` em

~`odhehkçm cjhgê~sjom z m|shr`oamdnh eh s`pe~mnh n`e gjgh ` am `emchsmnh pdm

kpçm njrpekm~jrm ohd em jd~`dojÿd n` nms m ohdho`s em njb`s`d~` ~`odhehkçm cjhgê~sjom

p njb`s`d~` ph z m|ejomojhd` eh sj`kh m eh }p` `~íd `q|p`~m z n`mssheems pd

om~íehkh n` cp`dm |sío~jom z s`ohg`dnmojhd`$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 22/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 33 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

? JD^SHNPOOJßD M EM_ ^@ODHEHKÇM_

CJHGÊ^SJOM_

?$= MD^@O@N@D^@_

Em cjhg`~sçm ` pd gê~hnh n` s`ohdhojgj`d~h n` |`shdm cmmnh `d p omsmo~`sç~jom

bjjheÿkjom h n` ohg|hs~mgj`d~h$ _` ~sm~m n` pd |sho`h jgjems me }p` amcj~pmeg`d~`

s`mejym `e `s apgmdh s`ohdhoj`dnh ` jn`d~jbjomdnh m p ohdkêd`s` |hs p m|`o~h

bçjoh p rhy p bhsgm n` mdnms `~o$

@d em mo~pmejnmn em ~`odhehkçm am |`sgj~jnh mp~hgm~jyms z |`sb`oojhdms `~h |sho`h n`

s`ohdhojgj`d~h cjhgê~sjoh n` bhsgm }p` ~j`d`d gpe~j~pn n` m|ejomojhd` z bjdmejnmn` ‟z

`|`ojmeg`d~` m}p`eem s`emojhdmnm ohd em `kpsjnmn‟ mekpdm n` em opme` ``q|hdnsíd m eh emskh n`e |s``d~` jdbhsg`$

Eh |sjg`sh md~`o`n`d~` n` eh }p` ` ~j`d` s`b`s`dojm hcs` em cjhg`~sçm nm~md n`

amo` gí n` gje mýh `d Oajdm nhdn` eh mebms`sh ohg`dymshd m jdoepjs p ap`eem

nmo~jems` `d eh |shnpo~h }p` s`mejymcmd ohgh çgcheh n` nj~jdojÿd h bjsgm eh }p` e`

|`sgj~çm njb`s`dojms` n`e s`~h$

_jd `gcmskh dh bp` am~m bjdme` n`e jkeh QJQ opmdnh Me|ahd` C`s~jeehd ‟md~sh|ÿehkh

bsmdoê }p` ~smcmiÿ |msm em |hejoçm‟ ohg`dyÿ m nms m em cjhg`~sçm `e omsío~`s n` oj`dojm

|shb`jhdmejymdnh p |sío~jom$ Cmmcm p ~`hsçm `d }p` pdm oj`s~m ohgcjdmojÿd n`

g`njnm n`e op`s|h apgmdh `sm jdrmsjmce` `d `e ~j`g|h eh }p` |`sgj~jÿ nms hepojÿd me

|shce`gm n` jn`d~jbjoms m eh osjgjdme` ohdrjo~h m eh emskh n` ~hnm p rjnm$

@e j~`gm n` C`s~jeehd h ―Md~sh|hg`~sçm‗  }p` jdoepçm `d~s` h~sm g`njnm ohgh `e emskh

z mdoah n` em omc`ym h em ehdkj~pn n`e |j` jy}pj`snh z n`e md~`csmyh ` ohg`dyÿ m p~jejyms

ohgùdg`d~` m eh emskh n` ~hnh `e gpdnh$ _jd `gcmskh p `b`o~jrjnmn ` |ph `d npnm me

|s``d~ms` mekpdh |shce`gm `d `e ph n` njb`s`d~` g`njnm z `|`ojmeg`d~` |hs em

njbjope~mn` `d em njb`s`dojmojÿd n` pi`~h `q~s`gmnmg`d~` jgjems` ohgh eh k`g`eh$

@~m n`mos`nj~mojÿd ajyh }p` _js @n{msn A`dsz Jd|`o~hs K`d`sme n` em \hejoçm n`

C`dkmem cpom` h~sm ~êodjom z ` jd~`s`m` |hs em jdr`~jkmojhd` n` _js Bsmdoj

Kme~hd `e opme p~jejymcm em ap`eem nmo~jems ohgh gê~hnh n` jn`d~jbjomojÿd$ \sjg`sh `d

C`dkmem z |h~`sjhsg`d~` `d Ehdns` !=:<=* _js @n{msn A`dsz `~mce`ojÿ p hbjojdm n`

ap`eem nmo~jems `qj~hmg`d~` z ohdjkpjÿ sí|jnmg`d~` em mo`|~mojÿd n` em ohgpdjnmn m

djr`e gpdnjme$ Mç eh gê~hnh p~jejymnh `d hsj`d~` n`n` jkeh m~sí bp`shd

jd~shnpojnh qj~hmg`d~` d hoojn`d~`$

Zm m ohgj`dyh n` eh mýh ;< _a`mshd Amgje  pdm `g|s`m n` [mee _~s``~ jd~meÿJn`d~jgm~  pd j~`gm n` jn`d~jbjomojÿd mp~hgí~jom cmmnh `d ap`eem nmo~jems }p` ` p~jejyÿ

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 23/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

|msm `e ohd~she n` moo`h bçjoh m jd~memojhd` j`dnh em |sjg`sm hepojÿd cjhgê~sjom n`

ph ohg`sojme$

N`n` `d~hdo` ` am jdr`~jkmnh gpoah `d `e omg|h n` em cjhg`~sçm n`~`o~ídnh`gpe~j~pn n` smkh cjhgê~sjoh njb`s`d~` m em ap`eem nmo~jems$

M nçm n` ahz `e mrmdo` `d `e ohdhojgj`d~h n` njoah smkh z p ohss`|hdnj`d~`

r`d~mim ` jdohdr`dj`d~` pdjnh m em |hjcjejnmn` }p` hbs`o` em ~`odhehkçm amo`d }p`

em cjhg`~sçm ` ohdjn`s` pdh n` eh `e`g`d~h oemr` `d opmd~h m em ~êodjom n`

jn`d~jbjomojÿd z `kpsjnmn `d `e bp~psh$

?$3 OHDO@\^H_ OEMR@

Opmdnh ` mchsnm em cjhg`~sçm ` amo` s`b`s`dojm m pdm ~`odhehkçm |pd~`sm hcs` emopme dh gpoam k`d~` ~j`d` ohdhojgj`d~h |s`ojh$ @ |hs `eeh }p` ` ohdr`dj`d~`

`ýmems z moemsms m}p`eeh ohdo`|~h }p` ` ohdjn`smd ``dojme` |msm em ohg|s`djÿd

n`e bpdojhdmgj`d~h n` eh j~`gm cjhgê~sjoh$ M ohd~jdpmojÿd ` jn`d~jbjomd pdm `sj`

n` ohdo`|~h cíjoh z ohgpd` m ~hnm em ~`odhehkçm cjhgê~sjom$

?$3$= Ohg|hd`d~` n` pd j~`gm cjhgê~sjoh

Eh |sjdoj|me` ohg|hd`d~` }p` ` |p`n`d jn`d~jbjoms `d pd j~`gm cjhgê~sjoh hd9

‣  _`dhs9 @ `e nj|hj~jrh }p` om|~psm eh smkh h omsmo~`sç~jom cjhgê~sjom$

N`|`dnj`dnh n` eh smkh cjhgê~sjoh }p` ` }pj`smd s`kj~sms z ohdr`s~js `d

nm~h njkj~me` ` d`o`j~msíd eh `dhs` mn`opmnh$ M ohd~jdpmojÿd `

gp`~sm pdm ~mcem ohd mekpdh n` eh njb`s`d~` ~j|h n` `dhs` p~jejymnh |msm

mekpdm n` em ~`odhehkçm cjhgê~sjom }p` ` ~sm~msíd gí mn`emd~`$

^mcem =9 _`dhs` `kùd ~j|h n` ~`odhehkçm cjhgê~sjom

^`odhehkçm Nj|hj~jrh n` om|~psm

Ap`eem nmo~jems \`sjbêsjoh n` `osj~hsjh ~msi`~m \OGOJM h e`o~hsjd~`ksmnh$

S`ohdhojgj`d~h n` rhy Gjosÿbhdh h ~`eêbhdh

S`ohdhojgj`d~h bmojme Oígmsm n` rjn`h h oígmsm jd~`ksmnm `d pd \O

S`ohdhojgj`d~h n` jsj Oígmsm n` jdbsmsshih

S`ohdhojgj`d~h n` s`~jdm Pdjnmn |sh|j`~msjm n` `osj~hsjh h n` |ms`n

S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh Pdjnmn |sh|j`~msjm n` |ms`n h n` |j`

S`ohdhojgj`d~h n` bjsgm ^mce`~m n` bjsgm |pd~`sh `dhs me ghrjgj`d~h

S`ohdhojgj`d~h n` `osj~psm n` ~`oemnh ^`oemnh

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 24/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣  S`|hj~hsjh9 @ em cm` n` nm~h nhdn` ` megmo`dmd em |emd~jeem cjhgê~sjom

jdosj~m |msm p ohg|msmojÿd$ N`c`sçm |sh~`k`s` `d pd ís`m bçjom `kpsm mç

ohgh `s ojbsmnm z bjsgmnm njkj~meg`d~ $

‣  Mekhsj~gh9 Pmnh  |msm em `q~smoojÿd n` omsmo~`sç~jom !|sho`mgj`d~h* z p

ohg|msmojÿd$ Em ~s` bpdojhd` cíjom mhojmnm m `eeh hd9 s`kj~sh

r`sjbjomojÿd jn`d~jbjomojÿd$

?$3$3 S`kj~sh `d `e j~`gm

@d em gmzhs |ms~` n` eh omh eh ppmsjh n`c`d s`kj~sms p jn`d~jnmn `d `e j~`gm

md~` n` amo`s ph n` êe$ @~h ` s`mejym |hs g`njh n` em hc~`dojÿd n` eh |msíg`~sh

cjhgê~sjoh$ @~` |sho`h ` `e n` s`kj~sh z ` ohg|hd` n` ~s` bm` nj~jd~m9

‣  Om|~psm9 _` s`ohk`d eh |msíg`~sh cjhgê~sjoh$ @~h |msíg`~sh rmsçmd `d

omnm ~`odhehkçm ohgh ` hc`srm `d em jkpj`d~` ~mcem$

^mcem 39 \msíg`~sh ohdjn`smnh `d omnm ~`odhehkçm cjhgê~sjom

^`odhehkçm Gp`~sm cjhgê~sjom

Ap`eem nmo~jems Jgmk`d h gjdpojm n` em ap`eem nmo~jems

S`ohdhojgj`d~h n` rhy Ksmcmojÿd n` rhy

S`ohdhojgj`d~h bmojme Jgmk`d bmojme

S`ohdhojgj`d~h n` jsj Jgmk`d n`e jsj

S`ohdhojgj`d~h n` s`~jdm Jgmk`d n` em s`~jdm

S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh Jgmk`d `d ?'N n` em |ms~` p|`sjhs z em~`sme n`gmdh z n`nh

S`ohdhojgj`d~h n` bjsgm Jgmk`d n` em bjsgm z s`kj~sh n` g`njnms`emojhdmnm ohd em njdígjom

S`ohdhojgj`d~h n` `osj~psm n` ~`oemnh S`kj~sh n` em ~`oem |pemnm z s`kj~sh n`g`njnm s`emojhdmnm ohd em njdígjom

‣  \sho`mgj`d~h9 _` k`d`sm pdm |emd~jeem ohd em omsmo~`sç~jom |`shdme` n` eh

|msíg`~sh om|~psmnh$ Em jkpj`d~` ~mcem gp`~sm eh njb`s`d~` smkh

`q~smçnh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 25/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 30 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

^mcem ?9 Omsmo~`sç~jom `q~smçnm `d omnm ~êodjom cjhgê~sjom

^`odhehkçm Omsmo~`sç~jom `q~smçnm

Ap`eem nmo~jems Pcjomojÿd z njs`oojÿd n`e bjdme n` em gjdpojmh bhsgm n` em ap`eem

S`ohdhojgj`d~h n` rhy Bs`op`dojm omn`dojm z npsmojÿd n`e |m~sÿdrhome$

S`ohdhojgj`d~h bmojme\hjojÿd s`em~jrm z bhsgm n` em dmsjy |hjojÿdn` em gmdnçcpem

S`ohdhojgj`d~h n` jsj _psoh z `~sçm n`e jsj

S`ohdhojgj`d~h n` s`~jdm \m~shd` n` eh rmh mdkpçd`h n` em s`~jdm

S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdhMe~psm z mdoapsm n` eh ap`h z em

ms~jopemojhd` n` eh n`nh z n` em gmdh

S`ohdhojgj`d~h n` bjsgmR`ehojnmn hsn`d n` eh ~smyh |s`jÿd zm|msj`dojm n` em bjsgm

S`ohdhojgj`d~h n` `osj~psm n` ~`oemnh_`op`dojm n` ~`oem z |mpm `d~s`|pemojhd`

‣  Jdosj|ojÿd9 Em |emd~jeem |sho`mnm ` kpmsnm `d pd g`njh n` megmo`dmgj`d~h

mn`opmnh$ Pdm r`y }p` em jdosj|ojÿd `~í ohg|e`~m `e j~`gm |p`n` mp~`d~joms

m em |`shdm g`njmd~` `e ph n` `~m |emd~jeem$ \msm `eeh ` jkp` `e

|sho`njgj`d~h }p` ` `ýmem `d `e jkpj`d~` `}p`gm9

Ksíbjoh =9 \sho`h n` jdosj|ojÿd `d `e s`kj~sh

Jn`d~jnmn n` ppmsjh

_`dhs \s ' sho mgj`d~h

@q~smo~hs n` omsmo~`sç~jom

K`d`smnhs n` |emd~jeem\emd~jeem

kpmsnmnm

Jdbhsgmojÿd

cjhgê~sjom

\emd~jeem n`e ppmsjh

Jdosj|ojÿd

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 26/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 32 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

?$3$? Mp~`d~jomojÿd

Em mp~`d~jomojÿd ` `e |sho`h g`njmd~` `e opme ` om|~psm pdm gp`~sm cjhgê~sjom n`ejdnjrjnph |msm p ohg|msmojÿd ohd em |emd~jeem zm s`kj~smnm$ @~m mp~`d~jomojÿd |p`n`s`mejyms` n` nh gmd`sm njb`s`d~` jn`d~jbjomojÿd z r`sjbjomojÿd }p` ohdrj`d` nj~jdkpjs9

‣  Jn`d~jbjomojÿd9 Ohdj~` `d em ohg|msmojÿd n` em gp`~sm s`ohkjnm n`e ppmsjh

bs`d~` m pdm cm` n` nm~h n` smkh cjhgê~sjoh s`kj~smnh |s`rjmg`d~`$ Dh `

|s`ojm n` n`oemsmojÿd jdjojme n` p jn`d~jnmn |hs |ms~` n`e ppmsjh ` n`ojs `e

ùdjoh nm~h }p` ` p~jejym ` em gp`~sm cjhgê~sjom s`ohkjnm `d `e ghg`d~h n`

ph jd m|hzh n` pd s`kj~sh md~`sjhs dj pd dhgcs` n` ppmsjh h opme}pj`s h~sh

~j|h n` s`ohdhojgj`d~h$ @~` gê~hnh s`}pj`s` n` pd |sho`h n` oíeopeh ohg|e`ih

|p`~h }p` ` am n` ohg|msms `~m gp`~sm ohd omnm pdm n` em md~`sjhsg`d~`

megmo`dmnm |msm cpoms pdm ohjdojn`dojm$ @e |sho`h n`mssheemnh ` `ejkpj`d~`9

Ksíbjoh 39 \sho`h n` jn`d~jbjomojÿd

 

`d em mp~`d~jomojÿd

‣  R`sjbjomojÿd9 @d `~` omh jd `gcmskh `e |sjg`s |mh n`e |sho`h ` em

jn`d~jbjomojÿd n`e jdnjrjnph g`njmd~` pd dhgcs` n` ppmsjh ~msi`~m h mekùd h~sh

gê~hnh$ N` `~` ghnh ` `e`oojhdm n` em cm` n` nm~h `e |m~sÿd }p`md~`sjhsg`d~` ` am s`kj~smnh |msm njoah ppmsjh$ \h~`sjhsg`d~` `e j~`gm

Jn`d~jbjomojÿd

_`dhsJdbhsgmojÿd

cjhgê~sjom

\s ' sho`mgj`d~h

@q~smo~hs n` omsmo~`sç~jom

K`d`smnhs n` |emd~jeem

\emd~jeem

Ohjdojn`dojm

!d ohjdojn`dojm*

Jn`d~jbjomojÿd n`e

ppmsjh h dh

\emd~jeem

kpmsnmnm

^hnm em |emd~jeem

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 27/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

s`ohk` em omsmo~`sç~jom cjhgê~sjom z em ohg|msm ohd em }p` ~j`d` megmo`dmnm$ @

pd |sho`h jg|e` me ~`d`s }p` ohd~sm~ms ùdjomg`d~` nh gp`~sm `d `e }p` `e

s`pe~mnh ` |hj~jrh h d`km~jrh9

Ksíbjoh ?9 \sho`h n` r`sjbjomojÿd

 

`d em mp~`d~jomojÿd

?$3$> ^hgm n` n`ojjhd`

@e |sho`h n` ~hgm n` n`ojjhd` `d em cjhg`~sçm ohd~m n` opm~sh `~m|m9

‣  Cù}p`nm n` ohjdojn`dojm9 Ohg|msmojÿd n` em gp`~sm cjhgê~sjom |msm

n`~`sgjdms `e ksmnh n` jgjej~pn h ohss`emojÿd `d~s` `eem$

‣  Oíeopeh n` pdm |pd~pmojÿd9 \msm em ohg|msmojÿd n` nm~h cjhgê~sjoh `

omeopem pd rmehs dpgêsjoh }p` jdnjom `e ksmnh n` jgjej~pn h ohss`emojÿd `d~s` em

gp`~sm$ Eh gê~hnh n` r`sjbjomojÿd ~smnjojhdme` !ohd~sm`ým \JD `~o$* hd

cjdmsjh ` n`ojs hbs`o`d pdm s`|p`~m |hj~jrm h d`km~jrm$ @~` dh ` `e omh

`d em gmzhsçm n` j~`gm cjhgê~sjoh$ Em gmzhs |ms~` eh j~`gm cjhgê~sjoh` cmmd `d mekhsj~gh n` cù}p`nm n` ohjdojn`dojm }p` k`d`smd pdm

R`sjbjomojÿd

_`dhsJdbhsgmojÿd

cjhgê~sjom\s ' sho mgj d~h

@q~smo~hs n` omsmo~`sç~jom

K`d`smnhs n` |emd~jeem

\emd~jeem

Ohjdojn`dojm

R`snmn`sh(Bmeh

Jn`d~jnmn n`oemsmnm

\emd~jeem

kpmsnmnm

\emd~jeem n`oemsmnm

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 28/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 31 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

|pd~pmojÿd$ @~m |pd~pmojÿd s`|s``d~m `e ksmnh n` ohss`emojÿd `d~s` em gp`~sm

m mp~`d~joms z em n` s`kj~sh$

‣  Ohg|msmojÿd ohd `e pgcsme `~mce`ojnh9 @e pgcsme ` pd dùg`sh |s`n`bjdjnhdhsgmeg`d~` |hs `e mngjdj~smnhs n`e j~`gm cjhgê~sjoh }p` `~mce`o` `e ksmnh

n` ohss`emojÿd d`o`msjh |msm }p` pdm gp`~sm ` ohdjn`s` jgjems m h~sm$ _j em

|pd~pmojÿd s`pe~md~` n` em ohg|msmojÿd n` gp`~sm p|`sm `e pgcsme em

gp`~sm ` ohdjn`smd ohjdojn`d~` mpd}p` em gp`~sm `d ç dh `md

d`o`msjmg`d~` jnêd~jom$ @~h ` n`c` m em jdoepjÿd `d `e mdíejj n` em

|hjce` n`bjoj`dojm `d em om|~psm n` em gp`~sm$

‣  N`ojjÿd9 S`pe~mnh n` em ohg|msmojÿd `d~s` em |pd~pmojÿd z `e pgcsme$ Em

n`ojjhd` }p` |p`n` ~hgms pd j~`gm cjhgê~sjoh jdoepz`d9 ohjdojn`dojm dhohjdojn`dojm ` jdohdoepz`d~` !`e j~`gm dh ` om|my n` n`~`sgjdms j em gp`~sm

s`ohkjnm ` ohjdojn`d~` h dh*$ N`|`dnj`dnh n`e j~`gm cjhgê~sjoh

jg|e`g`d~mnh pdm ohjdojn`dojm |p`n` |`sgj~js `e moo`h pdm dh ohjdojn`dojm

s`~sjdkjseh z pdm gp`~sm jdohdoepz`d~` |p`n` hejoj~ms me ppmsjh h~sm gp`~sm$

?$3$0 Bpdojhdmgj`d~h n`e j~`gm

@e bpdojhdmgj`d~h z bjmcjejnmn n`e j~`gm ` |p`n` rmehsms g`njmd~` pdm `sj` n` ~mm9

‣  ^mm n` `sshs n` mn}pjjojÿd !Bmjeps` ^h Mn}pjs` sm~` *9 \sh|hsojÿd n` homjhd`

`d em }p` `e j~`gm dh ` om|my n` om|~psms pdm gp`~sm n` omejnmn pbjoj`d~`

|msm `s |sho`mnm$

‣  ^mm n` `sshs n` s`kj~sh !Bmjeps` ^h @dshe sm~`*9 \sh|hsojÿd n` em |hcemojÿd 

|msm em opme `e j~`gm cjhgê~sjoh dh ` om|my n` k`d`sms gp`~sm n` omejnmn

pbjoj`d~`$

‣  ^mm n` bmeh d`km~jrh !Bme` S`i`o~jhd Sm~`*9 \sh|hsojÿd n` homjhd` `d em

}p` `e j~`gm dh rjdopem m pd jdnjrjnph ohd p |sh|jm |emd~jeem cjhgê~sjom

`qj~`d~` `d `e s`kj~sh$

‣  ^mm n` bmeh |hj~jrh !Bme` Moo`|~mdo` Sm~` *9 \sh|hsojÿd n` homjhd` `d em

}p` pd j~`gm rjdopem `ssÿd`mg`d~` m pd jdnjrjnph ohd em jdbhsgmojÿd

cjhgê~sjom qj~`d~` n` h~sm |`shdm$

?$? ^J\H_% ^ÊODJOM_ Z ^@ODHEHKÇM_ M\EJOMNM_ M EM CJHG@^SÇM

Em ~`odhehkçm cjhgê~sjom ` n`bjd`d ohgh gê~hnh mp~hgí~joh p~jejymnh |msm

s`ohdho`s m |`shdm hcs` em cm` n`e mdíejj n` p omsmo~`sç~jom bçjom h n`

ohg|hs~mgj`d~h$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 29/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

N`|`dnj`dnh n` em ~êodjom cjhgê~sjom `g|e`mnm eh |msíg`~sh ohdjn`smnh hd

njb`s`d~`9 psoh n` em ap`eem nmo~jems k`hg`~sçm n` em gmdh jgmk`d bmojme `~o$ N` `~h

|msíg`~sh ` `q~sm` pd |m~sÿd ùdjoh |msm omnm |`shdm }p` `sí p~jejymnh |msm

|h~`sjhs` ohg|msmojhd`$

Bpdnmg`d~meg`d~` ` nj~jdkp`d nh ksp|h n` ~`odhehkçm cjhgê~sjom `d bpdojÿd n` em

g`~hnhehkçm p~jejymnm9 m}p`eem }p` mdmejymd omsmo~`sç~jom bjjheÿkjom n` em |`shdm z

m}p`eem }p` mdmejymd p ohg|hs~mgj`d~h$

?$?$= ^`odhehkçm cjhgê~sjom bjjheÿkjom

Em ~`odhehkçm cjhgê~sjom bjjheÿkjom ` omsmo~`sjymd |hs ohdjn`sms |msíg`~sh

n`sjrmnh n` em g`njojÿd njs`o~m n` mekùd smkh `~sjo~mg`d~` bçjoh n`e op`s|h apgmdh m

em ahsm n` jn`d~jbjoms |`shdm$

Ap`eem nmo~jems

Em jn`d~jbjomojÿd cmmnm `d ap`eem nmo~jems ` em gí md~jkpm n` em ~êodjom cjhgê~sjom z

am jnh p~jejymnm `d pd ksmd dùg`sh n` m|ejomojhd` n`cjnh m }p` em gmzhsçm n` em

|hcemojÿd ~j`d` ap`eem nmo~jems` ùdjom ` jdme~`smce`$

@ `e smkh cjhgê~sjoh gí p~jejymnh |msm mp~`d~jomojÿd z ~j`d` em gmzhs kmgm n`

~`odhehkçm n` om|~psm ohd nj~jd~m omsmo~`sç~jom n` bpdojhdmgj`d~h$ Mjgjgh ~j`d`

ohgh r`d~mim p me~m ~mm n` |s`ojjÿd z }p` amcj~pmeg`d~` eh ppmsjh ~j`d`dohdhojgj`d~h pbjoj`d~` hcs` p p~jejymojÿd$

@qj~`d nh ~j|h n` ~êodjom n` cù}p`nm n` ohjdojn`dojm `d~s` gp`~sm n` ap`eem

nmo~jems9

‣  Cmmnm `d gjdpojm9 @~m ~êodjom cmm p g`omdjgh n` mp~`d~jomojÿd `d em

―gjdpojm‗ ` n`ojs `d n`~`sgjdmnm bhsgm bíojeg`d~` jn`d~jbjomce` `qj~`d~`

`d em ap`eem nmo~jems$ Mç ` s`kj~sm `e ~j|h n` gjdpojm z p |hjojÿd n`d~sh n` em

ap`eem `~mce`oj`dnh pdm `sj` n` g`njojhd`$ N` `~m bhsgm `e ghn`eh h

|emd~jeem ohss`|hdnj`d~` m omnm ppmsjh ` pd `}p`gm `d `e }p` ` jdnjomd em

gjdpojm }p` ` amd n` n`~`o~ms p |hjojÿd z em nj~mdojm }p` `|msmd pdm

n` h~sm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 30/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Jep~smojÿd =9 Gjdpojm n` pdm ap`eem nmo~jems

Dh hc~md~` `qj~`d mekpdm njbjope~mn` mhojmnm m `~` gê~hnh$ \hs pd emnh

dh ` `dojeeh `q~sm`s n` bhsgm |s`ojm em g`dojhdmnm gjdpojm opmdnh em

omejnmn n` em gp`~sm dh ` cp`dm$ \hs h~sh emnh dh ` ~j`d` `d op`d~m `e |m~sÿd

kehcme n` os`~m z psoh$

‣  Cmmnm `d ohss`emojÿd9 G`njmd~` em p~jejymojÿd n` `~m ~êodjom ` mdmejym `e

|m~sÿd kehcme `kpjnh |hs em ap`eem nmo~jems ` n`ojs `e `}p`gm k`d`sme n`e

ohdipd~h n` em ap`eem `d epkms n` em gjdpojm$ @~m ~êodjom dh s`}pj`s` n` pd

s`kj~sh ~md |s`ojh |`sh p |sjdoj|me jdohdr`dj`d~` ` }p` ` r` mb`o~mnm |hs em

~smemojÿd z em sh~mojÿd n` em jgmk`d$

Jep~smojÿd 39 ^êodjom n` ohss`emojÿd

@e |`}p`ýh ~mgmýh n` eh s`o`|~hs` p bíoje jd~`ksmojÿd !|pnj`dnh `s jdoepjnh n`

bhsgm `dojeem `d ~`oemnh* z p pmcjejnmn mç ohgh eh cmih oh~` mhojmnh m eh

gjgh ohdrj`s~`d m em ap`eem nmo~jems `d pdm ~`odhehkçm gpz ù~je |msm p jg|emd~mojÿd `d

hbjojdm z ahkms`$

\msme`emg`d~` z n` gmd`sm jdn`|`dnj`d~` m em ~êodjom p~jejymnm |msm em cù}p`nm n`

ohjdojn`dojm qj~`d njb`s`d~` ~j|h n` `dhs`9

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 31/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣  _`dhs` ÿ|~joh9 _hd eh gí ohgpd` `d `e g`somnh z op`d~md ohd pdm

p|`sbjoj` n` osj~me nhdn` ` ohehom `e n`nh e`d~` pd |sjgm pdm bp`d~` n` epy

z pdm oígmsm$ Em oígmsm ` cmm `d ~`odhehkçm OON !Oamsk`'Ohp|e`n N`rjo` *

h OGH_ !Ohg|e`g`d~msz G`~me Hqjn` _`gjohdnpo~hs * j`dnh mgch ~j|h n`

jejojh z jgjems` `d opmd~h m `djcjejnmn$ Em oígmsm ohd~m n` rmsjh oj`d~h n`

gje` n` |çq`e` j~pmnh `d bhsgm n` gmeem }p` opmdnh ` r`d `~jgpemnh ohd

em epy }p` jdojn` hcs` `eeh megmo`dmd pdm |`}p`ým omskm n` `e`o~sjojnmn

~smd|hs~mdnh m eh ojsopj~h n` |sho`mgj`d~h n` em oígmsm em gp`~sm s`ojcjnm$

‣  _`dhs` om|moj~jrh9 @~íd ohg|p`~h `d em p|`sbjoj` n` pd ojsopj~h

jd~`ksmnh n` jejohdm }p` nj|hd` n` pdm gmeem n` om|moj~hs` }p` gjn`d em

njb`s`dojm n` rhe~mi` `d `e ohd~mo~h ohd em p|`sbjoj` nmo~jems$

@~h `dhs` ÿeh ~smcmimd ohd |j`e` mdm dhsgme` zm }p` dh hd

h|`sm~jrh opmdnh ` p~jejymd hcs` |j`e` ohd yhdm npsm omeeh h ojom~sjo`$ Em

apg`nmn em ksmm h `e |herh ~mgcjêd |p`n`d mb`o~ms m p bpdojhdmgj`d~h$  

S`ohdhojgj`d~h bmojme

@e s`ohdhojgj`d~h bmojme ` pdm ~êodjom g`njmd~` em opme ` s`ohdho` m pdm |`shdm m

|ms~js n` pdm jgmk`d h bh~hksmbçm$ \msm `eeh ` p~jejymd |shksmgm n` oíeopeh }p` mdmejymd

jgík`d` n` sh~sh apgmdh$ @e |sho`h n` s`kj~sh npsm `d~s` 3< z ?< `kpdnh

~j`g|h `d `e opme ` ~hgmd rmsjm bh~hksmbçm n` em omsm$ Jn`meg`d~` em `sj` n` jgík`d`n`c`sçm jdoepjs njb`s`d~` ídkpeh z `q|s`jhd` bmojme` |msm |`sgj~js pdm cù}p`nm n`

ohjdojn`dojm gí |s`ojm$

Jep~smojÿd ?9 S`ohdhojgj`d~h bmojme

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 32/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?3 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Eh opm~sh gê~hnh |sjdoj|me` `g|e`mnh |hs eh |shr``nhs` n` s`ohdhojgj`d~h bmojme

` n`osjc`d m ohd~jdpmojÿd9

=$ @jk`dbmo` 9 \hnsçm ~smnpojs` ohgh #omsm n` pdh gjgh#$ @ pdm ~`odhehkçm|m~`d~mnm `d `e Gmmoap`~~ Jd~j~p~` hb ^`oadhehkz !GJ^* }p` p~jejym jgík`d`

cjnjg`djhdme` `d `omem n` ksj` }p` s`|s``d~md omsmo~`sç~jom nj~jd~jrm n`

pdm jgmk`d bmojme$

3$ Mdíejj n` omsmo~`sç~jom ehome`9 @ em ~`odhehkçm gí p~jejymnm `d `e

s`ohdhojgj`d~h bmojme$ @~m ~`odhehkçm `~í s`emojhdmnm ohd @jk`dbmo`  |`sh `

om|my n` mnm|~ms` g`ihs m eh omgcjh `d em m|msj`dojm h m|`o~h bmojme

!hdsj`dnh bspdoj`dnh `e o`ýh `~o$*$ @e mdíejj n` omsmo~`sç~jom ehome` !Ehome 

B`m~ps` Mdmezj * p~jejym nho`dm n` omsmo~`sç~jom n` em njb`s`d~` s`kjhd` n`em omsm z ~mgcjêd jdohs|hsm em pcjomojÿd s`em~jrm n` `~h smkh$ Em |`}p`ým

omsmo~`sç~jom `q~smçnm hd ceh}p` n` ohd~spoojÿd z ~md~h `e ~j|h n` ceh}p`

ohgh p nj|hjojÿd ` p~jejymd |msm jn`d~jbjoms z(h r`sjbjoms$

?$ D`psme D`~{hsf Gm||jdk 9 @d `~` gê~hnh em s`n` d`pshdme` `g|e`md pd

mekhsj~gh |msm n`~`sgjdms em jgjej~pn n` em omsmo~`sç~jom ùdjom n` em gp`~sm

mn}pjsjnm z n` em hc~`djnm `d `e s`kj~sh p~jejymdnh ~md~m |ms~` n` em jgmk`d

bmojme ohgh `m |hjce`$

>$ \sho`mgj`d~h mp~hgí~joh n` em omsm !Mp~hgm~jo Bmo` \sho`jdk *9 @ pdm~`odhehkçm gí spnjg`d~msjm }p` p~jejym em sm~jh n` nj~mdojm `d~s` em

omsmo~`sç~jom n` bíoje mn}pjjojÿd ~me` ohgh eh hih em |pd~m n` em dmsjy z em

ohgjpsm n` em chom$ Mpd}p` `d k`d`sme dh ` ~md shcp~h ohgh eh n`gí

gê~hnh em MB\ |p`n` `s gí `bjomy opmdnh em om|~psm n` jgmk`d ` bshd~me `d

ohdnjojhd` n` |hom epy$

M njb`s`dojm n` h~sh j~`gm cjhgê~sjoh `e s`ohdhojgj`d~h bmojme |p`n` `s p~jejymnh

|msm em rjkjemdojm amcj~pmeg`d~` g`njmd~` oígmsm n` rjn`h$ @ |hs `eeh }p` `d `~`

omh dh ` d`o`msjm pdm jdr`sjÿd `d nj|hj~jrh `|`oçbjoh$

Pdh n` eh |sjdoj|me` jdohdr`dj`d~` }p` |s``d~m `~m ~êodjom ` p `omm s`j~`dojm

me bsmpn` |p`~h }p` pdm |`shdm |p`n` ghnjbjoms rjpmeg`d~` p omsm n` gmd`sm

`dojeem ohgh |hs `i`g|eh p~jejymdnh pdm kmbm n` he h n`iídnh` os`o`s em cmscm$

Mjgjgh n`c` ohdjn`sms` }p` `e sh~sh n` em |`shdm rmsçm ohd em `nmn$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 33/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

S`ohdhojgj`d~h n` jsj

@e jsj ` em |ms~` |jkg`d~mnm n`e hih }p` shn`m em |p|jem$ @~` gê~hnh p~jejym em

omsmo~`sç~jom n`e jsj apgmdh ohd `e bjd n` r`sjbjoms em jn`d~jnmn n` pd jdnjrjnph$

Eh |m~shd` n` jsj rj`d`d gmsomnh n`n` `e dmojgj`d~h z smsm r`y omgcjmd$ _hd

`q~s`gmnmg`d~` ohg|e`ih ohd~j`d`d pdm ksmd omd~jnmn n` jdbhsgmojÿd z ~j`d`d gí n`

3<< |sh|j`nmn` ùdjom$

@e `omd`mnh n` jsj ` ee`rm m omch g`njmd~` pdm oígmsm n` jdbsmsshih `|`ojmejymnm

  ‟j~pmnm |hs eh k`d`sme gpz o`som n` em |`shdm‟ }p` jepgjdm `e hih s`mejymdnh pdm

bh~hksmbçm n` me~m s`hepojÿd$ @~` |sho`h npsm ÿeh pdh h nh `kpdnh z |sh|hsojhdm

eh n`~mee` n`e jsj }p` ` ehomejymd s`kj~smd z megmo`dmd |msm s`mejyms bp~psm

r`sjbjomojhd`$

@ jg|hs~md~` `ýmems }p` dh `qj~` djdkùd sj`kh |msm em mepn zm }p` me hc~`d`s` em

gp`~sm g`njmd~` pdm oígmsm n` jdbsmsshih dh amz |`ejksh n` }p` `e hih s`pe~` nmýmnh

`d `e |sho`h$

Pdm r`y ~hgmnm em gp`~sm ` ``dojme em ohss`o~m pcjomojÿd z mjemgj`d~h n`e jsj `d em

jgmk`d zm }p` `d omh n` dh s`mejyms` mn`opmnmg`d~` em jd~`sb`s`dojm k`d`smnm

|hs `e `qo`h n` jdbhsgmojÿd }p` |shrhomd em |`~mým s`be`ih z em |p|jem |hnsçmd

s`pe~ms `d |shce`gm `d `e bpdojhdmgj`d~h n`e j~`gm$

\hs `eeh z |s`rjmg`d~` m em ohg|msmojÿd n` em gp`~sm ` s`mejym pd |s`'|sho`mgj`d~h

n` em jgmk`d ‟ amcj~pmeg`d~` m|ejomojÿd n` bje~sh z gíomsm ‟ |msm mejrjms n` omskm

ohg|p~mojhdme d`o`msjm me |sho`h n` s`ohdhojgj`d~h$

Em ohg|msmojÿd `d~s` gp`~sm n` jsj ` s`mejym p~jejymdnh em nj~mdojm n` Amggjdk =

@e a`oah n` }p` eh jsj n` eh hih n`s`oah ` jy}pj`snh n` omnm |`shdm `md njb`s`d~`

z }p` eh |m~shd` `md njbçoje` n` om|~psms ~j`d`d ohgh ohd`op`dojm }p` `e

s`ohdhojgj`d~h n` jsj `m pdm n` em ~`odhehkçm cjhgê~sjom gí s`j~`d~` me bsmpn`$

|msm `q~sm`s em njb`s`dojm `d~s` em jgík`d` |s`'|sho`mnm$ Pd rmehs jdb`sjhs me

pgcsme `~mce`ojnh s`em~jrh m em nj~mdojm gíqjgm `d~s` em jgík`d` p|hd` pdm

ohjdojn`dojm `d~s` eh |m~shd` ohg|msmnh$

= Em nj~mdojm n` Amggjdk ` pd gê~hnh n` g`njojÿd n` em njb`s`dojm `d~s` nh `e`g`d~h$ _` n`bjd` ohgh `e dùg`sh

n` omsmo~`s` }p` n`c`sçmd ghnjbjoms` |msm ~smdbhsgms pd `e`g`d~h `d h~sh s`b`s`d~` h eh }p` ` eh gjgh `e dùg`sh n`omsmo~`s` }p` e` njb`s`dojm ~`dj`dnh `d op`d~m em gmkdj~pn n` omnm n` em n`jkpmenmn`$ N` `~` ghnh ` |p`n` g`njs`e dùg`sh n` `sshs` }p` ` n`c`sçmd nms |msm }p` pdm gp`~sm ` jd~`s|s`~m` ohgh ohjdojn`d~` h njb`s`d~` m h~sm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 34/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh

@~m ~`odhehkçm p~jejym em bhsgm n` em gmdh |msm ohdbjsgms em jn`d~jnmn n`e jdnjrjnph$ _p

mo`|~mojÿd |hs |ms~` n` eh ppmsjh ` gpz `e`rmnm zm }p` dh s`}pj`s` jdbhsgmojÿdn`~meemnm n` eh jdnjrjnph$

Jep~smojÿd >9 S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh

\hs h~sh emnh ` ~sm~m n` pdm ~êodjom }p` ` |s`b`sjce` }p` `m p~jejymnm |msm em

r`sjbjomojÿd n` |`shdm z dh s`ohg`dnmnm |msm em jn`d~jbjomojÿd m dh `s }p` `m

ohgcjdmnm ohd h~sm omsmo~`sç~jom g`njmd~` j~`gm cjhgê~sjoh cjghnme`$

\msm em om|~psm n` em gp`~sm ` n`c` ohehoms em gmdh hcs` em p|`sbjoj` n` pd e`o~hs$

Em |hjojÿd ` n`~`sgjdm g`njmd~` ojdoh kpçm }p` j~ùmd ohss`o~mg`d~` em gmdh |msm em

om|~psm$ Pdm `sj` n` oígmsm ~hgmd jgík`d` `d ?'N n` em gmdh n`n` njb`s`d~`

ídkpeh$ _` ~sm~m n` pd |sho`h sí|jnh z `dojeeh$ @e nj|hj~jrh n` `omd`h n` gmdh

|p`n` |sho`ms em jgík`d` ?'N `d 0 `kpdnh h g`dh z em r`sjbjomojÿd n` em gmdhnpsm g`dh n` = `kpdnh$

Em omsmo~`sç~jom `q~smçnm jdoepz`d em opsrm n` eh n`nh p kshhs z ehdkj~pn em

me~psm z em mdoapsm n`e nhsh n` em gmdh em nj~mdojm `d~s` em ms~jopemojhd` z em

`~spo~psm ÿ`m `d k`d`sme$ Dh ~j`d`d `d op`d~m n`~mee` p|`sbjojme` ~me` ohgh ap`eem

nmo~jems` eçd`m ojom~sjo` h poj`nmn mç ohgh em pým }p` |p`n`d rmsjms n` ~mgmýh

`d pd cs`r` |`sçhnh n` ~j`g|h$

_j cj`d ` oj`s~h }p` em `~spo~psm n` eh ap`h z em ms~jopemojhd` n` em gmdh hdsmkh s`em~jrmg`d~` ohd~md~` h~sm ojsopd~mdojm ohgh pdm jdbemgmojÿd h pdm

e`jÿd |p`n`d rmsjms em `~spo~psm cíjom n` em gmdh njbjope~mdnh em mp~`d~jomojÿd$ M

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 35/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

|`ms n` }p` em ~`odhehkçm n`osj~m ` s`em~jrmg`d~` |s`ojm dh ` cmm `d pd ohdipd~h

n` nm~h ~md sjoh ohgh pdm ap`eem nmo~jems h pd |m~sÿd n` jsj$

S`ohdhojgj`d~h n` s`~jdm

@e `oíd`s cjhgê~sjoh n` em s`~jdm ` cmm `d em p~jejymojÿd n`e |m~sÿd n` eh rmh

mdkpçd`h ohd~`djnh `d em gjgm$ @e a`oah n` }p` omnm |m~sÿd `m ùdjoh !jdoeph `d

k`g`eh jnêd~joh me `s jdn`|`dnj`d~` n` bmo~hs` k`dê~joh* z }p` ` gmd~`dkm

jdrmsjmce` m eh emskh n`e ~j`g|h em ohdrj`s~`d `d pdm ~êodjom jnÿd`m |msm `d~hsdh n` me~m

`kpsjnmn$

Jep~smojÿd 09 S`ohdhojgj`d~h n` s`~jdm

\`` m }p` p ~mm n` bmeh |hj~jrh `m |sío~jomg`d~` dpem `~m ~`odhehkçm ~j`d` pd

jdohdr`dj`d~` ohdjn`smce` zm }p` ` d`o`msjm em ~h~me ohemchsmojÿd |hs |ms~` n`e

ppmsjh me ~sm~ms` n` pd |sho`h }p` |p`n` s`pe~ms jdoÿghnh$ Em ~hgm n` em gp`~sm `

s`mejym m |ms~js n` em |p|jem eh }p` s`}pj`s` }p` `e ppmsjh |`sgmd`yom jdgÿrje z gpz

o`som n`e `dhs npsmd~` em om|~psm n` em jgmk`d$ Dh hc~md~` me s`mejyms` em om|~psm n`

`~m gp`~sm g`njmd~` pdm oígmsm n` jdbsmsshih dh `qj~` `e sj`kh n` }p` `e hih s`pe~`

nmýmnh `d `e |sho`h$

_j cj`d ` pdm n` em ~`odhehkçm }p` m|ms`d~`g`d~` |p`n`d ee`kms m hbs`o`s g`ihs`s`pe~mnh z gmzhs `kpsjnmn em cmim mo`|~mojÿd |hs |ms~` n` eh ppmsjh mç ohgh `e

me~h oh~` n` eh nj|hj~jrh amo`d }p` em p~jejymojÿd n` `~m ~`odhehkçm ` ejgj~` m

jd~memojhd` gjej~ms` dpoe`ms` h emchsm~hsjh$

S`ohdhojgj`d~h n` em k`hg`~sçm n` em r`dm

@~m ~`odhehkçm ` cmm `d em `~spo~psm n` em r`dm n` em gmdh h n`e n`nh$ N` bhsgm

jgjems me jsj h m em s`~jdm em k`hg`~sçm n` em r`dm ` n`bjd` md~` n`e dmojgj`d~h z `

njb`s`d~` jdoeph `d k`g`eh jnêd~joh$ @d `e |sho`h n` om|~psm n` em gp`~sm `e `dhs

jdbsmsshih hc~j`d` pdm jgmk`d n`e |m~sÿd n` em r`dm m |ms~js n`e opme ` k`d`sm pdm

|emd~jeem cjhgê~sjom$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 36/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Jep~smojÿd 29 S`ohdhojgj`d~h n` r`dm n` em gmdh

Ohgh omsmo~`sç~jom gí s``ýmce` n` `~m ~êodjom n`~momd em pdjojnmn pdjr`smejnmn

z |`sgmd`dojm n` `~h smkh ipd~h m em dh d`o`jnmn n` ohd~mo~h `d `e ghg`d~h n`

~hgms em gp`~sm$ Mnjojhdmeg`d~` me ~sm~ms` n` pd ÿskmdh jd~`sdh s`pe~m gí ohg|e`ih

s`mejyms opme}pj`s rmsjmojÿd hcs` `e gjgh$ Dh hc~md~` `qj~`d ohdnjojhd` `q~`sdm

ohgh em s`mejymojÿd n` `i`sojojh bçjoh z njb`s`d~` `db`sg`nmn` !njmc`~`

ms~`sjh`oe`shj h ~pghs`* }p` |p`n`d mb`o~ms m em m|msj`dojm n` eh rmh mdkpçd`h$

_` ~sm~m n` pdm ~`odhehkçm s`em~jrmg`d~` s`oj`d~`$ ^sm p mnh|ojÿd |hs |ms~` n` mekpdhcmdoh im|hd`` z |hemoh `d omi`sh mp~hgí~joh !pdh n` eh omh n` êqj~h ~sm~mnh

`d `e |s``d~` `~pnjh* `~í ohg`dymdnh m `s jg|emd~mnm |hs em `g|s`m

`|`ojmeg`d~` `d `e `o~hs mdj~msjh nhdn` pd gê~hnh n` mp~`d~jomojÿd `d epkms`

`~êsje` jdoeph opmdnh eh ppmsjh p~jejo`d kpmd~` gênjoh s`pe~m n` ksmd p~jejnmn$

H~sm ~`odhehkçm bjjheÿkjom

Mnjojhdmeg`d~` m eh j~`gm zm n`osj~h `qj~`d ~`odhehkçm }p` ` `dop`d~smd `d pd

`~mnh n` n`mssheeh jdoj|j`d~`$ @d~s` `eeh ` `dop`d~smd |sjdoj|meg`d~` eh jkpj`d~`9

‣  Eçd`m n` em |megm n` em gmdh9 Em jgmk`d n` em |megm n` em gmdh n` pd

jdnjrjnph ohdj~` `d pdm `sj` n` psoh z |ej`kp`$ N` bhsgm jgjems m mekpdh

j~`gm n` s`ohdhojgj`d~h n` ap`eem nmo~jems `~m ~êodjom p~jejym gjdpojm |msm

cpoms ohjdojn`dojm$ _p ph `~í |hs `e ghg`d~h cm~md~` ejgj~mnh m em

jdr`~jkmojÿd bhs`d`$

‣  M$N$D$9 _` ~hgm pdm gp`~sm n` ~`ijnh n` pd jdnjrjnph |msm em `q~smoojÿd n`e

M$N$D$ !Íojnh N`hqjssjchdpoe`joh* n`e dùoe`h n` pdm oêepem$ @~m ~êodjom s`pe~m

mn`opmnm |msm `e ph bhs`d` |`sh dh |msm em jn`d~jbjomojÿd `d ~j`g|h s`me n`cjnhm em ohg|e`ijnmn n`e |sho`h z me ~j`g|h d`o`msjh |msm `q~sm`s pdm ap`eem

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 37/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

k`dê~jom m |ms~js n` pdm gp`~sm n` ~`ijnh$ @~` j~`gm ~j`d` jdohdr`dj`d~`

mhojmnh zm }p` eh k`g`eh jnêd~joh ohg|ms~`d M$N$D$ z n` pdm gp`~sm `

|p`n` hc~`d`s jdbhsgmojÿd hcs` em smym z em mepn n` pd jdnjrjnph nm~h n`

omsío~`s |`shdme `|`ojmeg`d~` `djce`$

‣  Bhsgm n` em hs`im9 Em jn`d~jbjomojÿd ` s`mejym m |ms~js n` em bhsgm n` em hs`im

n`e jdnjrjnph$ _` ~hgm ohgh gp`~sm pdm jgmk`d jdbsmsshim n` em gjgm$ @~m

~êodjom dh s`}pj`s` n` em ohemchsmojÿd n`e ppmsjh z |`sgj~` em jn`d~jbjomojÿd m

g`njm nj~mdojm$

‣  \j`e9 _` ~hgm pdm jgmk`d n` em p|`sbjoj` n` em |j`e$ @~m jgmk`d ` oemjbjom

pmdnh `e mekhsj~gh n` mdíejj n` em ~`q~psm n` em p|`sbjoj` n` em |j`e }p` ~j`d`

`d op`d~m pdm `sj` n` omsmo~`sç~jom me`m~hsjm z k`d`sm pdm |emd~jeem$

?$?$3 ^`odhehkçm cjhgê~sjom n` ohg|hs~mgj`d~h

Em ~`odhehkçm cjhgê~sjom n` ohg|hs~mgj`d~h ` omsmo~`sjymd |hs ohdjn`sms `d `e

|sho`h n` mp~`d~jomojÿd smkh n`sjrmnh n` pdm moojÿd s`mejymnm |hs pdm |`shdm$ \hs

~md~h jdoepz`d em rmsjmce` ~j`g|h zm }p` ~hnm moojÿd ~j`d` pd ohgj`dyh pd n`mssheeh z

pd bjdme$

S`ohdhojgj`d~h n` rhy

Ipd~h ohd `e s`ohdhojgj`d~h bmojme `e s`ohdhojgj`d~h ehop~hs ` pd gê~hnh dm~psme n`jn`d~jbjomojÿd$ @ pd |sho`h s`mejymnh m njmsjh |hs eh jdnjrjnph |msm s`ohdho`s m pd

ohdhojnh `d pdm eemgmnm ~`e`bÿdjom h me hçs pdm rhy$ @~m m|ejomojhd` pmd s`n`

d`pshdme` |msm m|s`dn`s m jn`d~jbjoms rho`$ Eh mekhsj~gh n`c`d g`njs z `~jgms em

jgjej~pn |msm n`rher`s pd s`pe~mnh h pdm ej~m n` |hjce` omdnjnm~h$ Em mp~`d~jomojÿd

` ohg|ejom n`cjnh m bmo~hs` ohgh `e spjnh n` bhdnh em omejnmn n` em gp`~sm z p

npsmojÿd |hs eh }p` j`g|s` ` d`o`msjh ohdjn`sms pd gmsk`d n` `sshs$  

Mo~pmeg`d~` `qj~`d nh gê~hnh n` r`sjbjomojÿd }p` ` pmd n`|`dnj`dnh n` em

dm~psme`ym z hci`~jrh n` em m|ejomojÿd9

‣  R`sjbjomojÿd dh's`~sjdkjnm9 P~jejym pdm ohdr`smojÿd dhsgme ohgh gp`~sm$

‣  R`sjbjomojÿd s`~sjdkjnm9 @ `e gê~hnh gí ohgùd$ Em gp`~sm ` ejgj~m m

n`~`sgjdmnm |memcsm bsm` ohs~m h `q|s`jhd`$ \hs `~m smyÿd em ~mm n`

`sshs ` s`npo`d ohdjn`smce`g`d~`$ Mn`gí me `~ms cmmnm em r`sjbjomojÿd `d

ehopojhd` n` |hom npsmojÿd `e j~`gm s`|hdn` n` gmd`sm gí sí|jnm$

M |`ms n` }p` jkp`d `qj~j`dnh njbjope~mn` |msm s`ohdho`s em bhsgm dm~psme n` amcems

n` oj`s~h jdnjrjnph `~m ~`odhehkçm op`d~m ohd em r`d~mim n` }p` `e nj|hj~jrh n`mn}pjjojÿd ` jg|e`g`d~` pd gjosÿbhdh !jd~`ksmnh n`n` amo` mýh `d ~`eêbhdh z

hsn`dmnhs` |`shdme`* |hs eh }p` dh s`}pj`s` jdr`sjhd` mnjojhdme`$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 38/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Dh hc~md~` em rhy dh ` ~md ùdjom h |`sgmd`d~` ohgh h~sm omsmo~`sç~jom eh opme

jg|ejom }p` em |s`ojjÿd n` `~` gê~hnh ` g`dhs$

Em p~jejymojÿd n` `~` gê~hnh `~í gí `q~`dnjnm `d j~`gm n` s`|p`~m |hs rhy z `do`d~sh n` m~`dojÿd n` eemgmnm ~`e`bÿdjom !omee o`d~`s* }p` `d `e ohd~she n` moo`h

bçjoh m `njbjojh h m s`n` z `}pj|h jdbhsgí~joh$

S`ohdhojgj`d~h n` bjsgm

@~m ~êodjom mdmejym em bjsgm gmdposj~m |msm ohdbjsgms em jn`d~jnmn n`e ppmsjh$ Omc` em

|hjcjejnmn n` }p` `qj~md ejk`sm rmsjmojhd` `d em bjsgm n` pdm |`shdm |`sh em

ohdj~`dojm os`mnm |hs `e ghrjgj`d~h dm~psme z em |sío~jom m eh emskh n`e ~j`g|h os`m pd

|m~sÿd s`ohdhojce` }p` amo` }p` |p`nm pms` |msm em jn`d~jbjomojÿd cjhgê~sjom$

@qj~`d nh rmsjmd~` m em ahsm n` jn`d~jbjoms m em |`shdm `kùd p bjsgm9

‣  Ohg|msmojÿd jg|e`9 ` ohdjn`sm `e ksmnh n` |ms`ojnh `d~s` nh bjsgm em

hsjkjdme z em }p` `~í j`dnh r`sjbjomnm$

‣  R`sjbjomojÿd njdígjom n` bjsgm9 ` s`mejym pd mdíejj n` em bhsgm em r`ehojnmn

em |s`jÿd n` em |epgm h cheçksmbh z em npsmojÿd n`e |sho`h n` bjsgm$ Dh `

ohdjn`sm jkdjbjom~jrm em bhsgm h `e m|`o~h n` em bjsgm jdh eh omgcjh `d em

r`ehojnmn z em |s`jÿd }p` hopss`d npsmd~` `e |sho`h zm }p` ÿeh `e bjsgmd~`hsjkjdme |p`n` s`|shnpojs `~m omsmo~`sç~jom$

Em bjsgm ` z am jnh npsmd~` gpoah mýh pdm n` em ~êodjom gí amcj~pme` n`

jn`d~jbjomojÿd n` em |`shdm ` |hs `eeh }p` khym n` pdm ksmd mo`|~mojÿd `d~s` em

ojpnmnmdçm$

S`ohdhojgj`d~h n` `osj~psm n` ~`oemnh

@~m ~êodjom ` cmm `d em `qj~`dojm n` pd |m~sÿd n` `osj~psm `d ~`oemnh }p` `

|`sgmd`d~` z |sh|jh n` omnm jdnjrjnph$ N` `~` ghnh ` gjn` em bp`sym n` ~`oe`h emnpsmojÿd n` em |pemojÿd z `e |`sjhnh n` ~j`g|h }p` |mm `d~s` }p` ` |s`jhdm pdm ~`oem

z h~sm$

Em |sjdoj|me r`d~mim n` `~m ~êodjom ` }p` em jdr`sjÿd d`o`msjm `d `dhs` `

|sío~jomg`d~` dpem zm }p` eh ~`oemnh n` hsn`dmnhs `~íd |s``d~` `d gùe~j|e`

m|`o~h n` dp`~sm rjnm oh~jnjmdm z mn`gí `~íd me~mg`d~` mo`|~mnh |hs em

|hcemojÿd }p` amo` ph n` `eeh m njmsjh$ N` `~` ghnh eh oh~h n` jg|emd~mojÿd `

o`d~smsçmd `d `e hb~{ms` $

Dh hc~md~` `e |m~sÿd n` `osj~psm |p`n` r`s` mb`o~mnh |hs m|`o~h ohgh `e djr`e n`bm~jkm `~sê nj~smoojÿd |h~psm n`e ppmsjh z n`e ~`oemnh$ ^mgcjêd ` n`c` ~`d`s `d

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 39/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

op`d~m em |hcemojÿd }p` dh `~í amcj~pmnm me ph n` ~`oemnh z opzh |m~sÿd n` `osj~psm

` ghnjbjomsçm sí|jnmg`d~` m ompm n`e m|s`dnjymi`$

Mnjojhdmeg`d~` m p ph ohgh gê~hnh n` mp~`d~jomojÿd ~mgcjêd |p`n` `s `g|e`mnh|msm em ghdj~hsjymojÿd$ N` `~m gmd`sm ` |hnsçm |s`r`djs `e ph dh mp~hsjymnh n`

~`sgjdme` dh p|`srjmnh mç ohgh hc~`d`s `rjn`dojm n` mpnj~hsçm$

S`ohdhojgj`d~h n` em bhsgm n` mdnms

@~` gê~hnh ~hgm ohgh s`b`s`dojm em bhsgm n` omgjdms n` pdm |`shdm$ @~` mo~h `

ksmcm z ` hg`~` m pd |sho`h mdmeç~joh }p` k`d`sm pdm |emd~jeem cjhgê~sjom ùdjom

n`sjrmnm n` njoah ohg|hs~mgj`d~h$ @e nj|hj~jrh n` om|~psm ` pdm oígmsm `~ídnms |hs

eh }p` dh ` s`}pj`s` pdm ksmd jdr`sjÿd$ Mnjojhdmeg`d~` `~` j~`gm |`sgj~` em

jn`d~jbjomojÿd m nj~mdojm$

Jep~smojÿd ;9 S`ohdhojgj`d~h n` em bhsgm n` mdnms

@~m ~`odhehkçm `~í ~hnmrçm `d n`mssheeh z dh am meomdymnh mùd eh djr`e` n`

s`dnjgj`d~h d`o`msjh |msm `s jg|emd~mnm n` gmd`sm jgjems me s`~h n` ~`odhehkçm

cjhgê~sjom

?$> OHG\MSM^JRM N@ ^ÊODJOM_ Z ^@ODHEHKÇM_ CJHGÊ^SJOM_

Em ~`odhehkçm cjhgê~sjom `ýmemnm ohg|ms~`d `d p gmzhsçm `e gjgh hci`~jrh$ @

|hs `eeh }p` |p`n` `~mce`o`s` pdm ohg|msmojÿd `d~s` `eem `d bpdojÿd n` njb`s`d~`

m|`o~h }p` ` n`osjcjsíd m ohd~jdpmojÿd jn`d~jbjomdnh |msm omnm pdh n` `eeh em

~`odhehkçm }p` gí n`~momd z em }p` g`dh n`mssheemnm `~íd$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 40/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

?$>$= Osj~`sjh n` `rmepmojÿd

Eh |msíg`~sh p~jejymnh |msm `rmepms pdm ~`odhehkçm cjhgê~sjom jdoepz`d9

‣  Ksmnh n` mo`|~mojÿd9 Nj|hjojÿd n` eh ppmsjh m p~jejyms pdm ~`odhehkçmcjhgê~sjom$ @~` bmo~hs `~í s`emojhdmnh ohd eh jd~spjrm }p` ` ohdjn`s` pdm

~êodjom |hs |ms~` n` eh jdnjrjnph$ @ d`o`msjh m p r`y ohdjn`sms eh bmo~hs`

hojme` z ope~psme` }p` |p`n`d p|hd`s }p` pdm ~êodjom `md gí mo`|~mnm

h g`dh mo`|~mnm `d bpdojÿd n`e `d~hsdh nhdn` ` jg|emd~`d$

‣  S`j~`dojm me bsmpn`9 Om|mojnmn n`e j~`gm n` n`~`o~ms z n``oams eh

jd~`d~h n` mp~`d~jomojÿd |hs |ms~` n` ppmsjh dh mp~hsjymnh mç ohgh n`

|s`r`djs em dh jn`d~jbjomojÿd |hs |ms~` n` ppmsjh }p` |s`~`dn`d dh `s

s`ohdhojnh$

‣  G`dpsmcjejnmn9 N`~`sgjdm em om|mojnmn n` mn}pjjojÿd z g`njojÿd |s`ojm n`

em omsmo~`sç~jom |s``d~` `d em gp`~sm ohdjn`smdnh m p r`y em bmojejnmn

`d p om|~psm me p~jejyms` |s`b`sjce`g`d~` gê~hnh dh jd~spjrh |msm eh

ppmsjh$

‣  Ohg|hs~mgj`d~h9 \s`ojjÿd n` s`ohdhojgj`d~h }p` hbs`o` pdm ~êodjom

cjhgê~sjom$ _p`e` g`ihsms `kùd pdm ~êodjom rm gmnpsmdnh$

‣  \`sgmd`dojm9 Omsmo~`sç~jom }p` n`~`sgjdm `e ksmnh n` rmsjmojÿd n` pd smkhcjhgê~sjoh m eh emskh n`e ~j`g|h$ M pdm g`dhs rmsjmojÿd e` ohss`|hdn` pdm g`ihs

rmehsmojÿd `d opmd~h m em |`sgmd`dojm$

‣  Pdjojnmn9 @ em omsmo~`sç~jom }p` n`~`sgjdm em njb`s`dojmojÿd `d~s` jdnjrjnph$

Opmd~h gmzhs ` em pdjojnmn n` eh smkh s`ohkjnh gí njbçoje s`pe~m `dohd~sms

nh |`shdm }p` opzm gp`~sm cjhgê~sjom `md jkpme` z |hs eh ~md~h ` gí

`dojeeh njo`sdjs `d~s` eh ppmsjh$

‣  Pdjr`smejnmn9 ^hnh jdnjrjnph }p` rmzm m amo`s ph n` em ~`odhehkçm am n`|h``s em omsmo~`sç~jom cjhgê~sjom `rmepmnm$ Opmd~h gmzhs `m em pdjr`smejnmn

n` em omsmo~`sç~jom mdmejymnm gmzhs dùg`sh n` |`shdm |hnsí p~jejymsem$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 41/100

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 42/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >3 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

^`odhehkçm R`d~mim Jdohdr`dj`d~`

S`ohdhojgj`d~h n` jsj‣

\m~shd` gpz ohg|e`ih‣ Pdjojnmn gpz me~m‣ Me~h ksmnh n` |`sgmd`dojm

‣ Oh~` n` jg|emd~mojÿd

me~h‣ G`dhs ksmnh n`

mo`|~mojÿd

S`ohdhojgj`d~h n` s`~jdm ‣ Pdjojnmn gpz me~m‣ Me~h ksmnh n` |`sgmd`dojm

‣ \s`ojm n` ~h~meohemchsmojÿd n`eppmsjh

S`ohdhojgj`d~h n` emk`hg`~sçm n` em gmdh

‣ Me~h ksmnh n` |`sgmd`dojm‣ Bmojejnmn n` ph

‣ Pdjojnmn ejgj~mnm

S`ohdhojgj`d~h n` bjsgm ‣ Cp`dm mo`|~mojÿd‣ Bmojejnmn n` ph

‣ Njbjope~mn n` om|~psm|hs omgcjh n`|hjojÿd

S`ohdhojgj`d~h n` `osj~psmn` ~`oemnh

‣ Dh s`}pj`s` jdr`sjÿd `dnj|hj~jrh‣ \hjcjejnmn n` s`mejyms

ghdj~hsjymojÿd

‣ ^`odhehkçm `g`sk`d~`

?$>$? Ksmnh n` gmnps`y

@e ksmnh n` gmnps`y ` `e djr`e n` `q|`sj`dojm }p` |s``d~md em ~`odhehkçm cjhgê~sjom

~md~h `d em jdr`~jkmojhd` n`mssheemnm ohgh `d `e g`somnh mo~pme$

Em ap`eem nmo~jems ` em ~`odhehkçm n`~momnm `d `~` m|`o~h n`cjnh m }p` ` em gí

r`~`smdm n` em `qj~`d~`$ @ |hs `eeh }p` ` em ~êodjom hcs` em }p` gí ` am

jdr`~jkmnh z em }p` ee`rm gí ~j`g|h `d `e g`somnh$ @~h am |`sgj~jnh pd ksmd n`mssheeh

~md~h n` p hb~{ms` ohgh n` p amsn{ms` z ~j`d` ohgh ohd`op`dojm pdm njgjdpojÿd

n` p oh~`$

@e s`ohdhojgj`d~h n` jsj ` h~sm n` em ~`odhehkçm gí gmnpsm mpd}p` e`ih n`e djr`e

|s``d~mnh |hs em ap`eem nmo~jems$ @d ohdos`~h ` `dop`d~sm gí n`mssheemnm `d `e ís`m

n` em jdr`~jkmojÿd ~`dj`dnh pd g`dhs s`ohssjnh `d `e g`somnh$ @~h ` n`c` m }p` p

oh~` mpd ` ohdjn`sm `e`rmnh eh }p` njbjope~m p `q|mdjÿd$

\hs h~sh emnh em ~`odhehkçm g`dh gmnpsm mo~pmeg`d~` hd m}p`eem }p` `

`dop`d~smd `d pd `~mnh n` jdr`~jkmojÿd ~`g|smdh$ @d~s` `eem |hn`gh n`~moms9

s`ohdhojgj`d~h n` em bhsgm n` mdnms h s`ohdhojgj`d~h n` `osj~psm n` ~`oemnh$

@~m ~êodjom ~j`d`d gpoah gmsk`d n` g`ihsm `d `e omg|h n` em jdr`~jkmojÿd me `s n`

s`oj`d~` m|msjojÿd$

?$>$> Jg|emd~mojÿd `d `e g`somnh

M ohd~jdpmojÿd ` gp`~sm pd ksíbjoh }p` n`~meem em |s``dojm }p` ~j`d`d em njb`s`d~`

~êodjom `d `e g`somnh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 43/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Ksíbjoh >9 Ksmnh n` jg|emd~mojÿd `d `e g`somnh

Bp`d~`9 O`d~sme Jd~j~p~` hb ^`oadhehkz hb Fhfsmiams !3<=<*

Ohgh ` |p`n` hc`srms em ap`eem nmo~jems ~mgcjêd ` em ~`odhehkçm gmzhsj~msjm `d eh

}p` ` s`bj`s` m jg|emd~mojÿd `d `e g`somnh cjhgê~sjoh mcmsomdnh gí n` em gj~mn n`e

gjgh$ @~h ` ohd`op`dojm n` p me~h ksmnh n` gmnps`y }p` jg|ejom pd oh~` g`dhs$

@e s`ohdhojgj`d~h bmojme ` `dop`d~sm `d `kpdnh epkms mpd}p` gpz me`imnh n` em

|sjg`sm |hjojÿd$ Em jdoepjÿd n` pdm bh~hksmbçm n` em omsm n`e jdnjrjnph `d em gmzhsçm n`

nhopg`d~h n` jn`d~jbjomojÿd ` pd bmo~hs }p` am bmojej~mnh p jg|emd~mojÿd$

\hs h~sh emnh z ohd m|`dm |s``dojm `d `e g`somnh ` j~ùm `e s`ohdhojgj`d~h n`

`osj~psm n` ~`oemnh$ Mnjojhdmeg`d~` omc` n`~moms em mp`dojm n` hepojhd`

s`emojhdmnm ohd `e s`ohdhojgj`d~h n` s`~jdm$

?$>$0 S`emojÿd oh~`'c`d`bjojh

Pd m|`o~h s`e`rmd~` m ~`d`s `d op`d~m m em ahsm n` `rmepms pdm ~`odhehkçm cjhgê~sjom `

`e c`d`bjojh }p` em gjgm |p`n` m m|hs~ms `d ohd~sm|hjojÿd me oh~` }p` p|hd` p

mnh|ojÿd$

@d `~` `d~jnh `qj~`d njr`sm ~`odhehkçm opzh oh~` n` jg|emd~mojÿd dh ` gpz

`e`rmnh$ \hs pd emnh `~í em ap`eem nmo~jems% n`cjnh m p me~h ksmnh n` gmnps`y$ \hs h~sh

emnh `~íd ~êodjom ohgh `e s`ohdhojgj`d~h bmojme `e s`ohdhojgj`d~h n` rhy h `e

s`ohdhojgj`d~h n` `osj~psm n` ~`oemnh }p` dh |emd~`md em d`o`jnmn n` mn}pjsjs pd

nj|hj~jrh n` om|~psm n` gp`~sm `|`oçbjoh$

Dh hc~md~` `d em s`emojÿd oh~`'c`d`bjojh ~mgcjêd ` s`e`rmd~` `rmepms em osj~jojnmn n`e

j~`gm }p` rm m `s |sh~`kjnh g`njmd~` cjhg`~sçm$ @ |hs `eeh }p` pd me~h oh~` |p`n`

Ap`eem nmo~jems

01%

S`ohdhojgj`d~h

n` jsj=>%

S`ohdhojgj`d~h

n` bjsgm

=3%

S`ohdhojgj`d~h

bmojme

;%

K`hg`~sçm n` em

gmdh

0%

S`ohdhojgj`d~h

n` rhy

?%

S`ohdhojgj`d~hn` `osj~psm n`e

~`oemnh

=%

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 44/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

`~ms ip~jbjomnh |hs `e c`d`bjojh hc~`djnh ohd pdm mp~`d~jomojÿd n` me~m `kpsjnmn$ @d

`~` m|`o~h n`~mom `e s`ohdhojgj`d~h n` jsj$

Ohgh ohdoepjÿd ` |p`n` jdnjoms }p` `~` |msíg`~sh ` rmsjmce`$ @e hci`~jrh n` ph n`ej~`gm ` `e }p` gmsomsí `e c`d`bjojh m ohd`kpjs z `d bpdojÿd n` `~h ` n`ojnjsí `e

oh~` mpgjce`$ Em |sh|hsojhdmejnmn `d~s` em d`o`jnmn n` em `d~jnmn z em `kpsjnmn

m|hs~mnm |hs em hepojÿd bpdnmg`d~me$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 45/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

> MDÍEJ_J_ N@ EH_ \SHO@_H_ N@ JN@D^JBJOMOJßD

>$= MDÍEJ_J_ N@ EM_ ^ÊODJOM_ M\EJOMNM_ Z ^J\H_ N@ JN@D^JBJOMOJßDEm ~`odhehkçm cjhgê~sjom psk`d ohgh me~`sdm~jrm z(h ohg|e`g`d~h m em ~êodjom n`

jn`d~jbjomojÿd z mp~`d~jomojÿd zm `qj~`d~`$ \hs `eeh ` |hjce` `~mce`o`s pdm

ohg|msmojÿd njs`o~m `d~s` mgcm n`~momdnh c`d`bjojh }p` s`pe~md n`e ph n`

cjhg`~sçm ipd~h ohd m|`o~h `d eh }p` em ~êodjom ~smnjojhdme` hd p|`sjhs`$

_` amd n` ohdjn`sms eh jkpj`d~` m|`o~h9

‣  D`o`jnmn n` `os`~h9 Em ohd~sm`ým amd n` hope~ms` z em ~msi`~m dh n`c`d

n` `~ms me meomdo` n` ~`so`sh gj`d~sm }p` em cjhg`~sçm dh s`}pj`s` n` `~m

g`njnm n` |sh~`oojÿd }p` hd `qoepjrmg`d~` n`|`dnj`d~` n`e ppmsjh$

‣  \hjcjejnmn n` shch9 Em ~msi`~m z ohd~sm`ým |p`n`d `s shcmnm$ _jd

`gcmskh shcms pd smkh cjhgê~sjoh ` `q~s`gmnmg`d~` ohg|e`ih$

‣  \hjcjejnmn n` |êsnjnm9 Em ohd~sm`ým hd bíojeg`d~` herjnmce` z em ~msi`~m

` |p`n`d |`sn`s$ Eh smkh cjhgê~sjoh |`sgmd`o`d jdrmsjmce` merh `d

ohd~mnm `qo`|ojhd` z j`g|s` `~íd ohd `e pi`~h m }pj`d jn`d~jbjomd$

  S`kj~sh jdjojme z |hjcjejnmn n` s`k`d`smojÿd9 Em bmojejnmn ohd em }p` `|p`n` `drjms pdm ohd~sm`ým h ~msi`~m dp`rm ohd~sm~m ohd em ohg|e`ijnmn }p`

p|hd` `e s`kj~sh `d pd j~`gm cjhgê~sjoh zm }p` s`}pj`s` n` em |s``dojm

bçjom n`e jdnjrjnph `d `~m bm`$ Amz }p` `ýmems }p` eh smkh cjhgê~sjoh hd

|hs n`bjdjojÿd ejgj~mnh gj`d~sm }p` em k`d`smojÿd n` ohd~sm`ým ` jejgj~mnm

eh opme ` pdm r`d~mim$

‣  \sho`h n` ohg|msmojÿd9 Em ohg|msmojÿd n` nh ohd~sm`ým ` pd |sho`h

`dojeeh$ _jd `gcmskh ohg|msms nh smkh cjhgê~sjoh s`}pj`s` n` gmzhs

om|mojnmn ohg|p~mojhdme$

‣  Ohghnjnmn n`e ppmsjh9 @e ppmsjh am n` g`ghsjyms pdm h gùe~j|e`

ohd~sm`ým z `d `e omh n` }p` p` pdm ~msi`~m am n` ee`rms` j`g|s` ohdjkh$

P~jejymdnh ~`odhehkçm cjhgê~sjom dh ` d`o`j~m amo`s ~h bp`syh$

‣  Rped`smcjejnmn md~` `e `|jhdmi`9 Pdm njos`~m rjkjemdojm n` dp`~sm mo~jrjnmn

|hnsçm `srjs |msm hc~`d`s dp`~sm ohd~sm`ým h shcms dp`~sm ~msi`~m$ @` gê~hnh

dh ` ríejnh md~` eh j~`gm cjhgê~sjoh$

  Rped`smcjejnmn m pd m~m}p` |hs bp`sym csp~m9 Em ohd~sm`ým ~j`d`d pdmehdkj~pn n` rmsjh omsmo~`s`$ \hs p |ms~` pdm gp`~sm cjhgê~sjom `g|e`m

oj`d~h n` cz~` eh }p` ohg|ejom gpoah eh m~m}p` |hs bp`sym csp~m$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 46/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣  G`njnm n` |s`r`dojÿd9 Eh m~m}p` ohd~sm j~`gm |sh~`kjnh |hs ohd~sm`ým

h ~msi`~m ` |shnpo`d n`n` amo` mýh z em g`njnm n` |s`r`dojÿd ohd~sm `eeh

zm ` `dop`d~smd gmnpsm$ \hs `e ohd~smsjh eh m~m}p` m eh j~`gm

cjhgê~sjoh hd pd ís`m `d em }p` `~m g`njnm n` |s`r`dojÿd ` `~íd

k`d`smdnh `d `~h ghg`d~h$

‣  Mp~`d~jomojÿd n` ppmsjh ‑s`me`‚9 Em mp~`d~jomojÿd n` ppmsjh g`njmd~`

ohd~sm`ým h ~msi`~m z p `b`o~jrjnmn n`|`dn`d mchep~mg`d~` n` em rhepd~mn n`e

ppmsjh m em ahsm n` amo`sem |`shdme` ` jd~smdb`sjce`$ Em cjhg`~sçm `~í

me~mg`d~` s`emojhdmnm ohd `e |sh|jh ppmsjh |p` dh |p`n` `s |s`~mnm dj

ohg|ms~jnm$

‣  Oh~` n` jg|emd~mojÿd9 @d `e ghg`d~h n` em jg|emd~mojÿd `e a`oah n` jd~mpsmspd j~`gm n` ohd~sm`ým ~j`d` pd oh~` cmih gj`d~sm }p` `d `e omh n` pd

j~`gm cmmnh `d gp`~sm cjhgê~sjom ` gí oh~hh$

‣  Oh~` n` gmd~`djgj`d~h9 @e oh~` n` gmd~`djgj`d~h n` pd j~`gm cjhgê~sjoh

pdm r`y `~í jg|emd~mnh ohd êqj~h ` g`dhs me n` pd j~`gm n` ohd~sm`ým h

~msi`~m zm }p` dh ohdee`rm km~h n` k`~jÿd mhojmnh m em |êsnjnm p herjnh n`

os`n`dojme`$

M ohd~jdpmojÿd ` gp`~sm pdm ~mcem jep~sm~jrm jn`d~jbjomdnh `d }pê m|`o~h n`~mom

omnm gê~hnh n` mp~`d~jomojÿd9

^mcem 29 Ohg|msm~jrm cjhg`~sçm r Ohd~sm`ým(~msi`~m

M|`o~h Cjhg`~sçm Ohd~sm`ým(^msi`~m

D`o`jnmn n` _`os`~h

\hjcjejnmn n` shch

\hjcjejnmn n` |êsnjnm

Oh~` n` gmd~`djgj`d~h

S`kj~sh jdjojme z |hjcjejnmn n`s`k`d`smojÿd

\sho`h n` ohg|msmojÿd

Ohghnjnmn n`e ppmsjh

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 47/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

M|`o~h Cjhg`~sçm Ohd~sm`ým(^msi`~m

Rped`smcjejnmn md~` `e `|jhdmi`

Rped`smcjejnmn m pd m~m}p` |hsbp`sym csp~m

G`njnm n` |s`r`dojÿd

Mp~`d~jomojÿd n` ppmsjh‑s`me`‚

Oh~` n` jg|emd~mojÿd

>$3 _J_^@GM_ N@ MP^@D^JOMOJßD N@ NHCE@ BMO^HS

@e |shks`jrh mrmdo` n` em ~`odhehkçm cjhgê~sjom am p|p`~h `e |mh n` em bhsgm

jn`d~jbjomojÿd pdjghnme m j~`gm n` mp~`d~jomojÿd n` nhce` bmo~hs }p` |p`n`d ohgcjdms

`e ph n` em cjhg`~sçm ohd h~sh j~`gm ohgh ~msi`~m n` jn`d~jbjomojÿd h ohd~sm`ým h

jdohs|hsms gí n` pdm ~`odhehkçm cjhgê~sjom cjhg`~sçm cjghnme$

>$3$= Jd~`smoojÿd n` em cjhg`~sçm ohd h~sh j~`gm

Em mp~`d~jomojÿd n` nhce` bmo~hs ` em ohgcjdmojÿd n` nh ~êodjom n` jn`d~jbjomojÿd

njb`s`d~` |pnj`dnh `s pdm n` `eem opme}pj`s ~`odhehkçm$

@e |sjdoj|me hci`~jrh n` `~m ohgcjdmojÿd ` mpg`d~ms ohdjn`smce`g`d~` em `kpsjnmn z

s`npojs |hs ~md~h em |hjcjejnmn bsmpn`$

―@e bp~psh |mm |hs em p~jejymojÿd n` em nhce` jn`d~jbjomojÿd9 cjhgê~sjom z dh

 cjhgê~sjom‗

@d em gmzhsçm n` eh omh |emd~`mnh |hs eh `q|`s~h `e j~`gm dh cjhgê~sjoh

`g|e`mnh ` pdm ~msi`~m n` jn`d~jbjomojÿd h pdm ohd~sm`ým$

‣  ^msi`~m n` jn`d~jbjomojÿd9 \hs dhsgm k`d`sme ` p~jejym |msm s`mejyms em

jn`d~jbjomojÿd n`e jdnjrjnph$ \h~`sjhsg`d~` ` pmsçm pdm ~`odhehkçm cjhgê~sjom

|msm r`sjbjomsem$ Em nj|hdjcjejnmn n` em ~msi`~m ` jdnj|`dmce` |msm em

mp~`d~jomojÿd$ @d mekpdh omh `e |sh|jh `dhs z em jdbhsgmojÿd cjhgê~sjom

`~íd jd~`ksmnh `d em ~msi`~m$

‣  Ohd~sm`ým9 Pmnm `d ohgcjdmojÿd ohd pd smkh cjhgê~sjoh m|hs~mdnh pdm

om|m `q~sm n` `kpsjnmn$

‣  Osj|~hksmbçm9 Em jd~`smoojÿd `d~s` em cjhg`~sçm z em osj|~hksmbçm ` pd ís`m n`

jdr`~jkmojÿd s`em~jrmg`d~` s`oj`d~` z ohd pd n`mssheeh jdoj|j`d~`$ @d em gmzhsçm

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 48/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

n` m|ejomojhd` mo~pme` em osj|~hksmbçm ` p~jejym |msm m`kpsms eh nm~h

cjhgê~sjoh$

‣ @d em mo~pmejnmn em ohgcjdmojÿd n` ~êodjom cjhgê~sjom z ohdr`dojhdme` zm ``~í m|ejomdnh |hs `i`g|eh mekpdm Mngjdj~smojhd` \ùcejom p~jejymd `e

s`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh pgmnh me ph n` pd \JD |msm `e

ohd~she ahsmsjh$

>$3$3 A`ssmgj`d~m cjhgê~sjom cjghnme`

Pd j~`gm cjhgê~sjoh cjghnme ` m}p`e }p` p~jejym nh ~êodjom nj~jd~m |msm em om|~psm

n` smkh cjhgê~sjoh$ @~m ojsopd~mdojm p|hd` em p~jejymojÿd n` nh `dhs` n`

s`ohdhojgj`d~h z p ohss`|hdnj`d~` j~`gm n` r`sjbjomojÿd ohd `e ohdjkpj`d~`

mpg`d~h n` em `kpsjnmn }p` `~h p|hd`$

@~m `~spo~psm g`ihsmnm ` m|shr`oam n` em r`d~mim }p` m|hs~m omnm ~êodjom z `

|p`n` p~jejyms |msm p|`sms mekpdm n` em ejgj~mojhd` n` pd j~`gm cjhgê~sjoh ùdjoh$

Ohgh `i`g|eh n` ejgj~mojhd` n`~moms }p` ` `~jgm }p` pd |`}p`ýh |hso`d~mi` n` em

|hcemojÿd dh ~j`d` ap`eem nmo~jems` e`kjce` em rhy |p`n` `s me~`smnm |hs pd s`bsjmnh z

eh j~`gm n` s`ohdhojgj`d~h bmojme hd po`|~jce` m eh omgcjh `d em epy mgcj`d~me

h em mo~j~pn n`e pi`~h$

Pd j~`gm cjghnme }p` ohgcjd` em ohdoepjhd` hc~`djnm ~sm em p~jejymojÿd n` nh~êodjom njb`s`d~` |p`n` p|`sms gpoah n` `~h jdohdr`dj`d~`$ Mnjojhdmeg`d~` em

ohgcjdmojÿd n` nh bmo~hs` p|hd` pd mpg`d~h jkdjbjom~jrh n` em `kpsjnmn z n` em

s`j~`dojm me bsmpn`$

Pd j~`gm cjghnme |hnsçm `s |hs `i`g|eh pdm ohgcjdmojÿd n` r`sjbjomojÿd n` ap`eem

njkj~me` z s`ohdhojgj`d~h bmojme$ @~` ~j|h n` j~`gm `~í j`dnh pmnh mo~pmeg`d~` `d

`e ohd~she bshd~`sjyh n` rmsjh m`sh|p`s~h `|mýhe`$

>$3$? Rmehsmojÿd n` em mp~`d~jomojÿd n` nhce` bmo~hs

Mgch |sho`h n` mp~`d~jomojÿd n` nhce` bmo~hs }p` jdoepz`d em cjhg`~sçm p|hd`d pdm

`rhepojÿd s`|`o~h m eh j~`gm pdjghnme` `qj~`d~`$ @e ph n` em mp~`d~jomojÿd n`

nhce` bmo~hs |s``d~m m|`o~h r`d~mihh ` jdohdr`dj`d~`$

@d~s` em r`d~mim omc` n`~moms9

j* @e c`d`bjojh bpdnmg`d~me n` em p~jejymojÿd n` nh bmo~hs` n` mp~`d~jomojÿd ` `e

mpg`d~h n` em `kpsjnmn ehksmnh$ @~` m|`o~h zm ` ohdjkp` `g|e`mdnh pd heh

bmo~hs cjhgê~sjoh |`sh me jd~shnpojs h~sh bmo~hs ` |h~`dojm dh~mce`g`d~` me jdoepjs

pdm om|m n` `kpsjnmn mnjojhdme$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 49/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

jj* Em s`j~`dojm me bsmpn`

jjj* Em

}p` |s``d~md `~h j~`gm ~mgcjêd s`pe~m s`bhsymnm

zm }p` pd jdnjrjnph dh mp~hsjymnh am n` cpsems mgch ohd~she` |msm |hn`s

moo`n`s me j~`gm h jd~memojÿd }p` ` |sh~`k`$

rped`smcjejnmn` z mg`dmym m em }p` `~í `q|p`~h `e j~`gm ` s`npo`d

jr* @d `e omh n`e ph n` ~msi`~m n` jn`d~jbjomojÿd ` |p`n` jdoepjs em jdbhsgmojÿd

cjhgê~sjom `d em gjgm |hs eh }p` em r`sjbjomojÿd dh ` ~`dnsí }p` amo`s s`|`o~h

m pdm cm` n` nm~h s`gh~m jdh s`|`o~h m em |sh|jm ~msi`~m$ @~h jg|ejom pd

zm }p` `d gpoah omh pdh n` eh bmo~hs` mo~ùm ohgh ohd~she gj~jkmd~` n`e

h~sh$

mpg`d~h n` em `bjoj`dojm z n` em |sjrmojnmn n` eh nm~h |`shdme`

Dh hc~md~` em mp~`d~jomojÿd n` nhce` bmo~hs |s``d~m oj`s~h jdohdr`dj`d~` ohgh hd9

n`e ppmsjh$

j* Em jg|emd~mojÿd n` pd nhce` bmo~hs n` mp~`d~jomojÿd jg|ejom pd mpg`d~h n` oh~`

jj* _j cj`d pdh n` eh c`d`bjojh |sjdoj|me` n` em p~jejymojÿd n` j~`gm n`

s`ohdhojgj`d~h cjhgê~sjoh ` `e mahssh n` oh~` bs`d~` me gmd~`djgj`d~h n`

ohd~sm`ým z ~msi`~m opmdnh ohgcjdmgh em cjhg`~sçm z pdh n` `~h nh

bmo~hs` `m

n`e j~`gm$

jjj* Em jd~`smoojÿd n` em cjhg`~sçm ohd h~sh j~`gm jg|ejom }p` dh nj|hd`s n` em

ohd~sm`ým h ~msi`~m jg|hjcjej~` em mp~`d~jomojÿd$ @~h ohdee`rm pdm

njgjdpojÿd n` oh~` ` jd`qj~`d~`$

s`npoojÿd n`

em ohghnjnmn n`e ppmsjh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 50/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

0 C@D@BJOJH_ N@ EM P^JEJYMOJßD N@ EM_

^@ODHEHKÇM_ CJHGÊ^SJOM_

Eh `q|`s~h ohdpe~mnh ohjdojn`d `d }p` |msm em s`mejymojÿd n` pd mdíejj n` eh

c`d`bjojh n` em ~`odhehkçm cjhgê~sjom n`c`d ohdjn`sms` njb`s`d~` bmo~hs` ohgh p

bjdmejnmn dùg`sh `~jgmnh n` ppmsjh ~êodjom cjhgê~sjom `g|e`mnm `d~hsdh n`

ohdbjmdym h n`ohdbjmdym nhdn` ` `dop`d~sm `~o$ @ |hs `eeh }p` n`c` s`mejyms` pd

mdíejj n`~meemnh omh m omh |msm mc`s j s`meg`d~` s`pe~msçm s`d~mce` p mnh|ojÿd$

―Em jdr`sjÿd `ohdÿgjom }p` p|hd` em jg|emd~mojÿd n` em ~`odhehkçm

 cjhgê~sjom |p`n` `s pdh n` eh |sjdoj|me` jdohdr`dj`d~` `d p n`mssheeh‗

Em jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom ohdee`rm pd ohdipd~h n` c`d`bjojh ~md~h |msm

`d~jnmn` |ùcejom z |sjrmnm ohgh |msm eh ppmsjh bjdme`$

0$= \MSM EM_ @D^JNMN@_ P_PMSJM_

\msm eh njb`s`d~` `q|`s~h em ksmdn` hskmdjymojhd` n`c`d p|hd`s `e |sjdoj|me

gh~hs }p` |shgp`rm ` jdrj`s~m `d `e n`mssheeh n` em ~`odhehkçm cjhgê~sjom$

―Em cjhg`~sçm% ~`odheÿkjomg`d~`% `~í pbjoj`d~`g`d~` gmnpsm% mahsm `

bpdojÿd n` em ksmdn` ohs|hsmojhd ohg`dyms m hbs`o s `srjojh cmídnh`

`d eh c`d`bjojh }p` m|hs~m‗

\msm }p` `~h hopssm eh c`d`bjojh |h~`dojme` m hc~`d`s ohd p jg|emd~mojÿd amd n` `s

oemsh z s`e`rmd~`$ M ohd~jdpmojÿd ` n`osjc`d eh gí n`~momnh9

0$=$= Mpg`d~h n` em `kpsjnmn

_jd npnm eh `d~s`rj~mnh ohjdojn`d `d }p` pdm n` em r`d~mim gí jg|hs~md~` n` em

p~jejymojÿd n` ~êodjom cjhgê~sjom |msm em mp~`d~jomojÿd n` ppmsjh ` }p` kmsmd~jymd

}p` em |`shdm ` }pj`d njo` `s ` n`ojs }p` eh smkh cjhgê~sjoh ` `dop`d~smd

`qoepjrmg`d~` ejkmnh m p e`kç~jgh ppmsjh$

G`njmd~` `e shch n` os`n`dojme` mi`dm pd jdnjrjnph |p`n` moo`n`s m yhdm

s`~sjdkjnm h s`mejyms h|`smojhd` dh |`sgj~jnm jdope|mdnh m ~`so`sh$ Mjgjgh `

|hjce` }p` `~m os`n`dojme` ` ohg|ms~md rhepd~msjmg`d~` `d~s` `g|e`mnh$

^md~h `e shch ohgh em p~jejymojÿd |hs |ms~` n` rmsjh ppmsjh n` em gjgm os`n`dojme`

p|hd`d pdm ksmr` cs`oam `d em `kpsjnmn `d em `d~jnmn` }p` |p`n` `s `rj~mnm$ M

~smrê n` em jg|e`g`d~mojÿd n` j~`gm cjhgê~sjoh ` mpg`d~m em `kpsjnmn

s`npoj`dnh em |shcmcjejnmn n` }p` mekpj`d dh mp~hsjymnh moo`nm m yhdm h m m|ejomojhd`

s`~sjdkjnm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 51/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

0$=$3 S`npoojÿd n` oh~` n` gmd~`djgj`d~h

_j cj`d em ~êodjom ~smnjojhdme` ‟ohgh `e ph n` ohd~sm`ým h ~msi`~m n`

jn`d~jbjomojÿd‟ s`}pj`s`d pdm jdr`sjÿd gpz cmim `d p jg|emd~mojÿd dh hc~md~`

ohdee`rmd oh~` `e`rmnh mhojmnh m p k`~jÿd njmsjm$ @~m ` em ohd`op`dojm n` pdh

n` eh sj`kh gí `rjn`d~` mhojmnh m `~` ~j|h n` gê~hnh n` mp~`d~jomojÿd9 em

|hjcjejnmn n` }p` em os`n`dojme` `md |`snjnm shcmnm p herjnmnm$

―@e ph n` em cjhg`~sçm jg|ejom pd mahssh n` ~j`g|h% pdm s`npoojÿd n` oh~`

n` gmd~`djgj`d~h z pd mpg`d~h n` em `kpsjnmn‗

_jd `gcmskh `d `e omh n` em ~`odhehkçm cjhgê~sjom ‟nhdn` em jdr`sjÿd jdjojme |p`n`

ee`kms m `s `e`rmnm `d `e omh n` }p` `m d`o`msjh ohg|sms nj|hj~jrh h hb~{ms` n`

mn}pjjojÿd z |sho`mgj`d~h n` gp`~sm‟ pdm r`y em ~`odhehkçm `~í `d bpdojhdmgj`d~hz p ppmsjh moh~pgcsmnh m pmsem `e oh~` n` gmd~`djgj`d~h ` gpz s`npojnh zm

}p` dh ` nmd eh sj`kh md~`sjhsg`d~` s`b`sjnh$

@~` c`d`bjojh ` gí dh~mce` `d em ~`odhehkçm opzh oh~` n` jg|emd~mojÿd dh ` gpz

me~h ohgh em ap`eem nmo~jems `e s`ohdhojgj`d~h n` rhy `e s`ohdhojgj`d~h bmojme h `e

s`ohdhojgj`d~h n` `osj~psm n` ~`oemnh$  

0$=$? Mpg`d~h n` em `bjoj`dojm

Dh n`c`gh herjnms }p` em s`mejymojÿd n` eh njb`s`d~` |sho`h n` mp~`d~jomojÿd

ohd~she n` moo`h ` jn`d~jbjomojÿd g`njmd~` ~êodjom dh cjhgê~sjom p|hd` `d

homjhd` pdm jdr`sjÿd `qo`jrm n` ~j`g|h$ M r`o` mpd}p` `e |sho`h nps` |hoh

`kpdnh j ` s`mejymnh |hs pd ksmd dùg`sh n` ppmsjh `d pd ohs~h |`sçhnh n` ~j`g|h

|p`n` s`pe~ms me~mg`d~` jd`bjoj`d~`$ @~h po`n` |hs `i`g|eh `d eh moo`h m ksmdn`

`njbjojh n` hbjojdm h `d `e ohd~she bshd~`sjyh n` pd m`sh|p`s~h `d ahsm n` gíqjgm

mbep`dojm$

Ohgh ` |p`n` hc`srms `d eh nh omh n` êqj~h mdmejymnh `d `e |s``d~` `~pnjh

g`njmd~` em `e`oojÿd n` em ~`odhehkçm cjhgê~sjom gí mn`opmnm |msm eh njb`s`d~` omh

z em d`o`msjm bhsgmojÿd n` eh ppmsjh !pdm dhojhd` cíjom n` p~jejymojÿd* ` |p`n`mpg`d~ms ohdjn`smce`g`d~` em `bjoj`dojm n` eh |sho`h ohd `e ohdjkpj`d~` c`d`bjojh

`ohdÿgjoh s`pe~md~` |msm em `d~jnmn$

0$=$> S`npoojÿd n`e bsmpn` jd~`sdh

Pdh n` eh gê~hnh gí amcj~pme` n` ohg`~`s bsmpn` jd~`sdh `d `g|s`m z `d

hskmdjgh |ùcejoh ` em jg|p~mojÿd n` ahsm n` ~smcmih jd`qj~`d~` `d mekpdh omh

dh `~mdnh ~md j}pj`sm `e `g|e`mnh bçjomg`d~` `d em jd~memojhd` n` em `d~jnmn$ \msm

`eeh ` |p`n`d m|hzms `d ohg|mý`sh }p` ―bjoamd‗ `d p epkms$ Ohgh ohd`op`dojm n`

`eeh em `g|s`m `~msçm s`gpd`smdnh me `g|e`mnh |hs pdm ahsm n` ~smcmih }p` `ds`mejnmn dh am s`mejymnh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 52/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 03 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

@~m j~pmojÿd momss`m |êsnjnm `ohdÿgjom mç ohgh |hjce` |`sipjojh m em jgmk`d

ohs|hsm~jrm$ @e ph n` ~`odhehkçm cjhgê~sjom |msm `e ohd~she ahsmsjh n` eh `g|e`mnh

|p`n` mzpnms m |s`r`djs `~` ~j|h n` bsmpn` r`sjbjomdnh g`njmd~` njb`s`d~` gê~hnh

~md~h `e ~j`g|h n` ~smcmih jg|p~mnh ohgh }p` `e ~smcmimnhs }p` s`kj~sm p `d~smnm `

s`meg`d~` }pj`d njo` `s$

0$=$0 G`ihsm n` jgmk`d ohs|hsm~jrm

Em jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom ohd~sjcpz` m }p` pdm `g|s`m `m gí

`bjoj`d~` gí `kpsm z s`npyom `e bsmpn` jd~`sdh$

―Em jg|emd~mojÿd n` cjhg`~sçm p|hd` pdm g`ihsm n` jgmk `d n` em `kpsjnmn

n` pdm d~jnmn‗

@ |hs `eeh }p` pgmnh m ~hnm em r`d~mim n`osj~m md~`sjhsg`d~` ` |shnpo` pdm

jg|hs~md~` g`ihsm `d em h|jdjÿd k`d`sme hcs` em ohg|mýçm$ Mç gjgh ` mhojmsçm em

`d~jnmn ohd em jddhrmojÿd em jdr`sjÿd `d jdr`~jkmojÿd z n`mssheeh z em m|p`~m |hs

~`odhehkçm |pd~`sm$

0$=$2 Hb`s~m n` dp`rh `srjojh

@e n`mssheeh n` em eçd`m n` jdr`~jkmojÿd }p` mo~pmeg`d~` ` `~íd ee`rmdnh m omch `d

~hsdh m em cjhg`~sçm |p`n` s`pe~ms `d em hb`s~m n` dp`rh `srjojh `d pd bp~psh o`somdh$

@~h `srjojh mcmsomd njr`sm m|ejomojhd` `d `e `o~hs mdj~msjh `e |mkh g`njmd~`

nj|hj~jrh gÿrje` ohd~she |ms`d~me rjn`hrjkjemdojm ~o$

0$3 \MSM EH_ P_PMSJH_ BJDME@_

Eh ppmsjh bjdme` ~mgcjêd ` r`d bmrhs`ojnh |hs em jg|emd~mojÿd n` ~`odhehkçm

cjhgê~sjom$ Em `q|`sj`dojm n` eh |shb`jhdme` `d~s`rj~mnh ~md~h n`n` `e |pd~h n`

rj~m n` ppmsjh ohgh n` |shr``nhs` n` j~`gm cjhgê~sjoh e` ee`rm m n`~moms eh

jkpj`d~` c`d`bjojh |msm eh }pj`d` p~jejymd amcj~pmeg`d~` `~h j~`gm$

0$3$= Mpg`d~h n` em ohghnjnmn

Em p~jejymojÿd n` ~êodjom cjhgê~sjom `d |sho`h n` jn`d~jbjomojÿd mp~`d~jomojÿd z

ohd~she n` moo`h p|hd` pd mpg`d~h ohdjn`smce` n` ohghnjnmn |msm eh

ppmsjh `d em s`mejymojÿd n` `~m ~ms`m$

―Em dh d`o`jnmn n` s`ohsnms ohd~sm`ým ` pdm n` em ksmdn` r`d~mim n`

em cjhg`~sçm% `|`ojmeg`d~` n`n` `e |pd~h n` rj~m n` em ohghnjnmn |msm `e

ppmsjh‗

@e `g|e`h n` ~`odhehkçm cjhgê~sjom `ejgjdm em d`o`jnmn n` s`ohsnms gùe~j|e`

ohd~sm`ým }p` |hs `kpsjnmn ` n`c`d omgcjms omnm ohs~h |`sjhnh n` ~j`g|h$ @d `~``d~jnh `e ppmsjh ~mg|hoh ` ~`dnsí }p` |hd`s `d ohd~mo~h merh `qo`|ojhd` ohd `e

`srjojh n` h|hs~` jdbhsgí~joh h n` m~`dojÿd me oej`d~` |msm s`~mpsms p os`n`dojme`

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 53/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

n`cjnh me herjnh n` ohd~sm`ým dj n`c`sí `q~s`gms em |s`ompojhd` |msm |s``srms em

|sjrmojnmn n` em gjgm$ N`e gjgh ghnh ~mg|hoh e` s`pe~msí d`o`msjh ee`rms ohdjkh

djdkpdm ~msi`~m n` jn`d~jbjomojÿd `d ~hnh ghg`d~h dj `qj~jsí `e sj`kh n` |`sn`sem h n`

}p` ` nmý`$

0$3$3 S`npoojÿd n` ~j`g|h n` `|`sm

Em jn`d~jbjomojÿd z ohd~she n` moo`h s`mejymnh |hs gê~hnh ~smnjojhdme` p|hd`d

~j`g|h n` `|`sm }p` s`pe~md ghe`~h |msm `e ppmsjh$ @e ph `b`o~jrh n` em cjhg`~sçm

|p`n` s`npojs ohdjn`smce`g`d~` em `|`sm z |hs ~md~h c`d`bjojms me ppmsjh$ N` `~`

ghnh `d njb`s`d~` omh n` êqj~h g`dojhdmnh |hs eh `q|`s~h ` hc`srm pdm

s`npoojÿd n` `|`sm `d m`sh|p`s~h ~j`dnm o`d~sh n` hojh `d~jnmn` cmdomsjm `~o$

0$3$? \hjcjejnmn n` ~smgj~mojhd` s`gh~m@ |hjce` `g|e`ms ~êodjom cjhgê~sjom ohgh bhsgm n` r`sjbjomojÿd `d h|`smojhd` dh

|s``dojme` n` bhsgm me~mg`d~` bjmce` |pnj`dnh p|`sms m em bjsgm `e`o~sÿdjom

mo~pme`$ N` `~m bhsgm ` |p`n`d s`npojs eh ~smemnh z ~sígj~` jdd`o`msjh `

jdohdr`dj`d~` |msm `e ppmsjh bjdme$

―_` `~í ~smcmimdnh `d }p` opme}pj`s ~smdmoojÿd }p` mo~pmeg`d~` ` rmejn`

ohd em bjsgm `e`o~sÿdjom h gmdposj~m n` pdm |`shdm% ` amkm g`njmd~` `e

ph n` bjsgm cjhgê~sjom‗

0$3$> Gmzhs `kpsjnmn

Em ~`odhehkçm cjhgê~sjom m|hs~md pd mpg`d~h n` `kpsjnmn ohgh ohd`op`dojm n` eh

sj`kh }p` gj~jkmd$ @~h s`npdnm `d c`d`bjojh |msm `e ppmsjh me s`npojs em |hjcjejnmn`

n` }p` pd ~`so`sh p|emd~` p jn`d~jnmn |msm em ohgjjÿd n` mekùd n`ej~h h |shrhomse`

mekùd ~j|h n` |`sipjojh$

Em p~jejymojÿd n` em cjhg`~sçm |hs |ms~` n` em mngjdj~smojhd` |ùcejom `d em epoam ohd~sm

`e osjg`d ~mgcjêd s`bp`sym em `dmojÿd n` `kpsjnmn n` eh ojpnmnmdh$

0$3$0 Mpg`d~h n` em |sjrmojnmnEm `kpsjnmn n` eh nm~h n` omsío~`s |`shdme n` eh ojpnmnmdh `d em gùe~j|e`

~smdmoojhd` }p` amo`d ph n` `eeh ` h~sh n` eh m|`o~h s`bhsymnh |hs em

m|ejomojÿd n` ~êodjom cjhgê~sjom$  

―Eh }p` gí ` rm ehsm ` em |sjrmojnmn n`e jdnjrjnph‗

@ em ohd`op`dojm n` em dh~mce` njbjope~mn }p` p|hd` em bmejbjomojÿd n` smkh

cjhgê~sjoh ohd `e hci`~jrh n` moo`n`s m em jdbhsgmojÿd |`shdme n` pd ppmsjh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 54/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

0$3$2 Bmgjejmsjymojÿd ohd ~`odhehkçm mrmdymnm

@e ph n` ~`odhehkçm cjhgê~sjom mo`som `d gpoam homjhd` ~`odhehkçm |pd~`sm

m|ejomnm `d `dhs` n` ùe~jgm k`d`smojÿd m em ojpnmnmdçm$ \`` m em s`~jo`dojm }p`

|p`n`d gh~sms eh ppmsjh `d pd |sjg`s ghg`d~h amojm pdm ~`odhehkçm }p` dh

ohdho`d ~sm pdm |`}p`ým bm` n` mnm|~mojÿd p h|jdjÿd hcs` em gjgm p`e` g`ihsms

|hs dhsgm k`d`sme$ Ohgh ohd`op`dojm `e ph n` ~`odhehkçm `d `e nçm m nçm n`e

ojpnmnmdh ` ohdrj`s~` `d mekh gí `dojeeh z amcj~pme$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 55/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 00 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

2 P_H_ Z M\EJOMOJHD@_ N@ EM_ ^@ODHEHKÇM_

CJHGÊ^SJOM_

Em cjhg`~sçm ` `~í n`mssheemdnh ksmojm m pd os`ojgj`d~h ksmnpme `d em ohdoj`dojmojÿd

|ùcejom z n` em mo`|~mojÿd k`d`smejymnm$ Dh hc~md~` p ksmnh n` jg|emd~mojÿd ` gpz

n`jkpme `d~s` eh njb`s`d~` `o~hs` n`cjnh m em bjdmejnmn n` em gjgm z p oh~`$

―@qj~` pdm ksmd |s``dojm n` em cjhg`~sçm `d `e `o~hs |ùcejoh‗

Em Mngjdj~smojhd` \ùcejom hd `d em mo~pmejnmn em ksmdn` jg|pehsm n` em

~`odhehkçm cjhgê~sjom$ @ |hs `eeh }p` ` `d `e `o~hs |ùcejoh nhdn` ` |p`n`d

`dohd~sms em gmzhs` jdr`sjhd`$ Ksmd |ms~` n` `~h |shz`o~h `~íd n`~jdmnh m

N`b`dm z m _`kpsjnmn Dmojhdme |`sh p ph `~í `q~`dnjnh `d njb`s`d~` ígcj~h me

p~jejyms` `d gpoah omh |msm `e ohd~she n` |s``dojm j`dnh ê~` pd ph ~smdr`sme m

~hnh eh `o~hs`$

N`~momd j~`gm |msm em jn`d~jbjomojÿd n` ~`sshsj~m z osjgjdme` jdr`~jkmojÿd bhs`d`

nhopg`d~h dmojhdme` n` jn`d~jnmn ohd~she bshd~`sjyh ohd~she n` moo`h ohd~she n`

|s``dojm z k`~jÿd n` mzpnm |ùcejom$

Eh `q|`s~h ohjdojn`d `d }p` n`d~sh n`e `o~hs |sjrmnh ~mgcjêd ` n`mssheemd |shz`o~h

n` jg|hs~md~` omemnh$ @|`ojmeg`d~` `e `o~hs bjdmdoj`sh !ksmdn` cmdoh zm`kpsmnhsm* }p` am ee`rmnh m omch jg|emd~mojhd` |msm `e ohd~she n` moo`h m p

jd~memojhd` z `e ohd~she n`e bsmpn` mç ohgh |msm m`kpsms ~smdmoojhd` s`gh~m ~md~h

m ~smrê n` Jd~`sd`~ ohgh rçm ~`e`bÿdjom$

Em ohg|mýçm |`s~`d`oj`d~` me ís`m n` em ~`odhehkçm n` em jdbhsgmojÿd z n` em

ohgpdjomojÿd !^JO* n`d~sh n` em }p` ` `dop`d~smd bmcsjomd~` jd~`ksmnhs`

ohdpe~hs` z n`mssheemnhs` n` |shnpo~h cjhgê~sjoh ~mgcjêd m|p`~md |hs em

~`odhehkçm `d `e moo`h bçjoh m p jd~memojhd` mç ohgh `d `e moo`h eÿkjoh m p

j~`gm z `srjojh$@ `e omh ~mgcjêd n`e `o~hs ah~`e`sh nhdn` mo~pmeg`d~` ` `~í `~pnjmdnh em

jg|emd~mojÿd n` j~`gm n` s`ohdhojgj`d~h nmo~jems |msm `e ohd~she n` moo`h m em

amcj~mojhd` `ejgjdmdnh mç `e km~h n`sjrmnh n`e ph n` ohdpgjce` ohgh ~msi`~m n`

cmdnm gmkdê~jom h em cm~`sçm n` p nj|hj~jrh n` e`o~psm `d eh ah~`e`$

N` omsm me bp~psh ` |s`rê pdm jg|ejomojÿd gpoah gmzhs |hs |ms~` n`e `o~hs |sjrmnh m

g`njnm }p` `e g`somnh rmzm gmnpsmdnh$ G`njmd~` `e n`mssheeh n` em jdr`~jkmojÿd `

|p`n`d ohdos`~ms dp`rm m|ejomojhd` }p` hepojhd`d d`o`jnmn` n` em ohg|mýçm mç

ohgh mcmsm~ms` |sho`h }p` bmojej~`d jg|emd~mojhd` mo~pmeg`d~` jdrjmce` |hs p me~hoh~`$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 56/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 02 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Ohgh ` hc`srm eh |sjg`sh `o~hs` `d mrmdyms `d em jg|emd~mojÿd n` ~`odhehkçm

cjhgê~sjom hd m}p`eeh opzm d`o`jnmn n` `e`rms em `kpsjnmn ` gmzhs$ M |`ms n`

`eeh ` ~sm~m n` pdm ~`odhehkçm eemgmnm m `q|mdnjs` m eh emskh n` gpz njr`sm

jdnp~sjm z `o~hs` |p`~h }p` em d`o`jnmn n` mpg`d~h `d em `kpsjnmn z s`npoojÿd

n` bsmpn` `d em mp~`d~jomojÿd n` ppmsjh ` pdm d`o`jnmn ~smdr`sme$

Pmnm ohgh bhsgm ùdjom n` mp~`d~jomojÿd h ohgcjdmnm ohd h~sm g`njnm em cjhg`~sçm

`~í n`~jdmnm `kùd eh `q|`s~h ohdpe~mnh m `q~`dn`s` `d gpoah m|`o~h n`

dp`~sm rjnm njmsjm$ N` a`oah `~h gjgh `q|`s~h gmdjbj`~md }p` em ~`odhehkçm

cjhgê~sjom ` `~íd ohdrjs~j`dnh zm `d em cm` n` pd dùg`sh ohdjn`smce` n` hepojhd`

n` jn`d~jbjomojÿd n` me~m `kpsjnmn z r`sjbjomojÿd |`shdme$ M g`njnm }p` ` n`opcs`d

cs`oam n` `kpsjnmn ` jdos`g`d~md em |hjcjejnmn` n` ~smdmoojhd` bsmpnpe`d~m em

d`o`jnmn n` pdm ~`odhehkçm }p` m~jbmkm njoam d`o`jnmn` ` amo` gí |m~`d~`$

@e ohd~`q~h `d `e }p` ` rmzm m m|ejoms !ohemchsm~jrh m nj~mdojm |s``dojme `~o$* z em

bjdmejnmn |`s`kpjnm !ohd~she n` moo`h ohd~she n` |s``dojm ohd~she n`

jn`d~jnmn(|`shdmejnmn epoam ohd~sm `e bsmpn` `~o$* `síd mekpdh n` eh `e`g`d~h }p`

n`~`sgjd`d }pê ~`odhehkçm ohdos`~m ` em gí m|sh|jmnm `d omnm omh$

2$= M\EJOMOJHD@_ MO^PME@_

@d em mo~pmejnmn em ~`odhehkçm cjhgê~sjom ` |p`n`d p~jejyms `d pd mg|ejh mcmdjoh n`

m|ejomojhd`$ Mnjojhdmeg`d~` `qj~`d eçd`m n` jdr`~jkmojÿd n` omsm m bp~psm`q~`djhd` gmjrm n` n`~`sgjdmnh ph }p` |ms`o`d `|`ojmeg`d~` |shg`~`nhsm$

M ohd~jdpmojÿd ` n`osjc`d eh |sjdoj|me` ph }p` ` nmd m em ~`odhehkçm cjhgê~sjom

m nçm n` ahz `kùd eh `q|`s~h ohdpe~mnh z `e mdíejj nhopg`d~me s`mejymnh$

2$=$= Ohd~she n` moo`h bçjoh z eÿkjoh

―Em bjdmejnmn `d em }p` gí `q~`dnjnh `~í `e ph n` em cjhg`~sçm ` `e ohd~she

n` moo`h% zm `m ê~` bçjoh !|hs `i`g|eh moo`h m `njbjojh h `|mojh

s`~sjdkjnh* h eÿkjoh !moo`h m j~`gm% |shksm gm h `}pj|h jdbhsgí~joh*‗

Eh `q|`s~h ohjdojn`d `d }p` em ap`eem nmo~jems ` em hepojÿd gí amcj~pme |msm `~` ph

`d @|mým n`cjnh m p me~h ksmnh n` gmnps`y }p` |`sgj~` `e `~mce`ojgj`d~h n` |s`ojh

ohg|`~j~jrh z m em pmcjejnmn }p` hbs`o`$ 

Dh hc~md~` z mpd}p` p |s``dojm `m g`dhs `e s`ohdhojgj`d~h n` jsj z `e

s`ohdhojgj`d~h bmojme ` |s``d~md ohgh me~`sdm~jrm m em ap`eem nmo~jems `d `~` ~j|h n`

m|ejomojhd`$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 57/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Jep~smojÿd 19 Ohd~she n` moo`h

Eh `q|`s~h s`ohgj`dnmd }p` |msm `e ohd~she n` moo`h m yhdm n` me~m `kpsjnmn `amkm ph n` mp~`d~jomojÿd n` nhce` bmo~hs$ N` `~` ghnh em mp~hsjymojÿd |msm `e moo`h

n` pdm |`shdm ` cmmsçm `d pd s`ohdhojgj`d~h n` oÿgh ` ipd~h m eh }p` mc` h ~j`d`$

Jep~smojÿd :9 Ohd~she n` |s``dojm n` nhce` bmo~hs

N`e gjgh ghnh }p` ` amd jd~memnh `dhs` `d em `d~smnm n` `njbjojh z mem n`

moo`h s`~sjdkjnh omnm r`y gí eh |shr``nhs` n` `~` ~j|h n` ~`odhehkçm s`ojc`d

|`~jojhd` |msm em jd~`ksmojÿd n` `dhs` cjhgê~sjoh `d eh hsn`dmnhs` ohs|hsm~jrh

n` omsm m k`~jhdms em mp~`d~jomojÿd `d j~`gm z m|ejomojhd`$

2$=$3 Ohd~she n` |s``dojm

Eh gê~hnh p~jejymnh ~smnjojhdmeg`d~` |msm s`kj~sms njmsjmg`d~` eh ahsmsjh `d eh }p`

eh `g|e`mnh moo`n`d z mcmdnhdmd p s`|`o~jrh |p`~h n` ~smcmih p`e`d `~ms

cmmnh `d `e ph n` pd \JD h ~msi`~m |`shdme$ 

Pdh n` eh |sjdoj|me` jdohdr`dj`d~` }p` amd gmdjb`~mnh eh s`|hdmce` n`

`d~jnmn` }p` op`d~md ohd j~`gm n` ohd~she ahsmsjh cmmnh `d ~`odhehkçm~smnjojhdme` ` em bmojejnmn ohd em }p` ` |p`n`d ohg`~`s jss`kpemsjnmn` |hs `i`g|eh

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 58/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 01 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

ohg|ms~j`dnh ohd pd ohg|mý`sh n` ~smcmih `e \JD h em ~msi`~m |`shdme zm }p` dh `

s`}pj`s` djdkpdm r`sjbjomojÿd mnjojhdme$

―@e ph n` opme}pj`s ~êodjom cjhgê~sjom p|hd` pdm bhsgm `bjomy n` gj~jkms`~` sj`kh |hs em jg|hjcjejnmn n` ohg|ms~js eh smkh cjhgê~sjoh `d~s`

`g|e`mnh‗

_`kùd amd ~smdgj~jnh eh |shb`jhdme` jdrheposmnh `d `e |s``d~` `~pnjh |msm `~`

~j|h n` m|ejomojhd` ` p~jejym amcj~pmeg`d~` em ap`eem nmo~jems mpd}p` ~mgcjêd ~êodjom

g`dh `q~`dnjnm `d `e g`somnh ohgh em k`hg`~sçm n` em gmdh }p` `~í j`dnh pmnm

!`d ohgcjdmojÿd ohd `e \JD* |hs n`~`sgjdmnm Mngjdj~smojhd` \ùcejom$

2$=$? Ohd~she n` bshd~`sm

Em cjhg`~sçm |p`n` `s p~jejymnm |msm r`sjbjoms jn`d~jnmn` |hs |ms~` n` mk`d~`

bshd~`sjyh g`njmd~` `e ph n` nj|hj~jrh n` e`o~psm cjhgê~sjom z ohd~sm~mdnh `~m

jdbhsgmojÿd ohd p cm` n` nm~h$

Eh smkh m mdmejyms dhsgmeg`d~` hd em ~h|hksmbçm bmojme z em ap`eem nmo~jems`$

Mo~pmeg`d~` pd ksmd dùg`sh n` mngjdj~smojhd` |ùcejom n` ~hnh `e gpdnh `~í

jg|emd~mdnh em cjhg`~sçm `d mnpmdm z m`sh|p`s~h |msm mpg`d~ms em `kpsjnmn z mkjejnmn

n` eh gjgh$

―Opmdnh ee`rmgh m omch |shz`o~h opzm bjdmejnmn ` `e ohd~she n` bshd~`sm%dh n`c`gh herjnmsdh n` }p` eh ppmsjh dh |p`n`d `s bhsgmnh

|s`rjmg`d~`% eh }p` p|hd` pd `dhsg` s`~h n` omsm m ohd`kpjs pdm

pmcjejnmn eh g`dh jd~spjrm |hjce`‗

2$=$> Epoam ohd~sm `e bsmpn`

@e ph n` `~m ~`odhehkçm |msm s`mejyms ~smdmoojhd` cmdomsjm ` `dop`d~sm cm~md~`

`q~`dnjnh zm }p` ` ohdjn`smd gí mn`opmnm }p` `e ph n` eh gê~hnh ~smnjojhdme`

m|hs~mdnh gmzhs` djr`e` n` `kpsjnmn$

_jd `gcmskh p ph |msm em |s`r`dojÿd n` bsmpn` dh ` ejgj~m m `d~jnmn` |sjrmnm$ Em

mngjdj~smojhd` |ùcejom `~íd ohg`dymdnh m jg|emd~ms j~`gm cjhgê~sjoh |msm

|s`r`djs `~` n`ej~h ohd `e hci`~jrh n` `rj~ms `e km~h n` bhdnh |ùcejoh n` bhsgm

jss`kpems$

―Em |s`r`dojÿd n`e bsmpn` z em g`ihsm n` em rjkjemdojm hd nh ksmdn`

 c`d`bjojh n` em m|ejomojÿd n` ~`odhehkçm cjhgê~sjom‗

Pd `i`g|eh ohdos`~h }p` amd `ýmemnh njr`sh `q|`s~h npsmd~` `e n`mssheeh n` em

`d~s`rj~m ` em p~jejymojÿd `d em k`~jÿd n` eh `srjojh mdj~msjh kpc`sdmg`d~me`hbs`ojnh m nhgjojejh `d @~mnh Pdjnh$ @d `~` omh ` r`sjbjom cjhgê~sjomg`d~` }p` `e

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 59/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

|`shdme mdj~msjh ` am |s``d~mnh `d em rjrj`dnm mn`opmnm z amd hbs`ojnh eh

`srjojh }p` |h~`sjhsg`d~` `síd bmo~psmnh$

2$=$0 Jdr`~jkmojÿd n` n`ej~hEm ap`eem s`ohkjnm n` em `o`dm n` pd n`ej~h hd |h~`sjhsg`d~` oh~`imnm m ~smrê

n`e |shksmgm MBJ_ !Mp~hgm~`n Bjdk`s|sjd~ Jn`d~jbjom~jhd _z~`g * h mekùd h~sh n`sjrmnh

n`e gjgh$

Ohdos`~mg`d~` `d @|mým ` p~jejym `e j~`gm _MJN !_j~`gm Mp~hgí~joh n`

Jn`d~jbjomojÿd Nmo~jems* `d `e }p` ` gmd~j`d` pd s`kj~sh n` em ap`eem n` jdnjrjnph ohd

md~`o`n`d~`$

Dh hc~md~` `~m cm` n` nm~h ` ~h~meg`d~` jdn`|`dnj`d~` n` em }p` megmo`dm emap`eem nmo~jems` hc~`djnm `d `e |sho`h n` hc~`dojÿd n`e Nhopg`d~h Dmojhdme n`

Jn`d~jnmn |hs eh }p` em Bp`sym n` _`kpsjnmn hemg`d~` |p`n`d p~jejyms `d `~h omh

em ap`eem ~hgmnm `d `o`dmsjh n` mekùd osjg`d h n` |`shdm ohd md~`o`n`d~`$

―@ gpz jg|hs~md~` nj~jdkpjs em cm` n` nm~h n` ap`eem nmo~jems` n`e

Nhopg`d~h Dmojhdme n` Jn`d~jnmn n` em cm` n` nm~h p~jejymnm |hs em

|hejoçm ohd bjdmejnmn` s`emojhdmnm ohd em jdr`~jkmojÿd n` n ej~h‗

Em ap`eem nmo~jems` ` s`gj~`d ipd~h ohd eh nm~h n`ghksíbjoh |msm jn`d~jbjoms h

r`sjbjoms em jn`d~jnmn n` em |`shdm$ Em cù}p`nm |p`n`d ~msnms gjdp~h ahsm h nçmn`|`dnj`dnh n` em omejnmn n` em jdbhsgmojÿd |s``d~mnm z `e ~mgmýh n` em cm` n` nm~h

`d em }p` ` cpom$

@~` j~`gm |sho`m pdm h rmsjm ap`eem nmo~jems` n`ohdhojnm cpomdnh

ohjdojn`dojm mp~hgí~jomg`d~` `d pdm cm` n` nm~h nhdn` |s`rjmg`d~` ` amd

megmo`dmnh ~hnm em ap`eem h|`oahm$

2$=$2 Moo`h m `srjojh z mzpnm kpc`sdmg`d~me`

@e ph n` em cjhg`~sçm `d `e moo`h m `srjojh hojme` z m bhdnh n` mzpnm `d omh n``g`sk`dojm |p`n` `s n` p~jejnmn `d `e ohd~she n`e s`|ms~h n` `~m mzpnm$ @~h p|hd`

pd |mh mn`emd~` `d em s`npoojÿd n` em ohssp|ojÿd z m|sh|jmojÿd jdn`cjnm n` eh s`opsh

kpc`sdmg`d~me`$ Eh oh~` n` mngjdj~smojÿd s`emojhdmnh ohd em nj~sjcpojÿd z s`kj~sh

n` njoah c`d`bjojh ~mgcjêd |p`n`d njgjdpjs$ Mnjojhdmeg`d~` `~h p|hd` pdm

s`npoojÿd n` ~j`g|h n` `|`sm |msm eh ppmsjh hejoj~md~` eh }p` jg|ejom pd mpg`d~h

n` em ohghnjnmn n` eh ojpnmnmdh$

Pd `i`g|eh n` `~m m|ejomojÿd ohgh ` r`sí `d eh omh n` êqj~h mdmejymnh ` em

k`~jÿd n` mzpnm |hs |ms~` n`e Khcj`sdh n` \hehdjm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 60/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

2$3 M\EJOMOJHD@_ @D BM_@ N@ N@_MSSHEEH

Mnjojhdmeg`d~` m em m|ejomojhd` `qj~`d~` z njbpdnjnm mo~pmeg`d~` `d `e g`somnh

`qj~`d eçd`m n` n`mssheeh `d gpoah omh zm `d gmsoam n` omsm m em `q~`djÿd n`ph gí dhr`nhh }p` `d cm` m em h|jdjhd` n` eh `q|`s~h ohdpe~mnh `síd n`

ksmd p~jejnmn$

2$3$= O`d~sh n` m~`dojÿd n` eemgmnm

Em ~`odhehkçm cjhgê~sjom ` |`sbjemd ohgh em gí jnÿd`m `d `e ígcj~h n` em

|h~`dojme` ~`odhehkçm m m|ejoms `d eh o`d~sh n` m~`dojÿd n` eemgmnm$ @d ohdos`~h `e

s`ohdhojgj`d~h n` rhy hbs`o` |hjcjejnmn` `d rmsjm ís`m$

―Em |sjdoj|me r`d~mim }p` hbs`o` `e s`ohdhojgj`d~h n` rhy ` em dh d`o`jnmn

n` |s``dojm bçjom n`e ppmsjh |msm mp~`d~joms`‗

‣  Cmdom ~`e`bÿdjom9 _`kùd eh `q|`s~h ohdpe~mnh `d eh ùe~jgh mýh `~` ~j|h

n` `srjojh `~í os`oj`dnh `d `e g`somnh$ Ohdjn`smdnh }p` |msm s`mejyms

opme}pj`s h|`smojÿd |s`rjmg`d~` ` n`c` r`sjbjoms em jn`d~jnmn n` omnm oej`d~` `d

omnm eemgmnm `e ph n`e s`ohdhojgj`d~h |hs rhy s`pe~m `d pd mpg`d~h n` em

`kpsjnmn z em s`d~mcjejnmn me gjgh ~j`g|h$

‣  S`op|`smojÿd n` ohd~sm`ým9 @d homjhd` eh `srjojh n` m~`dojÿd me

oej`d~` n` em `d~jnmn` ~j`d`d njbjope~mn` |msm jn`d~jbjoms rçm ~`e`bÿdjom m ehppmsjh }p` d`o`j~md s`~mpsms p ohd~sm`ým$ @d `~` `d~jnh zm ` `~íd

`g|e`mdnh `d mekpdm ohg|mýçm j~`gm n` s`ohdhojgj`d~h n` rhy }p`

kmsmd~jymd }p` em |`shdm }p` `~í eemgmdnh ` }pj`d njo` `s n` gmd`sm }p` em

s`k`d`smojÿd n` em ohd~sm`ým n` eh ppmsjh ohs|hsm~jrh ` ohdrj`s~` `d pd

|sho`h gí s`j~`d~` me bsmpn`$

2$3$3 G`njh n` |mkh

@e ph n` em cjhg`~sçm `d ~`sgjdme` n` |pd~h n` r`d~m !^\R* s`npo` `e ~j`g|h `g|e`mnh

`d ~smdmoojhd` z njgjdpz` em |hjcjejnmn` n` `sshs` h ohdbpjhd`$ Ohgh `i`g|ehamz ohe`kjh }p` zm p~jejymd em ap`eem nmo~jems |msm `e |mkh n`e g`dù `d `e ohg`nhs

`ejgjdmdnh |shce`gm s`emojhdmnh ohd em |êsnjnm n` ~msi`~m herjnh n` dùg`sh n`

jn`d~jbjomojÿd ~smdmoojhd` gmdpme` z omskh m op`d~m `ssÿd`m$

2$3$? Ohd~she |ms`d~me

Ahz `d nçm ` |p`n`d pms ohd~she` |m~`sdh g`njmd~` ap`eem nmo~jems m|ejomnh me

moo`h m s`n` hojme` z m n`~`sgjdmnh j~jh {`c jdoepz`dnh em s`~sjoojhd` }p` eh

|mns` amzmd n`~`sgjdmnh |hs `i`g|eh `e bje~smnh n` ohd~`djnh em cù}p`nm n` |íkjdm

h `e ph n` oj`s~h `srjojh h m |ms~js n` oj`s~m ahsm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 61/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

2$3$> Rjkjemdojm

Em ~êodjom cjhgê~sjom hd p~jejymnm ohgh g`njnm n` rjkjemdojm |msm jn`d~jbjoms

osjgjdme` z h|`oahh `d~s` gpe~j~pn`$ Mohsn` m eh nhopg`d~h mdmejymnh `~`

omh n` ph s`}pj`s` n` smkh cjhgê~sjoh }p` |p`nmd `s mn}pjsjnh m pdm nj~mdojm

g`njm$ Em ~`odhehkçm gí p~jejymnm mo~pmeg`d~` ` `e s`ohdhojgj`d~h bmojme |`sh `d `e

`o~hs n` em cjhg`~sçm zm ` ohdho` }p` ` `~íd `g|`ymdnh m n`mssheems j~`gm }p`

p~jejymd em bhsgm n` mdnms ohgh smkh cjhgê~sjoh$

2$3$0 ^smdmoojhd` g`njmd~` ~`eêbhdh gÿrje`

@d em mo~pmejnmn em ~êodjom cjhgê~sjom ` `~íd ohg`dymdnh m n`mssheems `d

nj|hj~jrh gÿrje` ohd `e hci`~jrh n` |sh~`k`s `e moo`h m eh gjgh z m n`~`sgjdmnm

m|ejomojhd` s`mejyms |mkh h |msm em k`~jÿd n` ohd~sm`ým$

―Em cjhg`~sçm `d nj|hj~jrh gÿrje` ` pdm n` em bp~psm m|ejomojhd` gí

jd~ s`md~` z ohd gmzhs |shz`oojÿd‗

@d `~` `d~jnh omc` n`~moms em ~`odhehkçm DBO !D`ms Bj`en Ohggpdjom~jhd * jd~`ksmnm

`d em gmzhsçm n` eh ~`eêbhdh gÿrje` n` ùe~jgm k`d`smojÿd z p~jejymnm `d ohgcjdmojÿd

ohd cjhg`~sçm |msm em s`mejymojÿd n` |mkh$ _` |s`rê }p` `~m `sí pdm n` em |sjdoj|me`

eçd`m n` jdr`~jkmojÿd bp~psm n`cjnh m p ksmd |h~`dojme$

2$3$2 _mdjnmn

@e ph n` em cjhg`~sçm p|hd` pdm dp`rm |hjcjejnmn n`d~sh n`e `o~hs mdj~msjh m em ahsm

n` n`~`o~ms |shce`gm n` mepn$

―Em ~`odhehkçm cjhgê~sjom ~mgcjêd ` |p`n` m|ejoms m em mepn% ohd `e hci ~jrh

n` n`~`o~ms oj`s~m `db`sg`nmn` ` jdr`~jkms g`njomg`d~h‗

Mnjojhdmeg`d~` ~mgcjêd ` |hnsçm m|ejoms em cjhg`~sçm |msm jn`d~jbjoms m |moj`d~`

`|`ojmeg`d~` `d omh `d eh }p` `e jnjhgm ` pdm cmss`sm h `d eh }p` `qj~`d rmsjh

|moj`d~` ohd dhgcs` jgjems`$ N` `~` ghnh ` |p`n`d s`npojs |shce`gm s`em~jrh m

`sshs` gênjoh z bsmpn` me `kpsh gênjoh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 62/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 23 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

; OM_H_ N@ ÊQJ^H

@d `e |sho`h n` `d~s`rj~m ohd eh njb`s`d~` mo~hs` n`e `o~hs ` amd n`~momnhjg|hs~md~` jg|emd~mojhd` n` cjhg`~sçm m ksmd `omem `d `e gpdnh em opme` hd

ohdjn`smnm ohgh omh n` êqj~h n` em m|ejomojÿd n` em ~`odhehkçm cjhgê~sjom$

_` amd `e`oojhdmnh nh omh `|`oçbjoh n`cjnh |sjdoj|meg`d~` m p njr`sjnmn `d

opmd~h m bjdmejnmn z ~`odhehkçm `g|e`mnm9

‣ Moo`h sí|jnh m bshd~`sm m`sh|hs~pmsjm `d @|mým$

‣ K`~jÿd n` mzpnm |ùcejom `d \hehdjm$

M ohd~jdpmojÿd ` mdmejymd eh nh omh n`osjcj`dnh `e |shz`o~h z p hci`~jrh `e

dùg`sh n` ppmsjh |h~`dojme` em oemr` n` êqj~h eh |sjdoj|me` jdohdr`dj`d~` z

c`d`bjojh `dohd~smnh mç ohgh em `q|`sj`dojm `q~smçnm z em e`oojhd` m|s`dnjnm n` eh

gjgh$

\msm em `emchsmojÿd n` mgch omh n` êqj~h ` am ohd~mnh ohd em ohemchsmojÿd n`

|shb`jhdme` }p` |ms~joj|mshd `d `e n`mssheeh ` jg|emd~mojÿd n` mgch j~`gm eh

opme` ` |s`~mshd m em s`mejymojÿd n` pdm `d~s`rj~m `|`oçbjom z bmojej~mshd

nhopg`d~mojÿd mnjojhdme$

;$= MOO@_H SÍ\JNH M BSHD^@SM_ M@SH\HS^PMSJM_ !@_\MÝM*

;$=$= N`osj|ojÿd n`e |shz`o~h

\shz`o~h n` jg|emd~mojÿd n`e j~`gm Mp~hgm~jo Chsn`s Oshjdk !MCO* |msm `e moo`h

sí|jnh m bshd~`sm m`sh|hs~pmsjm |hs |ms~` n` Jdnsm _z~`g jg|pemnh |hs `e Gjdj~`sjh

n`e Jd~`sjhs n`e Khcj`sdh n` @|mým m ~smrê n` em _`os`~msçm n` @~mnh n` _`kpsjnmn ohd

n`~jdh em Ohgjmsçm K`d`sme n` @q~smdi`sçm z Bshd~`sm$

@e hci`~jrh n`e |shz`o~h ` em jg|emd~mojÿd n` pd j~`gm }p` mp~hgm~jo` `e |mhbshd~`sjyh `d em g`njnm n` eh |hjce` n` gmd`sm n`m~`dnjnm$ @~í n`~jdmnh m rjmi`sh

opzh hsjk`d h n`~jdh `~í bp`sm n`e ígcj~h `psh|`h$

@e j~`gm `~í bhsgmnh |hs pd ohdipd~h n` }pjhoh `d eh }p` ` jd~shnpo` pd |mmi`sh

}p` r`sjbjom p jn`d~jnmn |hs g`njh n`e s`ohdhojgj`d~h bmojme z n` ap`eem nmo~jems$

\h~`sjhsg`d~` z zm r`sjbjomnm p jn`d~jnmn moo`n` m ~smrê n` pdm |p`s~m

mp~hgí~jom$ Mnjojhdmeg`d~` eh mk`d~` bshd~`sjyh `~íd j~pmnh `d pdm omcjdm

|sÿqjgm n`n` em }p` ghdj~hsjymd ~hnh `e |sho`h ` jd~`srj`d`d `d omh n` }p` eh

ohdjn`s`d d`o`msjh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 63/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Jep~smojÿd =<9 Moo`h sí|jnh m bshd~`sm m`sh|hs~pmsjm

@e |sho`h ohgj`dym r`sjbjomdnh bçjomg`d~` `e |mm|hs~` g`njmd~` s`ohdhojgj`d~h n`

|m~shd` rjpme` z ohd~jdùm r`sjbjomdnh `e`o~sÿdjomg`d~` `e oaj| }p` ohd~j`d` `~`

nhopg`d~h$ \h~`sjhsg`d~` ee`rm m omch `e s`ohdhojgj`d~h nmo~jems z bmojme |msm momcms

ohd pdm ohdpe~m m cm` n` nm~h |hejojme` `d cpom n` md~`o`n`d~` h nhopg`d~h

shcmnh$

@qj~`d nh ~j|h n` jd~memojhd`9 n` |p`s~m jg|e` !}pjhoh nj~sjcpjnh |hs em mem n`

em ~`sgjdme z |p`s~m n` moo`h mp~hgí~jom* z n` `oepm !}pjhoh jd~`ksmnh `d em

|p`s~m mp~hgí~jom6 `d `~h j em r`sjbjomojÿd dh ~j`d` êqj~h `e |mmi`sh dh |p`n`

mrmdyms*$

@e j~`gm ` p~jejymnh |hs ?0< |mmi`sh njmsjmg`d~` ~`dj`dnh `d op`d~m }p` p ph dh

` hcejkm~hsjh$ @e `g|e`h n` `~` j~`gm `}pjrme` me ~smcmih n` hoah bpdojhdmsjh

|hejojme`$

@e |shz`o~h MCO _z~`g$ Ohd~she Mp~hgí~joh n` Bshd~`sm n`mssheemnh |hs `e Gjdj~`sjh

n`e Jd~`sjhs am jnh kmemsnhdmnh ohd dpg`shh |s`gjh `d~s` h~sh `e ―\s`gjh @DJ_@ 3

 

3<=< me g`ihs `srjojh h |shz`o~h ohd NDJ`‗$

3 @dop`d~sh Jd~`sdmojhdme n` _`kpsjnmn n` em Jdbhsgmojÿd hskmdjymnh |hs JD^@OH$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 64/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

;$=$3 @e`oojÿd n` cjhg`~sçm

_` amo` ph n` nh ~`odhehkçm cjhgê~sjom |msm hc~`d`s gmzhs kmsmd~çm `d em

r`sjbjomojÿd n` em jn`d~jnmn n` pdm |`shdm$

@d em `e`oojÿd n` em ~`odhehkçm m `g|e`ms ` h|~ÿ |hs `e s`ohdhojgj`d~h bmojme |hs p

bmojejnmn n` om|~psm z ~smcmih s`mejymnh |s`rjmg`d~` ohd `eem |hs |ms~` n` em `g|s`m

jg|emd~mnhsm$ \hs h~sh emnh em `e`oojÿd n` em ~`odhehkçm nmo~jems bp` gh~jrmnm |hs ~sm~ms`

n` pdm ~êodjom gmnpsm z m`}pjce` `ohdÿgjomg`d~` bs`d~` m h~sm }p` dh eh hd `d em

mo~pmejnmn$

;$=$? C`d`bjojh z oemr` n` êqj~h

Eh |sjdoj|me` c`d`bjojh hc~`djnh g`njmd~` em jg|emd~mojÿd hd9

‣ G`ihsm n` em sm~jh n` ohd~she` bshd~`sjyh }p` ` |p`n`d s`mejyms |hs pdjnmn n`

~j`g|h z |hs omnm mk`d~` n` |hejoçm$

‣ Jdos`g`d~h n` em `kpsjnmn$

‣ Gj~jkmojÿd n`e ~`ghs }p` ppmsjh z `d~jnmn` |p`nmd ~`d`s m em p~jejymojÿd n`

j~`gm cjhgê~sjoh$

Pdh n` eh |sjdoj|me` bmo~hs` }p` ee`rmshd me êqj~h n` `~m jg|emd~mojÿd bp` `e

ohg|shgjh n` ~hnh eh mo~hs` `d em s`mejymojÿd n`e |shz`o~h `d em b`oam mohsnmnm$

;$=$> Jdohdr`dj`d~`

_` amd jn`d~jbjomnh eh jkpj`d~` jdohdr`dj`d~`9

‣ N`ohdhojgj`d~h n` em ~`odhehkçm |hs |ms~` n` eh ppmsjh$

‣ @e`rmnh oh~` n` mn}pjjojÿd n`e j~`gm mpd}p` amz }p` `ýmems }p` ê~` `

mghs~jym n` bhsgm omj jdg`njm~m$

@d eh s`b`s`d~` m em jg|emd~mojÿd n`e j~`gm ` n`~momce` }p` ~`dj`dnh `d op`d~m pohg|e`ijnmn ` s`mejyÿ `d ~md ÿeh opm~sh g`` !n`n` em bmcsjomojÿd n` eh nj|hj~jrh

am~m em bjdmejymojÿd z bhsgmojÿd n` eh mk`d~`* eh }p` ` ohdjn`sÿ `e ksmd `oheeh n`e

|shz`o~h$

H~sh n` eh ohd~sm~j`g|h ` em a`~`shk`d`jnmn n` eh mo~hs` n` pd |shz`o~h }p` |ms~`

n` em _`os`~msçm n`e @~mnh |msm em _`kpsjnmn ~j`d` ohgh n`~jdm~msjh em Ohgjmsçm

K`d`sme n` @q~smdi`sçm z Bshd~`sm ` jg|ejom m pdm ohg|mýçm ohgh M`dm zm }p` em

jg|emd~mojÿd bp` s`mejymnm `d p jd~memojhd`$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 65/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 20 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

;$=$0 S`ohg`dnmojhd`

@d cm` m `~m `q|`sj`dojm opmdnh ` amcem n` j~`gm n` s`ohdhojgj`d~h cjhgê~sjoh

` am n` s`omeoms em jg|hs~mdojm n` }p` em om|~psm n` gp`~sm |msm `e s`kj~sh ` amkm

ohd pdm gçdjgm omejnmn }p` kmsmd~jo` `e êqj~h n`e |sho`h n` mp~`d~jomojÿd$ \hs eh ~md~h

` n`c` jdr`s~js `|`ojmeg`d~` `d j~`gm z nj|hj~jrh }p` kmsmd~jo`d njoam omejnmn

|`sh ~mgcjêd `d em bhsgmojÿd n` eh ~smcmimnhs` }p` `~êd jg|ejomnh `d `e |sho`h n`

s`kj~sh me gjgh ~j`g|h }p` n` eh ppmsjh

\hs h~sm |ms~` ` ``dojme bhg`d~ms }p` em hskmdjymojhd` z eh ppmsjh |j`snmd `e

gj`nh m pms `~` ~j|h n` ~`odhehkçm |msm em jn`d~jbjomojÿd$ _` ~sm~m n` ~`odhehkçm gpz

gmnpsm z m|hs~md gpoah c`d`bjojh$

;$=$2 Eçd`m n` n`mssheeh bp~psh@e |shz`o~h am jnh ohdjn`smnh pd êqj~h$ @ |hs `eeh }p` `qj~`d |emd` n` `q|mdjÿd m

h~sh |p`~h bshd~`sjyh !gí m`sh|p`s~h ` jdoeph |p`s~h gmsç~jgh* `g|e`mdnh pd

gmzhs dùg`sh n` `e`g`d~h n` r`sjbjomojÿd `d omnm pdm n` `eem$

@d n`bjdj~jrm ` am ohdoepjnh }p` eh j~`gm cjhgê~sjoh hd ríejnh |msm `e ohd~she n`

bshd~`sm$

;$3 K@_^JßD N@ MZPNM_ \ÙCEJOM_ !\HEHDJM*

;$3$= N`osj|ojÿd n`e |shz`o~h

_` ~sm~m n` pd |shz`o~h n` k`~jÿd n` mzpnm |ùcejom h~hskmnm |hs `e Khcj`sdh n`

\hehdjm m ~smrê n` omi`sh mp~hgí~joh mp~`d~jomdnh m eh ojpnmnmdh g`njmd~` `e

s`ohdhojgj`d~h n` em `~spo~psm n` em r`dm n` eh n`nh z pd \JD$

G`dpmeg`d~` pd ~h~me n` 3$<<< |`shdm amo`d ph n` em ~`odhehkçm `d omnm pdm n` em

20 popsme` `d em }p` `~í jd~memnm$

@e hci`~jrh ` em k`~jÿd n` em mzpnm kpc`sdmg`d~me` n` bhsgm `kpsm oÿghnm z

mp~hgm~jymnm$ @d pd |sjdoj|jh hemg`d~` ` ohdjn`sÿ em k`~jÿd n` em |s`~mojhd` |hsn``g|e`h |`sh mo~pmeg`d~` p ph ` am mg|ejmnh m h~sm mzpnm$

Ohd `e ph n` `~m ~`odhehkçm ` |s`~`dn` g`ihsms em `bjoj`dojm n` em k`~jÿd n` em

mzpnm kpc`sdmg`d~me`$ Ahz `d nçm j dh ` pm `e j~`gm cjhgê~sjoh em |`shdm

`d~s`km pd nhopg`d~h n` jn`d~jbjomojÿd `e opme ` ohg|sp`cm z ` s`ee`dmd pdm `sj` n`

bhsgpemsjh$ @~` |sho`h ` n`ghsm ohdjn`smce`g`d~` `d `e ~j`g|h$ @~h p`e`

ohdee`rms em os`mojÿd n` emskm ohem n` `|`sm |msm |hn`s moo`n`s m em mzpnm

|shrhomdnh `e n`ohd~`d~h n` eh ojpnmnmdh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 66/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 22 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Jep~smojÿd ==9 M|ejomojÿd |msm k`~jÿd n` mzpnm |ùcejom m ~smrê n` omi`sh mp~hgí~joh

_jd `gcmskh p~jejymdnh `e j~`gm jg|emd~mnh `e ppmsjh |p`n` mopnjs m pd omi`sh

mp~hgí~joh m em ahsm }p` e` s`pe~` gí ohdr`dj`d~` |msm hc~`d`s em mzpnm$ @~m

ohghnjnmn ` c`d`bjojhm ~md~h |msm `e cmdoh mejrjmdnh p hbjojdm n` oej`d~` |pnj`dnh

hbs`o`s pd g`ihs `srjojh ohgh |msm `e ppmsjh }p` dh d`o`j~m mopnjs `d ahsmsjh n`m|`s~psm n` hbjojdm$

;$3$3 Ph n` cjhg`~sçm

_` h|~ÿ |hs em ~`odhehkçm cjhgê~sjom ~sm |shcms pd j~`gm }p` ohgcjdm `e ph n` pd \JD

z pdm ~msi`~m }p` jdohs|hsmcm pd oaj| `e`o~sÿdjoh$ @e s`pe~mnh n` `~m |sp`cm bp` gpz

d`km~jrh zm }p` eh ppmsjh herjnmcmd ohd bs`op`dojm `e oÿnjkh \JD em ~msi`~m `

n`~`sjhsmcm z `d homjhd` `e \JD `sm mdh~mnh |msm `rj~ms p herjnh j`dnh `dohd~smnh z

p~jejymnh |hs ~`so`sm |`shdm ipd~h ohd em ~msi`~m |msm moo`n`s bsmpnpe`d~mg`d~` m em

mzpnm$

_j`dnh em |sjhsjnmn` n`e khcj`sdh |hemoh em epoam ohd~sm `e bsmpn` z `e mpg`d~h n` em

`kpsjnmn ` h|~ÿ |hs pd j~`gm cjhgê~sjoh$

;$3$? C`d`bjojh z oemr` n` êqj~h

Em |sjdoj|me` r`d~mim jn`d~jbjomnm hd9

‣ Mpg`d~h n` em `bjoj`dojm me n`njoms` g`dh ~j`g|h m em ohg|shcmojÿd n`

nhopg`d~h n` jn`d~jbjomojÿd |hs |ms~` n`e cmdoh$

‣ G`ihsm n`e `srjojh hbs`ojnh me ojpnmnmdh me s`npojs em `|`sm `qj~`d~`$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 67/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣ G`ihsm n` em `kpsjnmn jdohs|hsmdnh `e bmo~hs ―eh }p` `s`‗ `d `e ghn`eh n`

mp~`d~jomojÿd z rj~mdnh mç |hjce` bsmpn`$

Mnjojhdmeg`d~` ohdee`rm ksmdn` r`d~mim `d ~êsgjdh n` mahssh z `bjoj`dojm |msm `ekhcj`sdh zm }p` `e |mç k`~jhdm ksmdn` omd~jnmn` n` njd`sh `d |sho`h n` |mkh

hojme ohgh |`djhd` pcjnjh |msm `e n``g|e`h `~o$

Pdm n` em oemr` n`e êqj~h bp` }p` em |hcemojÿd |pnh |`sojcjs sí|jnmg`d~` eh c`d`bjojh

}p` ` hc~j`d`d n` p ph$

Dh hc~md~` `e bmo~hs gí osç~joh |msm `e êqj~h ` em `kpsjnmn z em |sjrmojnmn zm }p` `

~sm~m n` pd j~`gm `d `e }p` eh nm~h n`e ppmsjh }p` ` megmo`dmd `d `e cmdoh

!Aj~moaj em `g|s`m jg|emd~mnhsm dh megmo`dm dmnm* hd `e dùg`sh |`shdme n`

jn`d~jbjomojÿd `e dhgcs` `e nhgjojejh `e dùg`sh n` op`d~m cmdomsjm z em mzpnm

kpc`sdmg`d~me ohss`|hdnj`d~`$ Ohgh g`njnm n` `kpsjnmn dh ` megmo`dm p

jdbhsgmojÿd cjhgê~sjom ohg|e`~m jdh }p` ` kpmsnm pdm gp`~sm `dosj|~mnm$

;$3$> Jdohdr`dj`d~`

@e |sjdoj|me |shce`gm `dohd~smnh am jnh em d`o`jnmn n` bhsgms m em |`shdm |msm `e

ph n`e j~`gm |p`~h }p` eh ppmsjh dh j`g|s` ~j`d`d eh ohdhojgj`d~h pbjoj`d~`

|msm p~jejymseh mn`opmnmg`d~`$

\msm `rj~ms `sshs` `e |`shdme n` em hbjojdm cmdomsjm am ~`djnh }p` jdr`s~js ~j`g|h `d`d`ýms m eh ppmsjh m p~jejymseh$ @~` jdohdr`dj`d~` ` hepojhdm ohd `e ~smdopsh n`e

~j`g|h m g`njnm }p` eh ojpnmnmdh ` moh~pgcsmd m em p~jejymojÿd n`e j~`gm$

;$3$0 S`ohg`dnmojhd`

Pdm |`so`|ojÿd n` jd`kpsjnmn |hs |ms~` n` eh ppmsjh amojm `e j~`gm |p`n` jg|ejoms

p d`km~jrm m pmseh$ @ |hs `eeh }p` ` ``dojme ~smdgj~js ohdbjmdym m eh ojpnmnmdh

amojêdnhe` ohdoj`d~` n` }p` `e shch n` p nm~h ` gpz |hoh |shcmce` z }p` `e

j~`gm ` `kpsh |msm p mepn$

;$3$2 Eçd`m n` n`mssheeh bp~psh

@qj~`d rmsjh omh n` n`mssheeh `d `~pnjh$ @d em cmdom ohg`sojme |p`n` `s pmnh

|msm rmejnms opme}pj`s |sho`h }p` `e ppmsjh n``msm s`mejyms ohd `e cmdoh$ @d epkms n`

}p` em |`shdm amkmd ph n` pd nhopg`d~h n` jn`d~jbjomojÿd ` s`kj~smd p smkh

cjhgê~sjoh }p` ` pmsçmd |msm mp~`d~joms ~smdmoojhd` ohd~sm~h mop`snh ~o$

_` `~í ~smcmimdnh `d }p` opme}pj`s ~smdmoojÿd }p` mo~pmeg`d~` ` rmejn` ohd em bjsgm

`e`o~sÿdjom h gmdposj~m n` pdm |`shdm ` amkm g`njmd~` `e ph n` bjsgm cjhgê~sjom$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 68/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 21 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

1 GMSOH S@KPEM^HSJH

Pd m|`o~h n` `|`ojme s`e`rmdojm `d s`emojÿd m em jg|emd~mojÿd n` j~`gm cjhgê~sjoh` em s`kpemojÿd dhsgm~jrm }p` n`bjd` eh s`}pjj~h z hcejkmojhd` m opg|ejs$ @~h `

n`c` `|`ojmeg`d~` m }p` eh nm~h cjhgê~sjoh hd ohdjn`smnh n` omsío~`s |`shdme

|hs eh }p` p ~sm~mgj`d~h `~í s`kpemnh n` omsm m |s``srms em |sjrmojnmn n` eh ppmsjh$

1$= DHSGM^JRM E@KME

M ohd~jdpmojÿd ` s`pg` em |sjdoj|me dhsgm~jrm z ipsj|spn`dojm mo~pmeg`d~` m|ejomce` me

ph n` j~`gm n` ~sm~mgj`d~h n` nm~h cjhgê~sjoh$

―@qj~`d dhsgm~jrm k`d`sme` pbjoj`d~` s`emojhdmnm ohd em |sh~`oojÿd n`

nm~h |`shdme`% mpd}p` dh ` s`bj`smd |`oçbjomg`d~` m em cjhg ~sçm‗

Em Mk`dojm @|mýhem n` \sh~`oojÿd n` Nm~h !M@\N* n`bjd` eh nm~h cjhgê~sjoh ohgh9

―m}p`eeh m|`o~h bçjoh }p`% g`njmd~` pd mdíejj ~êodjoh% |`sgj~`d 

nj~jdkpjs em jdkpemsjnmn` }p` ohdopss`d s`|`o~h n` njoah m|`o~h z 

}p`% s`pe~mdnh }p` ` jg|hjce` em ohjdojn`dojm n` ~me` m|`o~h `d nh 

jdnjrjnph% pdm r`y |sho`mnh% |`sgj~`d `srjs |msm jn`d~jbjoms me jdnjrjnph `d 

op`~jÿd‗ ? 

M eh j~`gm jdbhsgí~joh g`njmd~` eh opme` ` ~sm~`d nm~h cjhgê~sjoh n` |`shdm

bçjom jn`d~jbjomnm h jn`d~jbjomce` ` e` n`c`d m|ejoms em

$

g`njnm n` `kpsjnmn n`

omsío~`s bçjoh ~êodjoh z(p hskmdjym~jrh omejbjomnm ohgh n` djr`e cíjoh |hs `e ^ç~peh RJJJ

n`e S`kemg`d~h n` N`mssheeh n` em EH\N>$ @d `e omh n` }p` eh nm~h cjhgê~sjoh

hci`~h n` ~sm~mgj`d~h `d `e j~`gm |pnj``d mn`gí `dohd~sms` `r`d~pmeg`d~`

mhojmnh h rjdopemnh m em mepn n` eh mb`o~mnh ohgh |hs `i`g|eh `d `e p|p`~h n`

njom|mojnmn` bçjom s`pe~msçm ~mgcjêd d`o`msjm em jg|emd~mojÿd n` em g`njnm n`

`kpsjnmn n` djr`e g`njh z me~h0

M ohd~jdpmojÿd ` n`~meem em dhsgm~jrm n` m|ejomojÿd me ph n` j~`gm njsjkjnh me~sm~mgj`d~h n` `~` ~j|h n` nm~h cjhgê~sjoh mç ohgh em |sjdoj|me ipsj|spn`dojm

mhojmnm$

$

? Jdbhsg` Ipsçnjoh dùg`sh <?21(3<<2 n` em Mk`dojm @|mýhem n` \sh~`oojÿd n` Nm~h hcs` ap`eem nmo~jems$> Em g`njnm n` djr`e cíjoh jdoepz`d em jkpj`d~` op`~jhd`9 n`bjdjojÿd n` eh n`c`s` z em bpdojhd` n`e |`shdme ohdmoo`h m eh nm~h cjhgê~sjoh6 s`kj~sh n` jdojn`dojm s`emojhdmnm ohd `~h bjoa`sh6 ohd~she n` moo`h m `eeh6 k`~jÿdn` h|hs~` z nhopg`d~h }p` eh ohd~`dkmd6 jn`d~jbjomojÿd z mp~`d~jomojÿd n` ppmsjh me moo`n`s m `~h nm~h6 z`~mce`ojgj`d~h n` |sho`njgj`d~h |msm em s`mejymojÿd n` oh|jm n` s`|menh z s`op|`smojÿd s`|`o~h m ~h bjoa`sh$0 Em g`njnm n` djr`e me~h mn`gí n` em n` djr`e cíjoh !r`s dh~m m |j` n` |íkjdm md~`sjhs* jdoepz`d em n` djr`e g`njh$Em g`njnm n` djr`e g`njh ohg|s`dn`d9 dhgcsmgj`d~h n` pd s`|hdmce` n` `kpsjnmn6 s`mejymojÿd n` mpnj~hsçm cj`dme6

k`~jÿd n` h|hs~` z nhopg`d~h6 jn`d~jbjomojÿd z mp~`d~jomojÿd6 ohd~she n` moo`h bçjoh6 s`kj~sh n` jdojn`dojm$ Emg`njnm n` djr`e me~h jdoepz`d em k`~jÿd z nj~sjcpojÿd n` h|hs~`6 oh|jm n` s`|menh z s`op|`smojÿd6 s`kj~sh n` moo`h6z `opsjymojÿd n` em ~smdgjjÿd n` nm~h m ~smrê n` s`n` n` ~`e`ohgpdjomojhd`$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 69/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

1$=$= Dhsgm~jrm n` em Pdjÿd @psh|`m

N`n` em Pdjÿd @psh|`m ` amd |emd~`mnh pdm `sj` n` op`~jhd` `d s`emojÿd m em

|sjrmojnmn n` eh ojpnmnmdh }p` amd ee`rmnh m em n`bjdjojÿd n` mekpdm njs`o~sjo` z

s`kemg`d~mojhd` }p` hsj`d~md z `d mekpdh omh hcejkmd m eh `~mnh gj`gcsh m em

ahsm n` e`kjems hcs` `~h m|`o~h$

@d mekpdh omh ` ~sm~m n` bhsgm k`dêsjom eh nm~h n` omsío~`s |`shdme gj`d~sm }p`

`d h~sh ` mchsnm `|`oçbjomg`d~` `e ~sm~mgj`d~h n` eh nm~h cjhgê~sjoh$

J$ Njs`o~jrm s`em~jrm m em |sh~`oojÿd n` em |`shdm bçjom `d eh }p` s`|`o~m me~sm~mgj`d~h n` nm~h |`shdme` z m em ejcs` ojsopemojÿd n` `~h nm~h2

_p hci`~jrh bpdnmg`d~me ` }p` ~hnh eh @~mnh gj`gcsh n` em Pdjÿd @psh|`m

kmsmd~jo`d em mn`opmnm |sh~`oojÿd n`e n`s`oah m em jd~jgjnmn `d eh }p` s`|`o~m me~sm~mgj`d~h n` nm~h |`shdme $

_p ms~çopeh 3 m* n`bjd` eh nm~h |`shdme` ohgh

―~hnm jdbhsgmojÿd hcs` pdm |`shdm bçjom jn`d~jbjomnm h jn`d~jbjomce` !`e 

‖  jd~`s`mnh‚*6 ` ohdjn`smsí jn`d~jbjomce` ~hnm |`shdm opzm jn`d~jnmn |p`nm 

n`~`sgjdms`% njs`o~m h jdnjs`o~mg`d~`% `d |ms~jopems g`njmd~` pd dùg`sh n` 

jn`d~jbjomojÿd h pdh h rmsjh `e`g`d~h `|`oçbjoh% omsmo~`sç~joh n` p 

jn`d~jnmn bçjom% bjjheÿkjom% |ç}pjom% `ohdÿgjom% ope~psme h hojme ‗$

N` `eeh ` n`sjrm }p` eh nm~h cjhgê~sjoh ` |p`n`d ohdjn`sms ohgh nm~h

|`shdme` m eh }p` ` m|ejomsçm em e`kjemojÿd |`s~jd`d~`$

_` ~sm~m n` pdm Njs`o~jrm n` gçdjgh jg|e`g`d~mnm `d @|mým m ~smrê n` em E`z

Hskídjom =0(=::: n` =? n` njoj`gcs` n` \sh~`oojÿd n` Nm~h n` Omsío~`s

\`shdme z |hs eh ~md~h dh ~j`d` m|ejomojÿd njs`o~m$ @e djr`e n` |sh~`oojÿd hbs`ojnh

|hs em oj~mnm E`z Hskídjom ` `dop`d~sm mejd`mnh ohd `e n` em Njs`o~jrm$

@d gm~`sjm n` cjhg`~sçm `e Ksp|h n` ^smcmih os`mnh |hs `e ms~çopeh 3: n` emNjs`o~jrm;

 2 Njs`o~jrm :0(>2(O@ n`e \msemg`d~h @psh|`h z n`e Ohd`ih n` 3> n` ho~pcs`$ N$H$P$@$ `sj` E dùg$ 31= n` 3? n`dhrj`gcs` n` =::0$

am `emchsmnh pd Nhopg`d~h n` ^smcmih hcs` Cjhg`~sçm n` b`oam = n`

mkh~h n` 3<<?$ _p |sh|ÿj~h ` ohd~sjcpjs m em m|ejomojÿd `bjomy z msghdjhm n` em

nj|hjojhd` dmojhdme` hcs` |sh~`oojÿd n` nm~h mnh|~mnm n` mop`snh ohd em

Njs`o~jrm m eh j~`gm cjhgê~sjoh$ _` o`d~sm |sjdoj|meg`d~` `d em m|ejomojhd`

cjhgê~sjom |msm bjd` n` mp~`d~jomojÿd z ohg|shcmojÿd$ N` `~m gmd`sm `e Ksp|h

n` ^smcmih n`e ms~çopeh 3: |s`~`dn` |sh|hsojhdms pdm hsj`d~mojhd` `psh|`m

; Ksp|h os`mnh `d rjs~pn n`e ms~çopeh 3: n` em Njs`o~jrm :0(>2(O@ ohd~j~pjnh ohgh `e ÿskmdh m`hs ohgpdj~msjhjdn`|`dnj`d~` hcs` |sh~`oojÿd n` nm~h z n` em rjnm |sjrmnm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 70/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

pdjbhsg` `|`ojmeg`d~` |msm `e `o~hs n` eh j~`gm cjhgê~sjoh z |msm eh

ppmsjh n` ~m ~`odhehkçm$

JJ$ S`kemg`d~h hcs` Dhsgm |msm em g`njnm n` `kpsjnmn z nm~h cjhgê~sjoh`d eh |mm|hs~` z nhopg`d~h n` rjmi` `q|`njnh |hs eh @~mnhgj`gcsh1

^j`d` |hs hci`~h em msghdjymojÿd n` em g`njnm n` `kpsjnmn `d~s` em }p` `

`dop`d~smd eh jn`d~jbjomnhs` cjhgê~sjoh z |msm `eeh s`ohk` n`~`sgjdmnm

`|`ojbjomojhd` n` omsío~`s ~êodjoh$

1$=$3 Dhsgm~jrm |mýhem

^hgmdnh ohgh s`b`s`dojm em jdnjomojhd` |shr`dj`d~` n` em Pdjÿd @psh|`m em

e`kjemojÿd `|mýhem am n`mssheemnh pdm `sj` n` dhsgm~jrm `d s`emojÿd me ~sm~mgj`d~hn` nm~h n` omsío~`s |`shdme jdoepzêdnh` `d `eeh eh nm~h cjhgê~sjoh$

@~m dhsgm~jrm `~í cmmnm `d em E`z Hskídjom n` \sh~`oojÿd n` Nm~h p S`kemg`d~h

n` N`mssheeh z em Jd~spoojhd` z S`hepojhd` n` em Mk`dojm @|mýhem n` \sh~`oojÿd

n` Nm~h !M@\N*$

J$ E`z Hskídjom =0(=:::% n` =? n` njoj`gcs`% n` \sh~`oojÿd n` Nm~h n` Omsío~`s\`shdme z S`me N`os`~h =;3<(3<<;% n` 3= n` njoj`gcs`% |hs `e }p` ` m|sp`cm`e S`kemg`d~h n` N`mssheeh n` em EH\N:

_` ~sm~m n` em dhsgm~jrm |sjghsnjme` `d opmd~h m |sh~`oojÿd n` nm~h |`shdme` `d

@|mým z n`bjd`d eh nm~h n` omsío~`s |`shdme ohgh ―opme}pj`s jdbhsgmojÿd 

ohdo`sdj`d~` m |`shdm bçjom jn`d~jbjomnm h jn`d~jbjomce` ‗$ \msm p |sh~`oojÿd

`~mce`o`d pdm `sj` n` hcejkmojhd` z |sjdoj|jh n` hcejkmnh opg|ejgj`d~h |msm ~hnm

m}p`eem `d~jnmn` h `g|s`m ~md~h n`e `o~hs |ùcejoh ohgh |sjrmnh }p` ~sm~`d nm~h

n` omsío~`s |`shdme |msm `e n`mssheeh n` p mo~jrjnmn9

‣ N`c`s n` jdosj|ojÿd n` bjoa`sh `d `e S`kj~sh K`d`sme n` em M@\N6

‣ N`c`s n` jdbhsgmojÿd m eh mb`o~mnh6

‣ N`c`s n` hc~`dojÿd n`e ohd`d~jgj`d~h n`e jd~`s`mnh6

‣ \sjdoj|jh n` omejnmn n` eh nm~h ~sm~mnh6

‣ S`|p`~m me `i`sojojh n` eh n`s`oah n` moo`h s`o~jbjomojÿd omdo`emojÿd z

h|hjojÿd |hs |ms~` n` eh jd~`s`mnh !ohdhojnh ohgh n`s`oah MSOH*$

1S`kemg`d~h !O@* 3<<>(3303(O@ n` =? n` njoj`gcs` n`e Ohd`ih$ Ghnjbjomnh |msojmeg`d~` |hs `e S`kemg`d~h !O@* D¹>>>(3<<: n`e \msemg`d~h @psh|`h z n`e Ohd`ih n` 31 n` gmzh n` 3<<:$: C$H$@$ dùg$ 3:1 n` => n` njoj`gcs` n` =::: z C$H$@$ dùg$ =; n` =: n` `d`sh n` 3<<; s`|`o~jrmg`d~`$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 71/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣ Hcejkmojÿd n` jg|emd~mojÿd n` g`njnm n` `kpsjnmn `d~s` h~sm$

_`kùd eh `q|`s~h ohdpe~mnh `d `e ígcj~h n` em cjhg`~sçm ` `|`ojmeg`d~` s``ýmce`

`e ms~çopeh 2$= n` em EH\N `e opme `~mce`o` ohd omsío~`s k`d`sme em d`o`jnmn n` emhc~`dojÿd n`e ohd`d~jgj`d~h n`e mb`o~mnh |msm `e ~sm~mgj`d~h n` p nm~h n` omsío~`s

|`shdme$

Dh hc~md~` n` ohdbhsgjnmn ohd `e ms~çopeh 2$3 n` em EH\N dh `sí d`o`msjh `e

ohd`d~jgj`d~h `d~s` h~sh p|p`~h opmdnh eh nm~h ―` s`bj`smd m em |ms~` n` pd 

ohd~sm~h h |s`ohd~sm~h n` pdm s`emojÿd d`khojme% emchsme h mngjdj~sm~jrm z `md 

d`o`msjh |msm p gmd~`djgj`d~h h opg|ejgj`d~h ‗$ @d em |sío~jom |hs `i`g|eh dh `sí

d`o`msjh `e ohd`d~jgj`d~h |msm ~sm~ms eh nm~h |`shdme` n` pd ~smcmimnhs opmdnh

njoah ~sm~mgj`d~h `~ê s`emojhdmnh ohd `e gmd~`djgj`d~h z opg|ejgj`d~h n` em s`emojÿdemchsme !|mkh n` dÿgjdm ohd~she ahsmsjh `~o$*$ 

@ `d `e ^ç~peh RJJJ S`kemg`d~h n` N`mssheeh nhdn` ` n`~meemd em g`njnm n` `kpsjnmn

n` omsío~`s bçjoh ~êodjoh z hskmdjym~jrh n` djr`e cíjoh ( g`njh ( me~h }p` n`c`síd `s

jg|emd~mnm hcs` eh j~`gm cjhgê~sjoh z(p h~sh h|hs~` |hs |ms~` n` m}p`eem

`d~jnmn` h `g|s`m }p` ~sm~`d nm~h cjhgê~sjoh n` eh mb`o~mnh$ 

JJ$ Jd~spoojÿd =(=::2% n` = n` gmsyh% n` em M@\N% hcs` bjoa`sh `~mce`ojnhohd em bjdmejnmn n` ohd~shems `e moo`h m eh `njbjojh=<

@~m Jd~spoojÿd s`kpem n` gmd`sm `|`oçbjom eh nm~h n` omsío~`s |`shdme ~sm~mnh n`

bhsgm mp~hgm~jymnm }p` hd s`omcmnh |hs eh `srjojh n` `kpsjnmn ohd em bjdmejnmn n`

ohd~shems `e moo`h m eh `njbjojh |ùcejoh z |sjrmnh mç ohgh m `~mce`ojgj`d~h

`|`o~íopeh o`s~íg`d` z ohdr`dojhd`$

$

Em Jd~spoojÿd r`sm hcs` em e`kj~jgmojÿd n`e ~sm~mgj`d~h n` eh nm~h s`oh|jemnh `d

opg|ejgj`d~h n` em bpdojhd` n` rjkjemdojm em g`njnm n` `kpsjnmn }p` e` hd n`

m|ejomojÿd `e |`sjhnh `d }p` eh gjgh n`cmd `s ohd`srmnh z p |h~`sjhs

omdo`emojÿd |hs amc`s n`imnh n` `s d`o`msjh h |`s~jd`d~` |msm eh bjd` |msm eh }p`

bp`shd s`omcmnh$ @e ph n` j~`gm cjhgê~sjoh |msm `e ohd~she n` moo`h bçjohn`c`sí ~`d`s `d op`d~m `~m Jd~spoojÿd$

JJJ$ S`me N`os`~h =00?(3<<0% n` 3? n` njoj`gcs`% }p` S`kpem em `q|`njojÿd n`eNhopg`d~h Dmojhdme n` Jn`d~jnmn z p o`s~jbjomnh n` bjsgm `e`o~sÿdjom

@d s`emojÿd m eh nm~h cjhgê~sjoh ohd~`djnh `d `e Nhopg`d~h Dmojhdme n` Jn`d~jnmn

!N$D$J$* `~` S`me N`os`~h `~mce`o` dhsgm `d s`emojÿd ohd p `q|`njojÿd$

=< C$H$@$ dùg$ 23 n` =3 n` gmsyh n` =::2$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 72/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;3 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

_`kùd `~mce`o` p ms~çopeh 0 |msm |hn`s hejoj~ms em `q|`njojÿd n`e N$D$J$ `

jg|s`ojdnjce` em |s``dojm bçjom n` em |`shdm nmnh }p` `d `e ghg`d~h n` em hejoj~pn

me jd~`s`mnh ` e` s`ohk`síd em jg|s`jhd` nmo~jems` n` eh n`nh çdnjo` n` mgcm

gmdh$

Mjgjgh `kùd `ýmem `e ms~çopeh == `e oaj| jdohs|hsmnh m em ~msi`~m h|hs~` n`e N$D$J$

ohd~`dnsí `d~s` h~sm op`~jhd` em |emd~jeem n` em jg|s`jÿd nmo~jems n`e n`nh çdnjo` n` em

gmdh n`s`oam h `d p omh n`e n`nh }p` ohss`|hdnm `kùd eh jdnjomnh `d `e ms~çopeh

0$? n`e S`me N`os`~h$

JR$ Dhsgm~jrm mp~hdÿgjom

Nmnm em `qj~`dojm n` mekpdm mk`dojm n` |sh~`oojÿd n` nm~h m djr`e mp~hdÿgjoh `

d`o`msjh `ýmems }p` `qj~`d s`kpemojhd` `~mce`ojnm |hs ê~m n`d~sh n` p ígcj~hn` moojÿd$

‣ Ohgpdjnmn n` Gmnsjn9 E`z 1(3<<=% n` =? n` ipejh% n` \sh~`oojÿd n` Nm~h n` 

Omsío~`s \`shdme `d em Ohgpdjnmn n` Gmnsjn ==

‣ \mç Rmoh9 E`z 3(3<<>% n` 30 n` b`cs`sh% n` Bjoa`sh n` Nm~h n` Omsío~`s 

\`shdme n` ^j~pemsjnmn \ùcejom z n` Os`mojÿd n` em Mk`dojm Rmom n` \sh~`oojÿd 

n` Nm~h 

=3 

‣ Om~mepým9 E`z ?3(3<=<% n` = n` ho~pcs`% n` em Mp~hsjnmn Om~memdm n` \sh~`oojÿd 

n` Nm~h 

=? 

1$3 JDBHSG@_ IPSÇNJOH_ Z IPSJ_\SPN@DOJM

$

1$3$= Jdbhsg` ipsçnjoh z h~sh nhopg`d~h jd~`s|s`~m~jrh

\hs h~sh emnh `qj~`d njb`s`d~` Jdbhsg` ipsçnjoh ~md~h m djr`e `psh|`h ohgh dmojhdme

}p` nmd s`|p`~m m em |hjce` npnm hcs` `e `d~jnh s`me n` em dhsgm~jrm `d oj`s~h

m|`o~h$ @~h jdbhsg` `d gpoah omh s`|hdn`d m em ohdpe~m |emd~`mnm md~`

omh |sío~joh |hs eh }p` `i`g|ejbjomd `d ksmd g`njnm em |shce`gí~jom }p` ` n`c`d~`d`s `d op`d~m `d em jg|emd~mojÿd n` `~h j~`gm$

== Che`~çd Hbjojme n` em Ohgpdjnmn n` Gmnsjn n` 30 n` ipejh n` 3<<=$

=3 Che`~çd Hbjojme n`e \mç Rmoh dùg$ >> n` > n` gmsyh 3<<>$=? Njmsj Hbjojme n` em K`d`smej~m~ n` Om~mepdzm d¹$ 0;?= 1 n` ho~pcs` n` 3<=<$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 73/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

J$ Jdbhsg` n` j~pmojÿd s`em~jrh m em m|ejomojÿd n` eh |sjdoj|jh n` emOhdr`dojÿd =<1 m em s`ohkjnm z me |sho`h n` eh nm~h cjhgê~sjoh `gj~jnh`d @~smcpskh% `d b`cs`sh n` 3<<0% |hs `e Ohgj~ê Ohdpe~jrh n` em Ohgjjÿd

|msm em \sh~`oojÿd n` em \`shdm s`|`o~h me |sho`h mp~hgm~jymnh n` ehnm~h n` omsío~`s |`shdme

S`pe~mnh n` eh ~smcmih jdjojmnh `d `e mýh 3<<? |hs `e Ksp|h n` \shz`o~h hcs` em

\sh~`oojÿd n` Nm~h cmih em ~p~`em n`e Ohgj~ê @psh|`h n` Ohh|`smojÿd Ipsçnjom `

n`njom `|`oçbjomg`d~` me ~sm~mgj`d~h n` nm~h cjhgê~sjoh$

@d~s` em |sjdoj|me` ohdoepjhd` n`~mom }p` m ipjojh n`e Ksp|h md~` n` s`opssjs` m em

cjhg`~sçm `e s`|hdmce` n`e |sho`h n`c`sçm `rmepms |hs pdm |ms~` em r`d~mim `

jdohdr`dj`d~` |hjce` |msm em rjnm |sjrmnm n` em |`shdm mb`o~mnm z |hs h~sm em

bjdmejnmn` |s`rj~m mç ohgh ~`d`s `d op`d~m |hjce` hepojhd` me~`sdm~jrm }p`p|hdkmd pd g`dhs m~`d~mnh ohd~sm em rjnm |sjrmnm$ @d ohd`op`dojm eh nm~h

cjhgê~sjoh ~sm~mnh n`c`sçmd `s mn`opmnh |`s~jd`d~` z dh `qo`jrh `d ohg|msmojÿd

ohd em bjdmejnmn n`e |sho`h$

\hs h~sh emnh ` |hd` n` gmdjbj`~h }p` em |`shdm mb`o~mnm n`c`sçm `s jdbhsgmnm n` em

bjdmejnmn n`e j~`gm z n` em jn`d~jnmn n`e s`|hdmce` n` |sho`h mç ohgh n` eh nm~h

|sho`mnh z n` em om~`khsçm n` |`shdm m em }p` ` ohgpdjomsíd `h nm~h$

JJ$ Jdbhsg` Ipsçnjoh d¹ <?3>(3<<: hcs` `e ―Moo`h me nm~h ap`eem nmo~jems n``g|e`mnh n` pdm `g|s`m |hs h~sm$ @domskmnh n`e ~sm~mgj`d~h‗

S`|hdn` m pdm ohdpe~m |emd~`mnm m em M@\N `d s`emojÿd m em |hjcjejnmn n` jg|emd~ms

pd j~`gm |msm `e ohd~she ahsmsjh n` eh ~smcmimnhs` cmmnh `d em e`o~psm n` em ap`eem

njkj~me z p ohdbhsgjnmn ohd eh nj|p`~h `d em EH\N z `d `e SNEH\N$

@d ohdos`~h em M@\N mdmejym `e p|p`~h `d }p` `e s`|hdmce` n` njoah j~`gm pdm

n` em ohgpdjnmn` }p` ohg|hd`d pdm gmdohgpdjnmn `dohg`dnm` m em oj~mnm

gmdohgpdjnmn `e ~sm~mgj`d~h n`e nm~h n` em ap`eem nmo~jems n` p ~smcmimnhs` ohd em

bjdmejnmn `|`oçbjom n` ohd~she ahsmsjh n` ~smcmih$ Md~` `~` omh em M@\N ohdjn`sm

d`o`msjh posjcjs `e ohd~sm~h n` `domskmnh n`e ~sm~mgj`d~h |s`rj~h `d ms~çopeh =3 n` em

EH\N z `d `e Om|ç~peh JJJ n`e ^ç~peh JJ n`e SNEH\N$

N` `~` ghnh em M@\N |hd` n` gmdjbj`~h }p` `d omh n` n`e`kms `e ~sm~mgj`d~h n` eh

nm~h cjhgê~sjoh m pd ~`so`sh ` `~msçm |shnpoj`dnh pd moo`h m nm~h |hs op`d~m n`

~`so`sh }p` amcsçm n` s`kpems` ohdbhsg` me ms~çopeh =3 n` em EH\N$

JJJ$ Jdbhsg` Ipsçnjoh d¹ <<13(3<=< hcs` em ―Os`mojÿd n` pdm cm` n` nm~h m~smrê n` em ap`eem nmo~jems }p`nm hg`~jnh m em EH\N‗

_j cj`d `~` jdbhsg` ` `gj~` ohd `e bjd n` nms s`|p`~m m em ohdpe~m hcs` j em os`mojÿd

n` pdm cm` n` nm~h ohd ap`eem nmo~jems n` eh oej`d~` me }p` ` h~hskm pd oÿnjkh

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 74/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

mebmdpgêsjoh n`c` s`kj~sms` `d em M@\N n` ohdbhsgjnmn ohd em EH\N `e oj~mnh

Hskmdjgh mchsnm em |sh|hsojhdmejnmn n` em mnh|ojÿd n` em s`b`sjnm g`njnm9

―V•W s`pe~m n`|sh|hsojhdmnh% em d`o`jnmn n` s`omcms em ap`eem nmo~jems |msm |s`~ms pd `srjojh ohg`sojme m eh oej`d~`% opmdnh njoah `srjojh |p`n` 

|s`~ms` ohd h~sh g`njh g`dh jd~spjrh `d eh n`s`oah z ejc`s~mn` n` 

eh oej`d~`% ~me` ohgh `e ph n` em ~msi`~m n` bjn`ejymojÿd ‗$

N` `~` ghnh em M@\N gp`~sm pdm njb`s`dojmojÿd `d~s` `e osj~`sjh `kpjnh `d eh

omh n` ohd~she n` |s``dojm n` `g|e`mnh z `e gmdjb`~mnh `d `e omh n`

s`emojhd` ohg`sojme`$

@~h |hd` n` gmdjbj`~h em jg|hs~mdojm z em njb`s`dojm e`kme` }p` ` |p`n`d

|emd~`ms `kùd eh ohd~`q~h `d }p` ` |s`~`dnmd m|ejoms em ~`odhehkçm

cjhgê~sjom$ H~sh `i`g|eh n` `eeh ` |p`n` hc`srms `d pd jdbhsg` `d `e }p` `

ohdjn`sm n`|sh|hsojhdmnh `e ph n` em ap`eem nmo~jems `d `e ohd~she n` mj~`dojm

n` eh mepgdh `d pd ohe`kjh=>

1$3$3 S`hepojhd` z _`d~`dojm gí s`e`rmd~`

$

\hs ùe~jgh ` s``ýmsí em jd~`s|s`~mojÿd bjdme }p` ~md~h em M@\N ohgh njb`s`d~`

~sjcpdme` n` ip~jojm `|mýhe` amd s`mejymnh md~` omh |ms~jopems` `d eh }p` `

`dop`d~sm jg|ejomnh `e ph n` j~`gm cjhgê~sjoh$

J$ S`hepojÿd n` msoajrh n` mo~pmojhd` n` em M@\N% n` 3= n` gmsyh n` 3<<2%ohss`|hdnj`d~` me @q|`nj`d~` D¹9 @(<<<0;(3<<0

Ejkmnm m pdm n`dpdojm |s``d~mnm ohd~sm pd Mzpd~mgj`d~h }p` n`ojnjÿ jd~mems pd

j~`gm n` ohd~she n` |s``dojm n` p |`shdme cmmnh `d em ap`eem nmo~jems$ @e

n`dpdojmd~` `q|hd` }p` dh ` am jdbhsgmnh ohdr`dj`d~`g`d~` m eh ~smcmimnhs` m em

rj~m n` eh `qjkjnh |hs `e ms~çopeh 0 n` em EH\N `d eh }p` s`|`o~m m em jg|emd~mojÿd n`

njoah j~`gm$ Mjgjgh ` n`dpdojm }p` ~mg|hoh ` am hejoj~mnh `e ohd`d~jgj`d~h

|msm `e ~sm~mgj`d~h n` eh nm~h }p` amd jnh s`}p`sjnh m eh ~smcmimnhs`$

\hs p |ms~` em M@\N ohdoepz` }p` ~`dj`dnh `d op`d~m em `qo`|ojÿd me n`c`s n`

hc~`dojÿd n`e ohd`d~jgj`d~h |s`rj~m `d `e ms~çopeh 2$3 n` em EH\N s`b`s`d~` m s`emojhd`

ohd~smo~pme`

―@d `e omh }p` ` `qmgjdm |ms`o` n`npojs` }p` `e ~sm~mgj`d~h me }p` ` 

amo` s`b`s`dojm ~sm` p hsjk`d% |s`ojmg`d~`% n` em d`o`jnmn n` m`kpsms `e 

n`cjnh opg|ejgj`d~h n` em hcejkmojhd` n`sjrmnm n` em s`emojÿd 

mngjdj~sm~jrm h emchsme }p` rjdopem me bpdojhdmsjh h |`shdme emchsme ohd em 

=> Jdbhsg` Ipsçnjoh d¹ <?21(3<<2 n` em M@\N hcs` em ―\sh|hsojhdmejnmn n`e ~sm~mgj`d~h n` em ap`eem nmo~jems n` mepgdhn` pd ohe`kjh‗

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 75/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

`g|s`m% eh }p` pdjnh m eh am~m mahsm `ýmemnh |`sgj~` jg|e`g`d~ms njoah 

~sm~mgj`d~h n` nm~h$

Dh hc~md~` eh `q|p`~h% n`c`sí nms` opg|ejgj`d~h m eh nj|p`~h `d `e ms~çopeh 0 n` em EH\N% nmnh }p`% j cj`d dh `sí |s`ojh `e ohd`d~jgj`d~h n`e 

jd~`s`mnh% ç n`c`sí mnr`s~js` me gjgh n` eh `q~s`gh ohd~`djnh `d `` 

|s`o`|~h V•W ‗$

Mç |p` em jd~`s|s`~mojÿd n` em dhsgm hcejkm `d `e omh n` ohd~she` n` |s``dojm

n` ~smcmimnhs` m jdbhsgms mn`opmnmg`d~` m eh ppmsjh dh mç s`|`o~h m em

d`o`jnmn n` s`omcms `e ohd`d~jgj`d~h `q|s`h j cj`d j`g|s` ` s`ohg`dnmce`

~me z ohgh amd `ýmemnh eh `q|`s~h ohdpe~mnh$

―Dh jdbhsgms mn`opmnmg`d~` n e ph }p` ` rm m nms m eh nm~h mn}pjsjnh z 

p p~jejymojÿd jdnjosjgjdmnm hd |shce`gm jg|hs~md~` z m ~`d s d op`d~m‗

JJ$ S`hepojÿd n` msoajrh n` mo~pmojhd` n` em M@\N% n` 0 n` b`cs`sh n` 3<<:%ohss`|hdnj`d~` me @q|`nj`d~` D¹9 @(<<<=2(3<<;

\hd` n` gmdjbj`~h }p` em M@\N `d~j`dn` }p` ―em p~jejymojÿd n`e nm~h ohss`|hdnj`d~` m em 

ap`eem nmo~jems z p |h~`sjhs ohdr`sjÿd `d pd |m~sÿd n` nm~h dh p|hd` pdm rped`smojÿd 

n`e |sjdoj|jh n` omejnmn n` nm~h V•W ‗$

JJJ$ _`d~`dojm n` em Mpnj`dojm Dmojhdme !_mem n` eh Ohd~`dojhh'Mngjdj~sm~jrh%_`oojÿd =©*% n` > n` gmsyh n` 3<=<

^sm~m hcs` em |p`~m `d bpdojhdmgj`d~h n` pd dp`rh j~`gm n` ohd~she n` |s``dojm

ohdj~`d~` `d }p` `e ~smcmimnhs jd~shnpyom eh n`nh çdnjo` z ohsmyÿd n` p gmdh `d pd

~`sgjdme n` gmsomi`$ _`kùd `ýmem em Mpnj`dojm Dmojhdme ―` jdbhsgm hcs` em s`ohkjnm z 

~sm~mgj`d~h n` nm~h |`shdme`% n` p bjdmejnmn z n`~jdh V•W z n`e s`|hdmce` n`e 

~sm~mgj`d~h `d op`~jÿd  V•W‗ $ Dh hc~md~` m em rj~m n` eh `qjkjnh |hs `e ms~çopeh 3< n` em

EH\N s`op`snm em Mpnj`dojm Dmojhdme }p` `sm ohdr`dj`d~` mo~pmejyms em n`oemsmojhd`

n` bjoa`sh n` ~j~pemsjnmn |ùcejom md~` em M@\N m bjd n` s`ohk`s `q|s`mg`d~` `d~s` pbjdmejnmn` em s`em~jrm me ohd~she ahsmsjh g`njmd~` nm~h cjhgê~sjoh$

JR$ _`d~`dojm n e ^sjcpdme n` Ip~jojm n` Mdnmepoçm% Ksmdmnm !_mem n` ehOhd~`dojhh'Mngjdj~sm~jrh% _`oojÿd =©*% dùg$ 1;>(3<<;% n` ? n` njoj`gcs`

\hd` n` gmdjbj`~h }p`

―em s`ohkjnm n` eh nm~h cjhgê~sjoh |hs j~`gm jdbhsgí~joh% ap`eem nmo~jems 

njkj~mejymnm z `e msoajrh n` p nm~h `d pdm ~msi`~m% dh rped`smd p n`s`oah 

bpdnmg`d~me  V`d s`emojÿd me n`dpdojmd~`W |p`~h }p` dj j}pj`sm ` ~sm~m n` 

hg`~`s me pi`~h m h|`smojhd` }p` e` mb`o~`d bçjomg`d~`% bp`sm n`e 

ghg`d~h n` s`o`|ojÿd n` em ap`eem% |p`~h }p` ` ~sm~m n` pdm ~msi`~m ohd 

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 76/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

`h nm~h `dosj|~mnh z dh n`e j~`gm ÿ|~joh n` `oíd`s n` em gmdh% |hs 

~md~h `d~j`dn` `e ipykmnhs% }p` ` amd opg|ejnh ~hnh eh ohd~she` z em 

kmsmd~çm |s`ojm |msm mermkpmsnms `e n`s`oah bpdnmg`d~me m em jd~jgjnmn z 

m em |sjrmojnmn V•W ‗$

@d s`pg`d z `d cm` m ~hnh eh md~`sjhs em M@\N z eh ~sjcpdme` ohg|`~`d~` `d p

Jdbhsg` Ipsçnjoh S`hepojhd` z _`d~`dojm hcs` em gm~`sjm `d~j`dn`d }p` eh

jkpj`d~` s`}pjj~h amcsçmd n` ~`d`s` `d op`d~m m em ahsm n` `b`o~pms ~sm~mgj`d~h n`

nm~h cjhgê~sjoh9

‣ @e ~sm~mgj`d~h n` nm~h am n` `s e`kç~jgh$

‣ 

@d ê~` `d~jnh ` ohdjn`sm e`kç~jgh

`e ~sm~mgj`d~h n` em ap`eem nmo~jems n` ~smcmimnhs` m eh `b`o~h n` ee`rms m omch

mo~jrjnmn` n` ohd~she ahsmsjh$ \hs `e ohd~smsjh dh ` ohdjn`sm |`s~jd`d~` `e~sm~mgj`d~h n` em ap`eem nmo~jems n` oej`d~` |msm em |s`~mojÿd n` `srjojh

ohg`sojme` h n` mepgdh ohd rj~m m ohd~shems p mj~`dojm m pd o`d~sh

`ohems$

D`o`jnmn n` jdbhsgms me jd~`s`mnh

‣ 

mo`som n`e ~sm~mgj`d~h n` nm~h pczmo`d~`

ohdbhsg` me ms~çopeh 0 n` em EH\N$

@ d`o`msjh `e ohd`d~jgj`d~h n`e ppmsjh merh `d oj`s~h omh$

‣ 

Dh `sí

d`o`msjh `e ohd`d~jgj`d~h n` jd~`s`mnh |msm `e ~sm~mgj`d~h n` p nm~h

cjhgê~sjoh j`g|s` z opmdnh ohd njoah ~sm~mgj`d~h ` |s`~`dnm nmsopg|ejgj`d~h m em hcejkmojhd` n`sjrmnm n` em s`emojÿd ohd~smo~pme pczmo`d~`$

D`o`jnmn n` jdosj|ojÿd n` pd bjoa`sh md~` em M@\N

‣ 

}p` opcsm njoah ~sm~mgj`d~h

h `r`d~pmeg`d~` ghnjbjomojÿd n` pd bjoa`sh `qj~`d~` |msm nms s`be`ih m em

bjdmejnmn` z om~`khsçm n` nm~h ~sm~mnm$

N`e`kmojÿd n` ~sm~mgj`d~h$

1$? @_^ÍDNMS@_ JD^@SDMOJHDME@_

_j pd ~`so`sh ~j`d` moo`h m eh nm~h m eh `b`o~h n`

|s`~ms `e `srjojh n` s`ohkjnm n` eh gjgh `sí ohdjn`smnh pd `domskmnh n`

~sm~mgj`d~h z amcsí n` opg|ejs` ohd eh nj|p`~h cmih `e ms~çopeh =3 n` em EH\N$

Mn`gí n` em e`kjemojÿd rjk`d~` `qj~`d h~sm s`kpemojhd` ê~m dh rjdopemd~` dj n`

hcejkmnh opg|ejgj`d~h }p` ` mohd`imce` `kpjs$ _` ~sm~m n` eh `~ídnms` ~êodjoh

}p` ` |emd~`md |msm omnm pdm n` em ~`odhehkçm z ~êodjom cjhgê~sjom$

Eh `~ídnms` cjhgê~sjoh `|`ojbjomd em ohdnjojhd` d`o`msjm |msm }p` em

~`odhehkçm cjhgê~sjom |p`nmd `s `bjomo` ` jd~`sh| smce`$ Mnjojhdmeg`d~` n`osjc`d

gê~hnh |msm p jd~`ksmojÿd ohd eh j~`gm n` jn`d~jbjomojÿd z mp~`d~jomojÿd z |msm `ejd~`somgcjh n` jdbhsgmojÿd `d~s` j~`gm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 77/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Em `~mdnmsjymojÿd `d `e ís`m n` em cjhg`~sçm ` g`dh mrmdymnm }p` `d em ~msi`~m

jd~`ejk`d~` !gms~omsn * |`sh n`cjnh m em d`o`jnmn jdgjd`d~` ` `~í mo`e`smdnh `e

|sho`h$ @~` |sho`h `~í jg|pemnh |hs `e `o~hs |sjrmnh |hs hskmdjymojhd` n`

`~ídnms` jd~`sdmojhdme` mç ohgh |hs mk`dojm kpc`sdmg`d~me` n` |heç~jom z

`~ídnms`$ Em |sjdoj|me` hd9

‣  MD_J(JDOJ^_$ Mg`sjomd Dm~jhdme _~mdnmsn Jd~j~p~` ( Jd~`sdm~jhdme Ohggj~~`` bhs 

Jdbhsgm~jhd ^`oadhehkz _~mdnmsn !MD_J(JDOJ^_* ^`oadjome Ohggj~~`` G=%

Cjhg`~sjo  }p` ~mgcjêd mo~ùm ohgh `e MD_J‚ ^`oadjome Mnrjhsz Kshp| |msm `e

J_H(J@O Ihjd~ ^`oadjome Ohggj~~`` $

‣  J_H(J@O$ Jd~`sdm~jhdme _~mdnmsn Hskmdjym~jhd ( Jd~`sdm~jhdme @e`o~sh~`oadjome 

Ohggjjhd !J_H(J@O* I^O =(_O ?; hd Cjhg`~sjo $

‣  D^_O$ P_ Dm~jhdme _oj`do` " ^`oadhehkz Ohpdoje !D_^O* _pcohgj~ê n`

Cjhg`~sçm z K`~jÿd n` Jn`d~jnmn`$ _` am `~mce`ojnh }p` em jdjojm~jrm

cjhgê~sjom n`e khcj`sdh n` @~mnh Pdjnh ` cmmsíd `d eh `~ídnms`

cjhgê~sjoh n`e MD_J(JDOJ^_ z n`e J_H(J@O$

‣  PF Csj~ja _~mdnmsn Jd~j~p~` !C_J*$ Mk`dojm dmojhdme n` `~ídnms` n` S`jdh

Pdjnh$ Ohemchsm ohd `e PF‚ ^`oadjome Mnrjhsz Kshp|  |msm `e J_H(J@O Ihjd~ 

^`oadjome Ohggj~~`` $

‣  JOMH$ Pdj~`n Dm~jhd Jd~`sdm~jhdme Ojrje Mrjm~jhd Hskmdjym~jhd  !JOMH* `~mce`o`

eh `~ídnms` n` jd~`ksmojÿd n` em cjhg`~sçm `d eh |mm|hs~` `e`o~sÿdjoh n`

mop`snh ohd `e JDOJ^_ z `e J_H(J@O$

‣  DJ_^$ ^a` P_ Dm~jhdme _~mdnmsn Jd~j~p~` $ Mk`dojm @~mnhpdjn`d` }p`

n`mssheem eh `~ídnms` ~êodjoh n`e khcj`sdh jdoepz`dnh m}p`eeh }p` mb`o~md

m ~`odhehkçm cjhgê~sjom$ Eh `~ídnms` n`e DJ_^ ` `~mce`o`d n` mop`snh m

eh n`e JDOJ^_ z n`e J_H(J@O$

@qj~`d `rmepmojhd` n` ~`so`sh hcs` gpoam n` em ~`odhehkçm cjhgê~sjom |`sh em

|pcejomojÿd n` `~ídnms` |msm em `rmepmojÿd }p` bmojej~`d pdm ohg|msmojÿd bjmce` `d~s`

nj~jd~h j~`gm cm~md~` s`oj`d~`$

Eh |sjdoj|me` `~ídnms` `qj~`d~` |msm em njb`s`d~` ~`odhehkçm ` s`be`imd `d em

jkpj`d~` ~mcem9

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 78/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

^mcem ;9 \sjdoj|me` `~ídnms` `qj~`d~`

M|`o~h @~ídnms`

Jgmk`d n` em ap`eem

nmo~jems

‣ J_H(J@O =:;:>'> Bhsgm~h n` jd~`somgcjh n` nm~h cjhgê~sjoh$ \ms~` >9Jdbhsgmojÿd n` jgmk`d bmojme$

‣ M_DJ JDOJ^_ ?1='3<<> Bhsgm~h n` jd~`somgcjh n` jdbhsgmojÿd n`e n`nh$ 

Gjdpojm n` em ap`eem

nmo~jems

‣ J_H(J@O =:;:>'3 Bhsgm~h n` jd~`somgcjh n` nm~h cjhgê~sjoh$ \ms~` 39Jdbhsgmojÿd n` em gjdpojm n` em ap`eem nmo~jems$

‣ MD_J JDOJ^_ ?;1'3<<> Bhsgm~h n` em gjdpojm n`e n`nh |msm jd~`somgcjh n`nm~h$

‣ MD_J JDOJ^_ ?;;'3<<> Bhsgm~h n` jd~`somgcjh n` em jdbhsgmojÿd cíjomn`e |m~sÿd n`nh$ 

S`ohdhojgj`d~h

bmojme

‣ MD_J JDOJ^_ ?10'3<<> Bhsgm~h n` s`ohdhojgj`d~h bmojme |msm jd~`somgcjhn` nm~h$

‣ J_H(J@O =:;:>'0 Bhsgm~h n` jd~`somgcjh n` nm~h cjhgê~sjoh' \ms~` 09Jdbhsgmojÿd n` em jgmk`d bmojme$ S`ohdhojgj`d~h n`

jsj

‣ H_\(J@O =:;:>'2 Bhsgm~h n` jd~`somgcjh n` nm~h cjhgê~sjoh'\ms~` 29Jdbhsgmojÿd n` em jgmk`d n`e jsj$ Mýmnjs pdm kpçm n` jg|e`g`d~mojÿd |msm`|`ojbjoms `e ph n` s`|s``d~mojÿd oms~`jmdm$ 

H~sm ~`odhehkçm

‣ MD_J(DJ_^ J^E ='3<<< Bhsgm~h n` em jdbhsgmojÿd |msm `e jd~`somgcjh n`ap`eem nmo~jems bmojme ojom~sjo` z ~m~pmi` !_G^*$

‣ JD_J(DJ_^ J^E ='3<<; Bhsgm~h n` em jdbhsgmojÿd |msm `e jd~`somgcjh n`ap`eem nmo~jems bmojme z h~sh ~j|h n` nm~h cjhgê~sjoh'\ms~` =$

‣ MD_J JDOJ^_ ?:2'3<<0 Bhsgm~h |msm `e jd~`somgcjh n` nm~h n` emk`hg`~sçm n` em gmdh$

‣ MD_J JDOJ^_ ?:0'3<<0 Bhsgm~h |msm `e jd~`somgcjh n` nm~h cjhgê~sjoh'Nm~h n` em bjsgm$ 

Jd~`sbmo` ~êodjoh

‣ J_H(J@O =:;1>'= CJHM\J' Jd~`sbmy n` |shksmgmojÿd n` em m|ejomojÿdcjhgê~sjom ‟ \ms~` =9 @|`ojbjomojÿd CjhM\J$‣ J_H(J@O =:;1>'3 Jd~`sbmy n` |shksmgmojÿd n` em m|ejomojÿd cjhgê~sjom

!CjhM\J* ‟ \ms~` 39 Jd~`sbmy n`e |shr``nhs n`e msoajrh cjhgê~sjoh$‣ J_H(J@O =:;10'=93<<29 Gmsoh ohgùd n` jd~`somgcjh n` bhsgm~h

cjhgê~sjoh' \ms~` =9 @|`ojbjomojÿd n` eh `e`g`d~h n` em jdbhsgmojÿd$‣ J_H(J@O =:;10'39 3<<29 Gmsoh ohgùd n` jd~`somgcjh n` bhsgm~h

cjhgê~sjoh' \ms~` 39 \sho`njgj`d~h |msm em mp~hsjymojÿd n` s`kj~shcjhgê~sjoh$

‣ MD_J JDOJ^_ ?01'3<<3 @|`ojbjomojÿd CjhM\H !R`sjhd =$=*$‣ MD_J JDOJ^_ ?:1'3<<0 VDJ_^JS 203:'MW$ Gmsoh ohgùd n` jd~`somgcjh n`

bhsgm~h cjhgê~sjoh$ !OC@BB* 

S`dnjgj`d~h

‣ MD_J JDOJ^_ ><:$='3<<0 S`|hs~` z ~`~`h n`e s`dnjgj`d~h cjhgê~sjoh'\ms~`=9 \sjdoj|jh z gmsoh$

‣ MD_J JDOJ^_ ><:$3'3<<0 S`|hs~` z ~`~`h n`e s`dnjgj`d~h cjhgê~sjoh$ \ms~`39 S`|hs~` z ~`~`h n` em ~`odhehkçm$

‣ MD_J JDOJ^_ ><:$?'3<<0 S`|hs~` z ~`~`h n`e s`dnjgj`d~h cjhgê~sjoh$ \ms~`?9 S`|hs~` z ~`~`h n`e `o`dmsjh$

‣ MD_J JDOJ^_ ><:$> S`|hs~` z ~`~`h n`e s`dnjgj`d~h cjhgê~sjoh$ \ms~` >9G`~hnhehkçm n` em h|`sm~jrm n` ~`~`h$ 

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 79/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

: K@_^JßD N@ SJ@_KH_

:$= MG@DMYM_ Z RPED@SMCJEJNMN@_ @D EH_ \SHO@_H_Em jg|emd~mojÿd z `e `g|e`h n` ~`odhehkçm cjhgê~sjom `~íd `q|p`~h m pdm `sj` n`

sj`kh mekpdh `|`oçbjoh z h~sh ohg|ms~jnh ohd em n`gí ~`odhehkçm z ~êodjom n`

jn`d~jbjomojÿd$ M ohd~jdpmojÿd ` jn`d~jbjomd em mg`dmym z rped`smcjejnmn`

`|`ojmeg`d~` n`~momce` `kùd eh `q|`s~h `d em gm~`sjm }p` |p`n`d ohg|shg`~`s em

`kpsjnmn h em ohdbjmdym `d eh j~`gm cjhgê~sjoh$

Mn`gí mekpdh j~`gm cjhgê~sjoh mo~pme` op`d~md ohd oj`s~m ejgj~mojhd` ~me`

ohgh dh `s om|mo` n` m~jbmo`s em omnm r`y gmzhs` n`gmdnm n` omskm n` ~smcmih

h ohd~ms ohd njbjope~mn` n` jd~`sh|`smcjejnmn `d~s` j~`gm ~me z ohgh mbjsgmd mekpdh`d~s`rj~mnh$ @~m oms`dojm n`gp`~smd em d`o`jnmn n` pd gmzhs n`mssheeh z em

m|ejomojÿd n` g`njnm n` `kpsjnmn `|`oçbjom$

:$=$= Mg`dmym

Em ~`odhehkçm cjhgê~sjom ohgh `e s`~h n` ~`odhehkçm `~íd `q|p`~m m pdm `sj`

n` mg`dmym$ @~m |p`n`d `s `qoepjrm h ohg|ms~jnm ohd h~sm ~`odhehkçm n`

mp~`d~jomojÿd$ Em gí n`~momnm ` n`mssheemd m ohd~jdpmojÿd$

\êsnjnm h shch n` jdbhsgmojÿd cjhgê~sjom

@e shch n` jdbhsgmojÿd ` `|`ojmeg`d~` `djce `d `e omh n` em cjhg`~sçm me ~sm~ms` n`

jdbhsgmojÿd `qoepjrm z `q~s`gmnmg`d~` ejkmnm me jdnjrjnph |hs eh }p` `e shch n` em

gjgm p|hd` pd jdojn`d~` n` `kpsjnmn ksmr`$ M njb`s`dojm n` em ohd~sm`ým h em

~msi`~m |`shdme` eh smkh cjhgê~sjoh hd jdrmsjmce` !ohgh s`kem k`d`sme* |hs eh

}p` p dùg`sh ` ejgj~mnh m eh emskh n`e ~j`g|h jd |hjcjejnmn n` s`dhrmojÿd z `d

ohd`op`dojm p ohdbjn`dojmejnmn ` ``dojme$

_p|emd~mojÿd n` jn`d~jnmn

_` ~sm~m n`e ph n` jdbhsgmojÿd cjhgê~sjom shcmnm h bmejbjomnm ohd `e |sh|ÿj~h n`

moo`n`s m `|mojh h m|ejomojhd` s`~sjdkjnm bmejbjoms `e ohd~she n` |s``dojm

`dgmomsms h p|emd~ms pdm |`shdmejnmn `~o$ @ n` `|`ojme ksmr`nmn opmdnh ` p~jejym

|msm ohg`~`s pd osjg`d zm }p` p s`|pnjh s`pe~m ohg|ejomnh$

_mch~mi`

\p`n`d nms` m~m}p` me `dhs n` bhsgm ohdoj`d~` |msm ~sm~ms n` jg|`njs p

bpdojhdmgj`d~h$ Bs`op`d~`g`d~` em ompm n` `~h m~m}p` ` pdm `q|s`jÿd n`e

n`mop`snh h n`ohd~`d~h ohd em jg|emd~mojÿd n` cjhg`~sçm |s`ojmg`d~` n`cjnh m em me~mbjmcjejnmn }p` hbs`o` `e j~`gm m em ahsm `rj~ms ohdnpo~m bsmpnpe`d~m z moo`h dh

mp~hsjymnh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 80/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Jdopg|ejgj`d~h n` s`}p`sjgj`d~h e`kme`

Eh smkh cjhgê~sjoh ` ohdjn`smd nm~h n` omsío~`s |`shdme |hs eh }p` p

~sm~mgj`d~h ` `dop`d~sm s`kpemnh |hs em E`z Hskídjom n` \sh~`oojÿd n` Nm~h !EH\N* zp S`kemg`d~h n` N`mssheeh !SNEH\N*$ @d ohd`op`dojm n` pd ~sm~mgj`d~h

jdmn`opmnh |p`n` n`sjrms `d pd jdopg|ejgj`d~h dhsgm~jrh ohd em ohd`op`d~`

`q|hjojÿd m mdojhd` z `e n`~`sjhsh n` em jgmk`d n` em `d~jnmn$

M |`ms n` }p` `~h nm~h ` amd ohdjn`smnh ohd omsío~`s k`d`sme ohgh ―n`

|sh~`oojÿd cíjom‗ n` ohdbhsgjnmn ohd `e SNEH\N j`dnh `}pj|msmce` m pdm jg|e`

njs`oojÿd h pd dùg`sh n` ~`eêbhdh j`g|s` ` mohd`imce` ~sm~ms `~h nm~h ohd em

gíqjgm omp~`em z |sh~`oojÿd |hjce`$

\`so`|ojÿd n` bme~m n` |sjrmojnmn |hs |ms~` n` eh ppmsjh

\p`n` ~sm~ms` n` pdm n` em |sjdoj|me` mg`dmym zm }p` j eh ppmsjh dh ohdbçmd `d

`~m ~`odhehkçm ` njbjope~msçm `d cp`dm g`njnm p jg|emd~mojÿd$ @d gpoah omh `e

ppmsjh bjdme h~hskm m `~h nm~h pdm me~m `djcjejnmn |hs `~ms `q~s`gmnmg`d~` ejkmnh

m p |`shdm$ \hs `eeh ` n`c` `ohk`s `e ghnh gí mn`opmnh |msm p jg|emd~mojÿd `d

rjs~pn m njb`s`d~` omsmo~`sç~jom$

@d em jkpj`d~` ~mcem ` ohg|msm `e jg|mo~h n` em mp~`d~jomojÿd cjhgê~sjom `d em

|sjrmojnmn d bpdojÿd n` njb`s`d~` bmo~hs`9

^mcem 19 Jg|mo~h `d em |sjrmojnmn

Jg|mo~h `d em|sjrmojnmn

\sho`h ^j|h n` ~`odhehkçm Gp`~sm^j|h n` cm` n`

nm~h

Me~h Jn`d~jbjomojÿd BjjheÿkjomJgmk`d

cjhgê~sjom

Cm` n` nm~hksmdn`( 

o`d~smejymnm

Cmih R`sjbjomojÿd N` ohg|hs~mgj`d~h Gp`~smojbsmnm

Cm` n` nm~h|`}p`ým( ehome`

Bp`d~`9 JD^@OH 

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 81/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Jnhd`jnmn n` em jg|emd~mojÿd

_`kùd eh `q|`s~h ohdpe~mnh ` ohgpdg`d~` os`jnh n` gmd`sm `ssÿd`m }p` pd

j~`gm cjhgê~sjoh kmsmd~jym em `kpsjnmn ~h~me z }p` ` em hepojÿd m opme}pj`s |shce`gmn` `kpsjnmn$ Em jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom p|hd` pd ohdjn`smce` oh~`

`ohdÿgjoh z pdm jg|ejomojÿd n` |`shdme `|`oçbjomg`d~` n`njomnh m `eeh npsmd~` em bm`

jdjojme$ \hs `eeh ` d`o`msjh s`mejyms pd mdíejj |msm `rmepms em r`snmn`sm d`o`jnmn

`o`dmsjh mn`opmnh n` jg|emd~mojÿd z `e c`d`bjojh ehksmnh bs`d~` me oh~` jdopssjnh zm

}p` ` |hjce` }p` ê~m dh `m em hepojÿd gí mn`opmnm |msm ~hnh eh omh$

Omejnmn n` em ~`odhehkçm

_j em omejnmn n` em ~`odhehkçm jg|emd~mnm dh meomdym eh djr`e` s`ohg`dnmce` |hnsçm

momss`ms ksmr` cs`oam n` `kpsjnmn mç ohgh pd n`~`sjhsh dh~mce` n` em |`so`|ojÿd n`

em ~`odhehkçm n`cjnh m p gme bpdojhdmgj`d~h$ Eh `e`g`d~h }p` ` n`c`d ~`d`s `d

op`d~m me s`|`o~h hd9 em omejnmn n`e `dhs em `bjoj`dojm n`e mekhsj~gh n` ohg|msmojÿd

em `dosj|~mojÿd n`e megmo`dmgj`d~h n` gp`~sm hc~`djnm z em jd~`sh|`smcjejnmn ohd

h~sh j~`gm$

―@d gpoam homjhd`% ~hnh `e `o~hs pbs` n`cjnh m em `q|`sj`dojm

d`km~jrm `d n`~`sgjdmnh |shz`o~h }p` amd jnh ee`rmnh m omch jd

ohdjn`sms em d`o`jnmn n` em p~jejymojÿd n` pdm ~`odhehkçm n` omejnmn$ Em

dh~hsj`nmn |ùcejom }p` amcj~pmeg`d~` mohg|mým m eh |shz`o~h cjhgê~sjoh

` pd msgm n` nhce` bjeh‗

Jdojn`dojm ohd `e j~`gm

Omçnm n` em eçd`m n` ohgpdjomojÿd n`e |sh|jh j~`gm h n` eh j~`gm n` h|hs~`

!|hs `i`g|eh epy h j~`gm n` ohgpdjomojhd`* m~m}p` jdbhsgí~joh `~o$ @~h

|shce`gm mb`o~md n` bhsgm jgjems }p` me s`~h n` ~`odhehkçm$

Jdnj|hdjcjejnmn n` `dhs

_j `e moo`h h em mp~`d~jomojÿd ` s`mejymd `qoepjrmg`d~` g`njmd~` cjhg`~sçm ` n`ojs

dh `qj~` pd gê~hnh me~`sdm~jrh ohgh |p`n` `s `e ph n` ohd~sm`ým h ~msi`~m

|`shdme` `e bmeeh h mp`dojm n`e nj|hj~jrh n` mn}pjjojÿd n` gp`~sm p|hd` em

jg|hjcjejnmn n` mp~`d~jomojÿd h moo`h$ Pd `i`g|eh n` `~m j~pmojÿd ` pd ppmsjh }p`

~`dkm }p` moo`n`s n` bhsgm psk`d~` me ohss`h `e`o~sÿdjoh n`n` bp`sm n` em hbjojdm

g`njmd~` ap`eem nmo~jems |`sh dh nj|hdkm n` `dhs `d p hsn`dmnhs$

―Dpdom pd j~`gm n` mp~`d~jomojÿd n`c` `~ms cmmnh ùdjomg`d~` `d pd

smkh cjhgê~sjoh$ N`c`d `~mce`o`s` |sho`njgj`d~h n` psk`dojm }p`mec`skp`d em |hjcjejnmn n` jdnj|hdjcjejnmn n` eh `dhs`% h me a`oah n` }p`

em ~êodjom cjhgê~sjom `g|e`mnm dh ~`dkm pdm me~m pdjr`smejnmn‗

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 82/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 13 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Me~`smojÿd ohd ídjgh bsmpnpe`d~h n` eh smkh cjhgê~sjoh

Me~`smojhd` `d em ap`eem nmo~jems` `d `e r`eeh bmojme `d em op`snm rhome` `~o$ ohd

`e hci`~jrh n` `rj~ms `s s`ohdhojnh |hs pd j~`gm cjhgê~sjoh$ @ pdm |sío~jom bs`op`d~``d eh jd~`d~h n` `d~smnm je`kme `d pd |mç ~sm~mdnh n` `epnjs em jn`d~jbjomojÿd n` pd

jdnjrjnph s`jdojn`d~`$

―@d mekpdm bshd~`sm ohdbejo~jrm% em |`shdm ee`kmd m mcsmms p ap`eem

nmo~jems` ohd `e hci`~jrh n` dh `s s`ohdhojnh |hs em mp~hsjnmn` z dh `s

`domso`emnh‗

Rmsjmojÿd jdrhepd~msjm `d eh smkh cjhgê~sjoh

Eh omgcjh `d eh smkh cjhgê~sjoh ohgh rmsjmojhd` n` em rhy r`eeh bmojme h `e|`jdmnh ~mgcjêd po`n`d n` bhsgm dm~psme$ @d `~h omh `e ppmsjh dh ~j`d` jd~`dojÿd

n` `dkmýms me j~`gm$ Dh hc~md~` `~h omgcjh |p`n`d njbjope~ms `e |sho`h n`

jn`d~jbjomojÿd z k`d`sms jdoeph pdm |`so`|ojÿd d`km~jrm |msm `e ppmsjh$

―@ d`o`msjh ohdjn`sms em rmsjmce` ~j`g|h `d `e nj`ýh n` pd j~`gm n`

mp~`d~jomojÿd cjhgê~sjoh‗

@q|`sj`dojm n` ph d`km~jrm !pmcjejnmn*

Pd gme ph jdrhepd~msjh n`e `dhs s`mejymnh |hs pdm |`shdm jd eh ohdhojgj`d~hmn`opmnh |p`n` ~`d`s ohgh ohd`op`dojm em n`ohdbjmdym n`e ppmsjh `d em ~`odhehkçm

z `e mpg`d~h n` em ~mm n` `sshs n` em gjgm$

―@ d`o msjm bhsgmojÿd n` omsm m }p` eh `g|e mnh amkmd pd ph ÿ|~jgh n`

eh `dhs`‗

Bme~m n` mo`|~mojÿd ope~psme

@~m mg`dmym m|ms`o` `d n`~`sgjdmnh ksp|h n`ghksíbjoh opzm dhsgm hojme` h

s`ejkjhm dh bmrhs`o`d em ~hgm n` gp`~sm `d n`~`sgjdmnm ~êodjom$ \hs `i`g|eh `d

mekpdm ope~psm `e s`ohdhojgj`d~h bmojme dh ` ríejnh zm }p` dh ~hnh eh ojpnmnmdh

ee`rmd `e sh~sh me n`opcj`s~h6 `d h~sm em e`o~psm n` em ap`eem nmo~jems ` ohdjn`sm pdm

|sío~jom md~jajkjêdjom ~o$

―Dh a`gh `dohd~smnh ohd r`snmn`sh |shce`gm }p` n`~`sgjdmd `e êqj~h h

bsmomh n` dp`~sh |shz`o~h |hs dh amc`s `~pnjmnh em njb`s`d~`

ohdjn`smojhd` ope~psme`$ @~` bmo~hs ` `|`ojmeg`d~` osç~joh `d j~`gm

opzh ígcj~h gpdnjme‗

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 83/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

:$=$3 Rped`smcjejnmn`

M ohd~jdpmojÿd ` ej~md mekpdm rped`smcjejnmn` }p` mb`o~md d`km~jrmg`d~` ~md~h m em

jg|emd~mojÿd n` j~`gm n` s`ohdhojgj`d~h cjhgê~sjoh ohgh m p |sh|jh s`dnjgj`d~h$

@~m rped`smcjejnmn` ` njrjn`d `kùd `md ohgpd` m ~hnm em ~êodjom cjhgê~sjom h

`|`oçbjom n` mekpdm n` `eem$

^mcem :9 Rped`smcjejnmn`

^`odhehkçmcjhgê~sjom

Rped`smcjejnmn`

Rped`smcjejnmn`ohgpd` m ~hnmem ~`odhehkçmcjhgê~sjom

‣ Omejnmn cmim n` eh nj|hj~jrh n` om|~psm$‣ Pcjomojÿd jdmn`opmnm n`e nj|hj~jrh n` om|~psm$‣

N`ohdhojgj`d~h `d em omejnmn h n`e mcmdjoh n` |shnpo~h zp~jejnmn` nj|hdjce`$‣ Bme~m n` ohdhojgj`d~h ~êodjoh n`e |`shdme$‣ Bme~m n` s`opsh !~md~h n` |`shdme ohgh `ohdÿgjoh*$‣ @omm ohdoj`dojmojÿd `d gm~`sjm n` `kpsjnmn$‣ \`so`|ojÿd n` mp`dojm n` |sjrmojnmn |hs |ms~` n` eh ppmsjh$

Ap`eem nmo~jems

‣ Ohdnjojÿd n`e n`nh `d `e ghg`d~h n` ~hgms em gp`~sm9 ghimnh`oh gmdoamnh `~o$

‣ Ohdnjojhd` oejgm~heÿkjom }p` mb`o~md me e`o~hs9 apg`nmn~`g|`sm~psm `~o$

‣ Ohdnjojhd` n` em ap`eem9 ohs~` a`sjnm h jdbemgmojhd`$‣ Mo~jrjnmn emchsme9 ~smcmih }p` |p`nmd mb`o~ms m em ap`eem |hs `i`g|eh

`e ph amcj~pme n` |shnpo~h }pçgjoh }p` |p`nmd n`~`sjhsmsem$

S`ohdhojgj`d~hn` rhy

‣ @db`sg`nmn` n` em rhy9 cshd}pj~j bmsjdkj~j ksj|` emsjdkj~j mbhdçm`~o$

‣ Rmsjmojÿd `d~s` `e nj|hj~jrh n` s`kj~sh z `e pmnh `d em om|~psm n`gp`~sm$

‣ Rmsjmojÿd `d~s` `d~hsdh n` s`kj~sh z om|~psm n` gp`~sm !|hs`i`g|eh9 jd~`sjhs z `q~`sjhs*$

‣ Rhepg`d n`e amcem$

S`ohdhojgj`d~hbmojme

‣ Rmsjmojÿd `d `e m|`o~h bmojme9 |`jdmnh r`eeh kmbm hgcs`sh `~o$‣ Ohdnjojhd` n` epgjdhjnmn$‣ Rmsjmojÿd `d `e |`h$‣

Ph n` r`~jg`d~m }p` |p`n` njbjope~ms em ehomejymojÿd h rjjÿd n` emomsm !|mýp`eh cpbmdnm `~o$*$

@oíd`s n` jsj zs`~jdm

‣ @qo`jrh ghrjgj`d~h hopems h n` em omc`ym$‣ @db`sg`nmn` hopems`$‣ Ph n` kmbm$‣ \shce`gm n`cjnh me ph n` e`d~` n` ohd~mo~h !jsj*$

K`hg`~sçm n` emgmdh

‣ Ph n` ihz`sçm cjp~`sçm h mcmehsjh$‣ Ph n` r`dnmi` h kpmd~`$‣ Ohdnjojhd` n` em gmdh9 jdbemgmojhd` `d em ms~jopemojhd` a`sjnm

`~o$

@oíd`s n` bjsgm

‣ R`ehojnmn n` em bjsgm9 `qo`jrmg`d~` sí|jnm h e`d~m$‣ Njb`s`d~` |h~psm n`e pi`~h npsmd~` em bjsgm$‣ Bjsgm dh ohdj~`d~`9 `e pi`~h rmsçm p bjsgm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 84/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

:$3 GÊ^HNH_ N@ _HEPOJßD Z \S@R@DOJßD

Em `kpsjnmn ` bpdnmg`d~me `d ~hnh eh `e`g`d~h n` pd j~`gm cjhgê~sjoh$ @ |hs

`eeh }p` n`n` }p` ` mn}pj`s` em gp`~sm ` n`c`d m|ejoms eh |sh~hoheh n` `kpsjnmn|`s~jd`d~` |msm kmsmd~jyms em |sjrmojnmn z `rj~ms moo`h dh mp~hsjymnh m em cm` n`

nm~h `d }p` ` kpmsnmd eh s`kj~sh cjhgê~sjoh$

Em k`~jÿd n` eh sj`kh md~`sjhsg`d~` `ýmemnh ` s`mejym g`njmd~` em m|ejomojÿd n`

cp`dm |sío~jom z ohd~she` gj~jkmd~` `d `e ph n` em ~`odhehkçm cjhgê~sjom$ N` `~`

ghnh eh `q|`s~h ohdpe~mnh `ýmemd pdm `sj` n` g`njnm m mnh|~ms ohd `e hci`~jrh

n` s`npojs eh sj`kh mhojmnh me `g|e`h n` cjhg`~sçm$

:$3$= N`~`oojÿd n` rjnm

Em n`~`oojÿd n` rjnm ohdj~` `d em om|mojnmn n` pd j~`gm cjhgê~sjoh n` n`~`o~ms j emgp`~sm mn}pjsjnm |shrj`d` n` pd `s apgmdh rjrh ohd `e bjd n` `rj~ms |hjce` jd~`d~h

n` bsmpn` ohgh |hs `i`g|eh `e ph n` |emd~jeem n` khgm }p` jd~`d~`d jgpems pdm ap`eem

nmo~jems$

―Mo~pmeg`d~` em eçd`m n` jdr`~jkmojÿd hcs` em }p` ` n`c` amo`s gmzhs

ajdom|jê ` em n`~`oojÿd n` rjnm‗

N` `~` ghnh `e nj|hj~jrh cjhgê~sjoh ohg|shcmsí pdh h gí n` eh jkpj`d~` bmo~hs`

n`|`dnj`dnh n` em ~`odhehkçm `g|e`mnm9

‣ \peh omsnçmoh$

‣ \s`jÿd mdkpçd`m$

‣ N`~`oojÿd n` |hsh$

‣ ^smd|jsmojÿd$

‣ \shbpdnjnmn n` em omsm$

‣ Ghrjgj`d~h n` em omc`ym$

‣ Omgcjh n` q|s`jÿd bmojme$

‣ Ghrjgj`d~h n`e hih$

‣ Njem~mojÿd n` em |p|jem$

‣ \jkg`d~mojÿd n`e jsj$

‣ _`e`oojÿd n` |memcsm m

|shdpdojms$

@~m ~êodjom ` pdh n` eh |sjdoj|me` gê~hnh n` eh }p` nj|hd` em cjhg`~sçm |msm

ohgcm~js `e bsmpn`$ Dh hc~md~` mùd ~j`d` cm~md~` gmsk`d n` g`ihsm n` omsm me bp~psh$

:$3$3 Megmo`dmgj`d~h n` gp`~sm

@d `e |sho`h n` s`kj~sh |s`rjh me ph n` ~`odhehkçm cjhgê~sjom amd n` megmo`dms`

em gp`~sm m|hs~mnm |hs eh ppmsjh$ Mç `qj~` em |hjcjejnmn n` megmo`dms pdm |ms~`

n` em gp`~sm h gpe~j~pn n` s`b`s`dojm `d epkms n` em gp`~sm çd~`ksm$ @~h ` amo` |msm

|s`r`djs p p~jejymojÿd bsmpnpe`d~m `d omh n` |êsnjnm h shch$ Pd `i`g|eh ` `e

megmo`dmgj`d~h n` gjdpojm n` ap`eem nmo~jems` `d epkms n` em ap`eem ohg|e`~m$ N`

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 85/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 10 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

`~m bhsgm s`pe~m jg|hjce` em s`os`mojÿd n` em ap`eem m |ms~js n` pdm gjdpojm `d omh n`

}p` `~m `m shcmnm$

―@ bpdnmg`d~me }p` dh ` |p`nm hc~`d`s em jdbhsgmojÿd cjhgê~sjom n`eppmsjh m |ms~js n` em gp`~sm megmo`dmnm$ Eh }p` gí ` rmehsm ` em

|sjrmojnmn n`e jdnjrjnph‗

:$3$? Mp~`d~jomojÿd n` nhce` bmo~hs

Ohd `e hci`~jrh n` `rj~ms `e bsmpn` ` s`ohgj`dnm `e ph n` nh bmo~hs` `d `e |sho`h n`

mp~`d~jomojÿd$ \msm `eeh ` |p`n` p~jejyms cjhg`~sçm cjghnme !nh ~êodjom cjhgê~sjom

njb`s`d~` |hs `i`g|eh ap`eem nmo~jems ` jsj* h ohgcjdms em cjhg`~sçm ohd `e ph n`

ohd~sm`ým z(h ~msi`~m n` jn`d~jbjomojÿd$

:$3$> S`mejyms pdm cp`dm mnm|~mojÿd

Dh ~hnm em `g|s`m hd jkpme` |hs `eeh em mnm|~mojÿd m em ojsopd~mdojm n` omnm

omh ` ``dojme |msm `rj~ms bp~psh |shce`gm$

\hs `i`g|eh j pdm `g|s`m rm m jdohs|hsms pd ohd~she n` moo`h `d cm` m em ap`eem

nmo~jems z op`d~m ohd `g|e`mnh }p` s`mejymd ~smcmih gmdpme` h p~jejymd |shnpo~h

mcsmjrh |p`n` `s mohd`imce` s`kj~sms em ap`eem n` em gmdh }p` g`dh p~jejo`d

!jy}pj`snm `d `e omh n` eh nj`~sh z n`s`oam `d `e omh n` eh ypsnh* z n` eh n`nh

}p` g`dh ` p~jejo`d !k`d`smeg`d~` mdpems z g`ýj}p`*$ Ohd `~m jg|e` mnm|~mojÿd `

|hnsíd `rj~ms `d cp`dm g`njnm bp~psh |shce`gm s`emojhdmnh ohd ohs~` h n`~`sjhsh `d

em ap`eem$

:$3$0 Mn}pjjojÿd n` ~`odhehkçm n` omejnmn

Eh `q|`s~h ohjdojn`d `d }p` em hc~`dojÿd n` gp`~sm n` omejnmn z em s`mejymojÿd n`

ohg|msm~jrm bjmce` ` jg|hs~md~` |msm `rj~ms bmeh |hj~jrh bmeh d`km~jrh z me~m

~mm n` `sshs z `~h n`|`dn` `d ksmd g`njnm n` em omejnmn z bjmcjejnmn n` eh j~`gm

p~jejymnh$ Pdm `e`oojÿd mn`opmnm |s`rj`d` `e bsmpn` z em s`~jo`dojm n` eh ppmsjh$

―Em om|~psm n` gp`~sm |msm `e s`kj~sh ` am n` s`mejyms ohd pdm gçdjgm

omejnmn }p` kmsmd~jo` e êqj~h n`e |sho`h‗

:$3$2 Cjhg`~sçm `d ghrjgj`d~h

Em om|~psm n` gp`~sm `d ghrjgj`d~h ` pdm bhsgm n` s`npojs em |hjce` |`so`|ojÿd n`

em ~êodjom n` mn}pjjojÿd n` jdbhsgmojÿd cjhgê~sjom ohgh jd~spjrm z em s`~jo`dojm m

p~jejymsem |hs `~` gh~jrh$ Eh `q|`s~h `ýmemd }p` `~` ohd~she dh ` ríejnh |msm ~hnm

em ~êodjom |`sh zm ` m|ejom `d `e s`ohdhojgj`d~h bmojme z n` jsj$

:$3$; Bhsgmojÿd n` eh ppmsjhPd bmo~hs oemr` `d `e êqj~h n` em ~`odhehkçm cjhgê~sjom ` }p` p ppmsjh em p~jejo`d

ohss`o~mg`d~`$ \msm em ohd`opojÿd n` `~` hci`~jrh ` |p`n` hbs`o`s pdm bm` jdjojme n`

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 86/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 12 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

bhsgmojÿd }p` |hs dhsgm k`d`sme dh `sí `qo`jrmg`d~` emskm z `d em }p` ` jdbhsg` n`

eh }p` hd em ~`odhehkçm cjhgê~sjom z ` m|hs~`d pdm cs`r` jd~spoojhd` z

s`ohg`dnmojhd` hcs` p ph$ @d `~` `d~jnh eh mop`snh ohd eh s`|s``d~md~` n`

eh ~smcmimnhs` |s`rjh m em jg|emd~mojÿd n` em ~`odhehkçm bmrhs`o`d `~` |sho`h$

:$3$1 Opg|ejgj`d~h dhsgm~jrh

M em ahsm n` jg|emd~ms `~` ~j|h n` ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn

s`pe~m n` rj~me jg|hs~mdojm `rmepms |s`rjmg`d~` em r`d~mim ` jdohdr`dj`d~` |hjce`

}p` n`n` `e |pd~h n` rj~m ipsçnjoh |p`n` p|hd`s em jdohs|hsmojÿd n` njoah j~`gm

s`|`o~h m em |sjrmojnmn n` em |`shdm mb`o~mnm mç ohgh ~`d`s `d op`d~m |hjce`

j~`gm h hepojhd` me~`sdm~jrm }p` |p`nmd p|hd`s pdm g`dhs jd~spjÿd ohd~sm eh

n`s`oah n` eh jd~`s`mnh$

M `~` s`|`o~h n`~moms }p` `d ~hnh omh eh nm~h cjhgê~sjoh }p` |pnj``d `s

hg`~jnh m ~sm~mgj`d~h m ~smrê n` njoah j~`gm n`c`sçmd `s j`g|s` mn`opmnh

|`s~jd`d~` z dh `qo`jrh `d ohg|msmojÿd ohd em bjdmejnmn n`e |sho`h !|hs `i`g|eh9

ohd~she ahsmsjh ohd~she n` moo`h ohd~she n` |s``dojm `~o$*$

N`e gjgh ghnh ` d`o`msjh s`ohsnms }p` em g`njnm n` `kpsjnmn `ýmemnm |hs em

EH\N z p s`kemg`d~h n` n`mssheeh dh heh ` ohdjn`smd `qjk`dojm |msm `e

opg|ejgj`d~h e`kme jdh ~mgcjêd cp`dm |sío~jom }p` gj~jkmd z `rj~md |hjce`

jdojn`dojm `d s`emojÿd m em |sjrmojnmn n` eh ppmsjh$ ^me ` `e omh n` em n`~`sgjdmojÿdn`e |`shdme ohd moo`h m eh nm~h cjhgê~sjoh n`e j~`gm z p bpdojhd` h em

mjkdmojÿd n` op`d~m n` ppmsjh |msm omnm ~smcmimnhs ipd~h m g`njnm n` ~smymcjejnmn

|msm amo`s ohd~ms }pjêd moo`n` m `~h nm~h h s`mejym ghnjbjomojhd` `d `eeh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 87/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

=< OHDOEP_JHD@_

=<$= OHDOEP_JHD@_ K@D@SME@_

=<$=$= ^`odhehkçm gmnpsm r$ G`somnh `d n`mssheeh

^sm em ohdpe~m m eh njb`s`d~` `q|`s~h n`e `o~hs n` em cjhg`~sçm z em `emchsmojÿd n` p

`~pnjh ` |p`n` ohdoepjs }p` n`n` `e |pd~h n` rj~m ~êodjoh em ~`odhehkçm

cjhgê~sjom ` `dop`d~smd `d pd ksmnh n` gmnps`y pbjoj`d~` |msm `s jg|emd~mnm ohd

êqj~h |`sh ` `e g`somnh `e }p` mo~pmeg`d~` dh am meomdymnh em gmnps`y d`o`msjm$

Ohdos`~mg`d~` `e g`somnh `~í oms`d~` mùd n` eh jkpj`d~` m|`o~h9

‣  Mp`dojm n` ohdhojgj`d~h |hs |ms~` n` eh |h~`dojme` ppmsjh

‣ 

`~h ` n` em

`d~jnmn` }p` |hnsçmd `~ms jd~`s`mnm `d em jg|emd~mojÿd n` j~`gmcjhgê~sjoh$ @d gpoam homjhd` em me~m njs`oojÿd dh ` ohdoj`d~` n` eh

c`d`bjojh `d gm~`sjm n` mahssh n` oh~` mpg`d~h n` `kpsjnmn z g`ihsm n` em

jgmk`d ohs|hsm~jrm }p` |hnsçm ~`d`s em p~jejymojÿd n` pd j~`gm ohd `~m

omsmo~`sç~jom dj n` em gpe~j~pn n` bjdmejnmn` |msm em opme` |hnsçm `s

jd~`s`md~` p ph$

Mp`dojm n` hb`s~m `d opmd~h m hepojhd` jd~`ksmnm n` `kpsjnmn

‣ 

|hs |ms~` n`

nj~sjcpjnhs` h bmcsjomd~` n` hepojhd` n` `kpsjnmn$ \hs `i`g|eh9

rjn`hrjkjemdojm ohd n`~`oojÿd cjhgê~sjom jd~`ksmojÿd n` cjhg`~sçm `d `e j~`gmn` k`~jÿd n` jn`d~jnmn` ohs|hsm~jrh `~o$

N`ohdhojgj`d~h z n`ohdbjmdym |hs |ms~` n` eh ojpnmnmdh

‣ Mo~pmeg`d~` `e `o~hs `g|s`msjme ` `dop`d~sm `d pd

em oj`dojm bjoojÿd

am njbpdnjnh mekpdh gj`nh z gj~h `d~s` em ojpnmnmdçm }p` n`c`d `s

p|`smnh |msm `rj~ms n` `~` ghnh em s`j~`dojm m em p~jejymojÿd n` ~êodjom

cjhgê~sjom$ ^mgcjêd |p`n`d p|hd`s pd jg|`njg`d~h n` ohdjn`smojÿd |msm em

mnh|ojÿd |hs |ms~` n` eh ojpnmnmdh em cmss`sm ope~psme` `qj~`d~` |hs

`i`g|eh `d n`~`sgjdmnh |mç` mjí~joh nhdn` dh ` |`sgj~` `e `~mce`ojgj`d~h

n` ohd~mo~h |hs gh~jrh ajkjêdjoh h em p~jejymojÿd n` sh|m }p` opcs` em omsm `dnjb`s`d~` ope~psm$

|`sjhnh n` njbjope~mn`

`ohdÿgjom

=<$=$3 D`o`jnmn n` `~mdnmsjymojÿd `d `e mdíejj

$ @ |hs `eeh }p` `d gpoam jd~j~pojhd` dh ` |sjhsjym em jdr`sjÿd

`d ~`odhehkçm jddhrmnhsm z ` ~j`dn` m gmd~`d`s eh j~`gm zm `qj~`d~`$

_j cj`d em ~êodjom cjhgê~sjom ` `dop`d~smd pbjoj`d~`g`d~` gmnpsm em mp`dojm n`

osj~`sjh ohgpd` }p` |`sgj~md em `rmepmojÿd n` pdm bhsgm hci`~jrm n` em njb`s`d~`

hepojhd` `qj~`d~` `d `e g`somnh njbjope~m `e mdíejj n` em gjgm z p|hd` pdm

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 88/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 11 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

bp`s~` cmss`sm n` omsm m em jg|emd~mojÿd n` eh j~`gm z m em |`so`|ojÿd hcs` p

rmejn`y$

=<$=$? \hjce` `qo`h n` ohdbjmdym@d homjhd` ` ~j`dn` m |`dms }p` em cjhg`~sçm ` em hepojÿd m ~hnh eh |shce`gm n`

`kpsjnmn$ @e `o~hs `g|s`msjme n`c` `s ohdoj`d~` n` }p` em jg|emd~mojÿd n` ~êodjom

cjhgê~sjom n`c` `s pdm n`ojjÿd cmmnm `d em s`mejymojÿd n` pd mdíejj oh~`(c`d`bjojh

mç ohgh n` }p` em `kpsjnmn mchep~m dh `qj~` `d djdkùd j~`gm n` `kpsjnmn$ Ohgh

|sp`cm n` `eeh ` `dop`d~sm `e ohdipd~h n` mg`dmym z rped`smcjejnmn` n`~momnh `d

`e |s``d~` ~pnjh$

=<$=$> Me~h c`d`bjojh |h~`dojme`

@d eçd`m n` em ohdoepjÿd |s`rjm eh j~`gm cjhgê~sjoh jg|emd~mnh ~sm pd |sho`hmn`opmnh n` mdíejj |s`rjh s`|hs~md ksmdn` c`d`bjojh ~md~h m `d~jnmn` ohgh m

ojpnmnmdh z `g|e`mnh$ M ghnh n` `i`g|eh |p`n`d hc`srms` eh omh n` êqj~h

mdmejymnh `d n`~mee` `d `e |s``d~` `~pnjh nhdn` ` amd hc~`djnh g`ihsm ~md~h `d em

ohghnjnmn n` eh ppmsjh `d `e mpg`d~h n` em `kpsjnmn z `d `e mahssh n` oh~`$

=<$3 BHS^ME@YM_ Z H\HS^PDJNMN@_

=<$3$= M|s`dnjymi` z |`sb`oojhdmgj`d~h

Mo~pmeg`d~` ` `~í jg|emd~mdnh eh }p` ` ohdjn`sm em `kpdnm k`d`smojÿd cjhgê~sjom$@e `~mce`ojgj`d~h n` eh j~`gm cjhgê~sjoh n` |sjg`sm k`d`smojÿd z em n`~`oojÿd n`

p ejgj~mojhd` n`~`sgjdmshd opíe` n`c`d `s eh |sjdoj|me` s`~h }p` `~m `kpdnm

k`d`smojÿd n`c` mbshd~ms z her`d~ms$ @~h s`~h ` oemjbjomd `d nh ksmdn` ~j|hehkçm9

S`~h ~êodjoh ohgh |s`ojjÿd r`ehojnmn `skhdhgçm z `kpsjnmn !|hs `i`g|eh `kpjs

mrmdymdnh `d em n`~`oojÿd n` rjnm z em s`j~`dojm me bsmpn`* z S`~h hojme`

`|`ojmeg`d~` `d eh s`b`s`d~` m |s`hop|mojhd` |hs em |sjrmojnmn z em mepn mç ohgh

|shce`gm ope~psme` h ê~joh$

=<$3$3 Jg|ejomojÿd n` em Mngjdj~smojhd` \ùcejom

@e jg|peh |hs |ms~` n` em mngjdj~smojhd` |ùcejom ` `~í |shnpoj`dnh z ` pd

m|`o~h bpdnmg`d~me |msm em dhsgmejymojÿd ` jg|emd~mojÿd n` em ~`odhehkçm z p

n`mssheeh$ G`njmd~` em mnh|ojÿd n` moojhd` njrpekm~jrm z em mnh|ojÿd n` j~`gm

cjhgê~sjoh `d p |sh|jm jd~memojhd` z `srjojh em Mngjdj~smojhd` \ùcejom `síd

|sjdoj|me` jg|pehs` n` `~m ~`odhehkçm$

=<$3$? Jg|peh n` em ksmdn` `g|s`m

_` ohdjn`sm pd ksmd bmo~hs }p` mcsjsí dp`rm h|hs~pdjnmn` `|`ojmeg`d~` em mnh|ojÿd

|hs |ms~` n` m}p`eem }p` s`}pj`smd n` gmzhs `kpsjnmn `d p ~smdmoojhd` ohgh em

bjdmdoj`sm z m`kpsmnhsm$ Ohd p jg|emd~mojÿd z n`mssheeh `~m `g|s`m

ohd`kpjsíd `e `~mce`ojgj`d~h n` `~ídnms` ohgpd` z j~`gm n` mp~`d~jomojÿd

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 89/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

ahghkêd`h n` omsm m hbs`o`s `srjojh jd~`ksmnh n` njb`s`d~` ~j|hehkçm$ @ n`ojs `e

`~mce`ojgj`d~h n` pdm mp~`d~jomojÿd cjhgê~sjom ùdjom |hs |ms~` n` ksmdn` mhojmojhd`

`g|s`msjme` ` pdm eçd`m n` n`mssheeh bp~psh }p` `d ohhsnjdmojÿd ohd em

mngjdj~smojhd` |ùcejom `sí jg|pemnh |hs em ksmdn` ohs|hsmojhd` |sjrmnm }p`

n```d m|hs~ms rmehs mnjojhdme m eh `srjojh }p` hbs`o`d m p oej`d~`$

=<$3$> @~mdnmsjymojÿd jd~`sh|`smcjejnmn

Eh `q|`s~h `d~s`rj~mnh ohdjn`smd em dhsgmejymojÿd n` eh nm~h megmo`dmnh h

~smdgj~jnh `d njr`sh `~ídnms` }p` |`sgj~md em jd~`sh|`smcjejnmn `d~s` |em~mbhsgm

z ~êodjom njb`s`d~` pd bmo~hs ohgh pd `e`g`d~h bpdnmg`d~me }p` bmrhs`o`sí `e

n`mssheeh n` em ~`odhehkçm cjhgê~sjom$

=<$? N@CJEJNMN@_ Z \H_JCE@_ SJ@_KH_

=<$?$= @q|hjojÿd |ùcejom

Pdh n` eh |sjdoj|me` sj`kh ohd eh }p` op`d~md em ~`odhehkçm cjhgê~sjom ` em ksmd

`q|hjojÿd }p` ~j`d`d `~h |shz`o~h m em h|jdjÿd |ùcejom$ @|`ojmeg`d~` m}p`eeh }p`

` mchsnmd m djr`e dmojhdme hd gpz |pcejoj~mnh z `d `e omh n` }p` em jg|emd~mojÿd

bjdme dh `m m~jbmo~hsjm amcj~pmeg`d~` ` amo` |`sipnjom m ~hnm em jdnp~sjm |p` em

|`so`|ojÿd n` eh ojpnmnmdh ` d`km~jrm n` gmd`sm k`dêsjom z dh hcs` `e |shz`o~h

`|`oçbjoh$

=<$?$3 ^`ghs` |hs |ms~` n` eh ojpnmnmdh

Mùd ahz jkp` `qj~j`dnh pd n`ohdhojgj`d~h k`d`smejymnh |hs |ms~` n` em ojpnmnmdçm m

|`ms n` eh `bp`syh zm s`mejymnh$ @e |sjdoj|me gj`nh ` em mp`dojm h |êsnjnm n`

|sjrmojnmn n` eh ojpnmnmdh }pj`d` jkp`d ohdjn`smdnh }p` em cjhg`~sçm ` pdm

~`odhehkçm jd~spjrm |msm `eeh$ @ |hs `~h }p` `g|s`dn`s moojhd` n` ohdoj`dojmojÿd n`

omsío~`s k`d`sme hsj`d~mnm amojm em ojpnmnmdçm ohcsm `|`ojme s`e`rmdojm n` omsm m `rj~ms

em bmem `dmojÿd n` njgjdpojÿd n` |sjrmojnmn$

=<$?$? D`o`jnmn n` dhsgm~jrm |`oçbjom

M |`ms n` }p` em mo~pme dhsgm~jrm |p`nm `s pbjoj`d~` em mp`dojm n` s`kpemojÿd

`|`oçbjom |msm j~`gm n` s`ohdhojgj`d~h cjhgê~sjoh |p`n` `s pd sj`kh }p` n`cm

her`d~ms` n` em g`ihs gmd`sm |hjce`$ \msm `eeh ` `~mce`o`d pd ohdipd~h n`

s`ohg`dnmojhd` `d `~` `d~jnh }p` bmojej~`d em emchs n` eh hskmdjgh s`kpemnhs`$ 

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 90/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

== S@OHG@DNMOJHD@_

M ohd~jdpmojÿd ` am s`ohkjnh pd ohdipd~h n` ohd`ih z s`ohg`dnmojhd` |msm emjdr`~jkmojÿd jg|emd~mojÿd z ph n` em ~`odhehkçm cjhgê~sjom mç ohgh |msm p

s`kpemojÿd$

==$= S@OHG@DNMOJHD@_ NJSJKJNM_ M EM_ HSKMDJYMOJHD@_

Mekh `d eh }p` ohjdojn`d eh `q|`s~h ohdpe~mnh ` }p` ` ``dojme ohdjn`sms

njb`s`d~` m|`o~h m em ahsm n` rmehsms em |hjce` jg|emd~mojÿd n` pd j~`gm cjhgê~sjoh$

@d `~` `d~jnh hd n`~momce` eh jkpj`d~` bmo~hs`9

‣  Ehomejymojÿd9 @e epkms nhdn` ` rmzm m pcjoms bçjomg`d~` `e j~`gm n`

s`ohdhojgj`d~h cjhgê~sjoh ` pd bmo~hs oemr` |msm em `e`oojÿd n` em ~êodjom m

`g|e`ms$ @ |hs `eeh }p` ` n`c` ohd~`g|ems j ` `dohd~smsí pcjomnh `d yhdm

n` moo`h |ùcejoh h s`~sjdkjnh m em ahsm n` `e`oojhdms pdm ~êodjom n` gmzhs h

g`dhs s`j~`dojm me bsmpn` z `|`ojmeg`d~` m eh m~m}p` bçjoh$

‣  Bjdmejnmn |`s`kpjnm9 Mekpdh j~`gm n` s`ohdhojgj`d~h cjhgê~sjoh

|`sjkp`d r`sjbjoms em jn`d~jnmn n` eh ppmsjh !ohg|msmojÿd =9=* z h~sh jd

`gcmskh |`sjkp`d em jn`d~jbjomojÿd n` eh gjgh !ohg|msmojÿd =9d*$ @d `~`

`d~jnh em bjdmejnmn n`~`sgjdm `d gpoam homjhd` em om|mojnmn n` ohg|p~mojÿd

}p` s`}pj`s` `e j~`gm !gmzhs opmdnh em bjdmejnmn ` jn`d~jbjoms me ~`d`s }p`ohg|msms pdm gp`~sm ohd ~hnm em `qj~`d~` `d em cm` n` nm~h* z |hs ~md~h

em `e`oojÿd n` em ~êodjom m `g|e`ms$

‣  Dùg`sh n` ppmsjh9 _` n`c` ~`d`s `d op`d~m `e dùg`sh n` ppmsjh }p`

p~jejymsíd `e j~`gm cjhgê~sjoh$ @ |s`rjjce` }p` `d ksmdn` j~`gm n`

s`ohdhojgj`d~h ohd pdm `e`rmnm omskm n` s`ohdhojgj`d~h `m gí `dojeem em

m|ejomojÿd n` `ohdhgçm n` `omem s`npoj`dnh |hs ~md~h `e oh~` g`njh |hs

s`ohdhojgj`d~h$

‣  Ojsopd~mdojm n` eh ppmsjh9 Ohdho`s m eh ppmsjh bjdme` }p` rmd m

`g|e`ms `e j~`gm n` s`ohdhojgj`d~h |p`n` n`~`sgjdms |hs ohg|e`~h `e êqj~h h

bsmomh n` em jg|emd~mojÿd$ @d `~` `d~jnh ` n`c`sí ~`d`s `d op`d~m9

h  Ohdhojgj`d~h |s`rjh9

@ d`o`msjh ohdjn`sms `e ohdhojgj`d~h md~`sjhs

ohd `e }p` op`d~md eh ppmsjh n` omsm m bmojej~mse` em p~jejymojÿd n`e

j~`gm n` cjhg`~sçm !~md~h m eh ppmsjh bjdme` ohgh m eh ppmsjh

mngjdj~smnhs` n`e gjgh* |pnj`dnh `~jgms mç em d`o`jnmn n`

bhsgmojÿd |s`rjm me emdymgj`d~h$

@d~hsdh9 @qj~`d njb`s`d~` `d~hsdh nhdn` em p~jejymojÿd n` pd j~`gm

cjhgê~sjoh ohdos`~h |p`n` p|hd`s pd jdohdr`dj`d~`$ M ghnh n` `i`g|eh

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 91/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm := n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

dh ` n`c` p~jejyms `e s`ohdhojgj`d~h n` ap`eem nmo~jems `d pcjomojhd`

nhdn` eh `g|e`mnh n`cmd p~jejyms kpmd~` |sh~`o~hs` h nhdn`

amcj~pmeg`d~` ~`dkmd em gmdh aùg`nm h ghimnm$ ^mg|hoh n`c`síd

`g|e`ms` j~`gm n` s`ohdhojgj`d~h bmojme `d ope~psm nhdn`

amcj~pmeg`d~` em |`shdm opcsmd p sh~sh$

h Ohdbjmdym `d eh jdnjrjnph9

‣  Jdbhsgmojÿd `qj~`d~`9 @d `e ghg`d~h n` rmehsms `ohdÿgjomg`d~` }pê j~`gm

cjhgê~sjoh n`c` `g|e`ms` ` d`o`msjh s`oh|jems `e ohdipd~h n` jdbhsgmojÿd n`

em }p` ` nj|hd` |s`rjmg`d~`$ N` `~` ghnh ` |hnsíd m|shr`oams jd`skjm hs`p~jejyms e ~smcmih s`mejymnh d |shz`o~h md~`sjhs`$

Em p~jejymojÿd h dh p~jejymojÿd n` cjhg`~sçm

|msm em mp~`d~jomojÿd n` ppmsjh `d gpoam homjhd` rj`d` n`~`sgjdmnm

|hs em ohdbjmdym h n`ohdbjmdym }p` ` ~`dkm hcs` eh ppmsjh bjdme`$

Pdm r`y ohd~`g|emnh ~hnh `~h m|`o~h n` gmd`sm |s`rjm m em jg|emd~mojÿd n`e

j~`gm cjhgê~sjoh ` |hnsí `~jgms pd oh~` m|shqjgmnh n` em |p`~m `d gmsoam z n`

p gmd~`djgj`d~h `d `e ~j`g|h$

^sm n`~`sgjdms em d`o`jnmn n` jg|emd~mojÿd n` pd j~`gm cjhgê~sjoh ` s`ohgj`dnm m

em hskmdjymojhd` ~hgms em jkpj`d~` g`njnm9

=* M|h~ms |hs em jg|emd~mojÿd n` ~`odhehkçm n` omejnmn

3*

`~h ` md~` em njb`s`d~`~`odhehkçm `qj~`d~` `d `e g`somnh |sjgms m}p`eem }p` hbs`yomd gmzhs

bjmcjejnmn z ohd`op`d~`g`d~` g`ihs` s`pe~mnh$

Jdbhsgms` mn`opmnmg`d~`

?*

n` omsm m amo`s pd ph ohss`o~h n` em ~êodjom

cjhgê~sjom m jg|emd~ms `d em hskmdjymojÿd$

Hbs`o`s ohemchsmojÿd m eh ppmsjh bjdme`

>* _`s ohdoj`d~` n` }p`

6 em ohh|`smojÿd ohd `eeh ` `e ksmd

bmo~hs `d `e êqj~h n` em jg|emd~mojhd` n` ~`odhehkçm cjhgê~sjom$

eh nm~h cjhgê~sjoh hd n` omsío~`s |`shdme

0*

9 ` |hs `eeh}p` `~íd s`kpemnh |hs em E`z Hskídjom n` \sh~`oojÿd n` Nm~h z ` n`c`d

|sh~`k`s ohgh ~me`$

_hejoj~ms j`g|s` `e ohd`d~jgj`d~h n` s`ohkjnm z ph n` nm~h cjhgê~sjoh$ Em

`g|s`m }p` }pj`sm s`oh|jems z `g|e`ms njoah nm~h am n` hc~`d`s `e

ohd`d~jgj`d~h n`e ppmsjh jdbhsgídnhe` |s`rjmg`d~` n` p bjdmejnmn z

~sm~mgj`d~h$ N` `~` ghnh dh ÿeh ` opg|ejsí ohd em e`kjemojÿd jdh }p` pdm

mo~pmojÿd ~smd|ms`d~` mzpnmsí m g`ihsms eh djr`e` n` mo`|~mojÿd |hs em

ojpnmnmdçm em pmcjejnmn z |hs ~md~h em `b`o~jrjnmn n` `~m ~`odhehkçm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 92/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :3 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

2* Bmojej~ms `e `i sojojh n` eh n`s`oah MSOH

==$3 S@OHG@DNMOJHD@_ NJSJKJNM_ M EM JDNP_^SJM

n` eh ppmsjh hcs` p nm~h

|`shdme` nídnhe` m ohdho`s em |hjcjejnmn n` hc~`d`s jdbhsgmojÿd ghnjbjoms

p|sjgjs z h|hd`s` m p ~sm~mgj`d~h n` njoah nm~h$

Ohgh ` am n`osj~h |s`rjmg`d~` |msm em `emchsmojÿd n`e |s``d~` `~pnjh ` am ohd~mnh

ohd em ohemchsmojÿd n` `q|`s~h `d j~`gm cjhgê~sjoh n` gpz njr`sm dm~psme`ym

n`n` |`sbje` e`kme` m gí ~êodjoh$ @d `~` `d~jnh ` e` hejoj~ÿ }p` bp`smd osç~joh

ohd p |sh|jm jdnp~sjm z `~` ` `e ohdipd~h n` s`ohg`dnmojhd` n`~momce` me

s`|`o~h$

==$3$= Bmcsjomd~` z |shr``nhs` n` `srjojh

=* M|h~ms |hs em jddhrmojÿd

3* Hbs`o`s

`d `e n`mssheeh ` jg|emd~mojÿd ohd `e hci`~jrh n`bhg`d~ms em ~`odhehkçm cjhgê~sjom$

j~`gm n` me~m omejnmn

?*

bhg`d~mdnh `e êqj~h bjdme }p` mzpnmsí m em

g`ihsm n` em jgmk`d n` em cjhg`~sçm `d k`d`sme$

_her`d~ms em npnm n` eh oej`d~`

>*

jdbhsgmdnh n` em jg|hs~mdojm z em cm`

~`odheÿkjom n`e j~`gm6 n` `~m bhsgm `e oej`d~` |hnsí ~hgms pdm n`ojjÿd

jdbhsgmnm hcs` em ~`odhehkçm m jg|emd~ms$

Mdmejyms me oej`d~`

0* \shghr`s pdm

|msm |hn`s m`hsmse` `d em ~`odhehkçm jnÿd`m `kùd p

d`o`jnmn` z |hn`s bhsgms m|sh|jmnmg`d~` m eh ppmsjh hcs` p p~jejymojÿd$

pdjbjomojÿd n` mekhsj~gh ojbsmnh z |sho`h n` `q~smoojÿd n`

gp`~sm

2*

eh }p` bmrhs`o`sí em jd~`sh|`smcjejnmn `d~s` eh j~`gm jg|emd~mnh$

Gh~sms em r`d~mim n` `~h |shnpo~h z `srjojh z dh `qmk`sms hcs` eh

n`b`o~h h jdohdr`dj`d~` n` h~sm ~êodjom

;*

n` em ohg|`~`dojm zm }p` ohgh

ohd`op`dojm n` `eeh ` n`|s`~jkjm m em cjhg`~sçm `d k`d`sme$

_hejoj~ms |`sgjh m eh ppmsjh |msm ~sm~ms p nm~h cjhgê~sjoh

1* Kmsmd~jyms `|`ojmeg`d~` em

j`dnh gpz

ohdos`~h z ~smd|ms`d~` hcs` `e ~sm~mgj`d~h z em bjdmejnmn n` p ph$

`kpsjnmn z ohdbjn`dojmejnmn

 

n` eh nm~h o`njnh

|msm k`d`sms ohdbjmdym `d eh ppmsjh n`e j~`gm$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 93/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

==$3$3 Jdr`~jkmnhs`

=* Mnm|~ms` m eh s`}p`sjgj`d~h n` eh ppmsjh bjdme` ohd `e hci`~jrh n`

n`mssheems eçd`m n` jdr`~jkmojÿd }p` |p`nmd m~jbmo`s em d`o`jnmn`

3* Ohdho`s em j~pmojÿd mo~pme n` em jdnp~sjm cjhgê~sjom z

`qj~`d~`$

`rj~ms em `emchsmojÿd n`

|sh~h~j|h n` njbçoje m|ejomojÿd

?* @q|ehsms njb`s`d~` h|ojhd` n`

`d `e ígcj~h ohg`sojme |hs p oh~` h p~jejnmn$

g`ihsm z mcmsm~mgj`d~h

>* S`mejyms

n` em ~`odhehkçm |msm

bmrhs`o`s p n`mssheeh z `q|mdjÿd$

emchs njrpekm~jrm

==$? S@OHG@DNMOJHD@_ NJSJKJNM_ M EM_ MNGJDJ_^SMOJHD@_ \ÙCEJOM_

n` omsm m bhg`d~ms }p` em ojpnmnmdçm ` bmgjejmsjo`

ohg|s`dnm z ohdbç` `d em cjhg`~sçm$

Ohgh `d gpoah h~sh m|`o~h jddhrmnhs` `|`ojmeg`d~` `d `e ígcj~h n` em

`kpsjnmn em Mngjdj~smojhd` \ùcejom hd pd bmo~hs oemr` `d `e n`mssheeh n` em

cjhg`~sçm$ @d `~` `d~jnh ~sm em `emchsmojÿd n`e |s``d~` `~pnjh omc` n`~moms em

jkpj`d~` s`ohg`dnmojhd` n` omsm m bhg`d~ms z bmojej~ms `e ohdhojgj`d~h z em p~jejymojÿd

n` ~`odhehkçm cjhgê~sjom$

=* Bmojej~ms moo`h m `srjojh |ùcejoh |hs |ms~` n` eh ojpnmnmdh `g|e`mdnh

j~`gm cjhgê~sjoh$

3* P~jejymojÿd n`

Em r`d~mim `rjn`d~` |msm eh ojpnmnmdh n` omsm m

s`mejyms ~hnh eh ~sígj~` ohd em mngjdj~smojhd` |ùcejom n` gmd`sm ~`e`gí~jom

z g`njmd~` p mp~`d~jomojÿd m nj~mdojm p|hdnsí pd |`so`|ojÿd gpz |hj~jrm |hs

|ms~` n` eh gjgh$

j~`gm cjhgê~sjoh |msm p |sh|jm jd~memojhd`

?* Em ohd~jdpjnmn `d em

$ Mn`gí n`

bhg`d~ms p ph z ohdhojgj`d~h em jg|emd~mojÿd n` j~`gm cjhgê~sjoh `d em

jd~memojhd` n` em mngjdj~smojhd` |p`n` p|hd`s pdm g`ihsm `d em `kpsjnmn z

em `bjoj`dojm n` eh ~smcmimnhs`$

jdr`sjÿd `d gm~`sjm n` n`b`dm z ohd~she n` bshd~`sm

>* Ohgh `d ~hnm ~`odhehkçm |pd~m em ohd~jdpmnm

p~jejymdnh j~`gm cjhgê~sjoh njgjdpz` em d`o`jnmn n` s`opsh apgmdh

|msm `~m ~ms`m z |`sgj~` `e `g|`ýh n` eh s`opsh n` em bp`sym z op`s|h n`

`kpsjnmn `d h~sm bpdojhd` nhdn` em jd~`sr`dojÿd apgmdm `m osç~jom$

jdr`sjÿd `d jdr`~jkmojÿd z

n`mssheeh

0* Ee`rms m omch moojhd` n`

` ~hsdm ``dojme n` omsm m hc~`d`s mùd g`ihs` j~`gm cjhgê~sjoh$

njrpekmojÿd n` eh c`d`bjojh n`e ph n` ~`odhehkçm

cjhgê~sjom n`gj~jbjomdnh p jdohdr`dj`d~` z `rjn`dojmdnh em g`ihsm }p`|p`n`d p|hd`s `d `e nçm m nçm n` eh ojpnmnmdh$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 94/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

==$> S@OHG@DNMOJHD@_ \MSM E@KJ_EMNHS@_ Z MK@D^@_ N@

@_^MDNMSJYMOJßD

Eh hskmdjgh `domskmnh n` s`kpems z dhsgmejyms eh njb`s`d~` m|`o~h n` emcjhg`~sçm ~md~h e`kme ohgh ~êodjomg`d~` |p`n`d bhg`d~ms p n`mssheeh jkpj`dnh pdm

`sj` n` s`ohg`dnmojhd`9

=* Kmsmd~jyms eh n`s`oah n` |sjrmojnmn n` eh ojpnmnmdh

3* _j cj`d em s`kpemojÿd mo~pme `d @|mým `d gm~`sjm n` |sh~`oojÿd n` nm~h `

pbjoj`d~` |msm s`kpems `e ígcj~h n` em cjhg`~sçm n` omsm m pdjbjoms osj~`sjh z

m~`dn`s m pdm `|`ojme `djcjejnmn n` em |hcemojÿd |hnsçm `s ohdr`dj`d~`n`mssheems pdm

|`sgj~j`dnh me gjgh

~j`g|h `e n`mssheeh n` em ~`odhehkçm }p` hbs`o`d pdm gmzhs `kpsjnmn ohgh

em cjhgê~sjom$

s`kpemojÿd `|`oçbjom |msm em cjhg`~sçm

?*

$

@rj~ms pdm dhsgm~jrm `qo`jrmg`d~` sçkjnm

>* N`mssheems pd

}p` jg|jnm h njbjope~` `e ph n` em

cjhg`~sçm h }p` dh ` |p`nm mnm|~ms bíojeg`d~` m eh bp~psh n`mssheeh$

mdíejj |shbpdnh n` eh sj`kh z c`d`bjojh

0* Mrmdyms `d em

n` em cjhg`~sçm md~`

n` s`nmo~ms z |shgpekms em dhsgm~jrm n` n`mssheeh$

s`kpemojÿd e`kjem~jrm s`em~jrm m em p|emd~mojÿd n` jn`d~jnmn

2* Bhg`d~ms em

pdm n`

em gmzhs` mg`dmym jn`d~jbjomnm$

os`mojÿd n` pd `~ídnms ùdjoh

 

|msm omnm ~`odhehkçm }p` bmojej~` em

jd~`sh|`smcjejnmn$

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 95/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

MD@QH J9 CJCEJHKSMBÇM

‣  Mjs Pdjr`sj~z mdn J}sm Pdjr`sj~z !3<==*$ Cjhg`~sjo Moo` Ohd~she _z~`g Pjdk 

Mp~hgm~`n Jsj S`ohkdj~jhd$ a~~|9((j}smpdjr`sj~z$`np$|f(MI@_^%3<Rhepg`%3<=%3<Jp`%3<=$|nb 

‣  O`d~sme Jd~j~p~` hb ^`oadhehkz hb Fhfsmiams !3<=<*$ Jd~`sd`~ Cmdfjdk Sjf Mdmezj 

mdn M||ejomcjej~z hb Cjhg`~sjo ^`oadhehkz bhs Mp~a`d~jom~jhd$

a~~|9((jih|mmm~$jd(zmahhXj~`Xmngjd(m`~(nho(Kpdmij~X\m| s'

2XS`rj`{X$=1=:310=$|nb 

‣  O`d~s` bhs @psh|`md \hejoz _~pnj` !3<<2*$ Ohggpdjom~jdk !jd*_`opsj~z9 M Bmjeps` hb 

\pcejo Nj|ehgmoz8 ‣  O`d~s` bhs @psh|`md \hejoz _~pnj` !3<=<*$ N`r`eh|jdk Cjhg`~sjo jd ~a` @P$ 

‣  O`d~s` bhs @psh|`md \hejoz _~pnj` !3<=<*$ ]pmd~pg _psr`jeemdo` mdn ‑_ams`n 

_`os`~‚$ M cjhg`~sjo ~`| ~hh bms8  

‣  Ohg|p~`s Em{ " _`opsj~z S`rj`{ !3<==*$ Chnz omdd`s r$ |sjrmoz mdn nm~m 

|sh~`o~jhd$

a~~|9(({{{$pjh$dh(~pnj`s(`gd`s(ip(ip(IPS02?<(r==(pdn`srjdjdkgm~`sjme`(Gjshd`d

fhXms~joe`X=?<=3<==$|nb 

‣  N`ehj~~` " Dm~jhdme \azjome Emchsm~hsz !3<<2*$ Em~`~ cjhg`~sjo ~`~ s`pe~9 

|`sbhsgmdo`% }pmej~z mdn jd~`sh|`smcjej~z$

‣  N`ehj~~` !3<<>*$ Cjhg`~sjo `opsj~z$ 

‣  N`ehj~~` !3<<0*$ Cjhg`~sjo JN omsn n`cm~`$ 

‣  N`ehj~~` !3<<0*$ _pj~mcjej~z hb cjhg`~sjo m~ mjs|hs~ !Mjs|hs~ Jdnp~sz Ohdb`s`do` 3<<0%

Ghoh{*$

‣  Êohe` \hez~`oadj}p` Bênêsme` n` Empmdd` !3<=<*$ Cjhg`~sjo " _`opsj~z Ohgcjdjdk 

Bjdk`s|sjd~% _gms~ Omsn mdn Osz|~hksm|az$

‣  @psh|`md Ohggj~`` bhs _~mdnmsjym~jhd !3<<:*$ S`|hs~ hd m cjhg`~sjo |shbje` |`ojbjo 

~h osh'chsn`s jd~`sh|`smcjej~z hb cjhg`~sjo m||ejomce` ~h `'Jn`d~j~z$

a~~|9(({{{$o`d$`p(o`d(_`o~hs(_`o~hs(J___(Bhop(Nhopg`d~(S`|hs~Oshchsn`sJd~

`sh|`smcjej~zr=<m~~=$|nb 

‣  @psh|`md Ohggj~~`` bhs _~mdnmsnjym~jhd !3<<>*$ ^h{msn md `e`o~shdjo JN bhs ~a` @psh|`md Oj~jy`d% m ~sm~`kjo rjjhd$ 

a~~|9(({{{$pgjo$|~(jgmk`(~hsj`(|pcejomoh`(^h{msn%3<`JN$|nb 

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 96/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

‣  Bhss`~`s !3<<1*$ Cjhg`~sjo9 _~m~` Hb ^a` Ms~ Mdn Bp~ps` Jg|ejom~jhd$ 

‣  Bhss`~`s !3<=<*$ _gms~ Ohg|p~jdk Bp`e Cjhg`~sjo Ksh{~a$ 

‣  Bhss`~`s !3<==*$ Bhssjka~9 ^a` @rhep~jhd hb J^ _`opsj~z% 3<=< ^h 3<==$ 

‣  Kms~d`s !3<<1*$ Om` _~pnz ' A`me~a Gmdmk`g`d~ Ohg|mdz N`|ehz Rhjo` 

Cjhg`~sjo bhs Omee`s R`sjbjom~jhd$ 

‣  Kms~d`s !3<=<*$ Az|` Ozoe` bhs Ohd~mo~ O`d~`s Jdbsm~spo~ps`$ 

‣  Kms~d`s !3<=<*$ Az|` Ozoe` bhs Jn`d~j~z mdn Moo` Gmdmk`g`d~ ^`oadhehkj`$ 

‣  Kms~d`s !3<=<*$ ]"M9 Cjhg`~sjo Mp~a`d~jom~jhd G`~ahn$ 

‣  Kms~d`s !3<=<*$ S`rjj~jdk ~a` Cpjd` Om` bhs Cjhg`~sjo mdn S`~mje ^jg`f``|jdk$

‣  Kms~d`s !3<==*$ Pjdk Rhjo` S`ohkdj~jhd ^`oadhehkz ~h Om|~ps` Osjgjdme$ 

‣  Jd~j~p~` hb @e`o~sjome mdn @e`o~shdjo @dkjd``s !3<==*$ Pdjr`sme cjhg`~sjo `rmepm~jhd 

z~`g9 Bsmg`{hsf bhs ~`~jdk `rmepm~jhd mdn ohg|msjhd hb cjhg`~sjo g`~ahn$ 

‣  Gjoajkmd _~m~` Pdjr`sj~z !3<=<*$ Cjhg`~sjo hb D`q~ K`d`sm~jhd9 Md Hr`srj`{$ 

‣  _sj Imzmoamgmsmi`dnsm Ohee`k` hb @dkjd``sjdk !3<==*$ Bp~ps` \m~a [mz ~h Cjhg`~sjo$ 

‣  ^spc MK !3<<0*$ Cjhg`~sjo [aj~`|m|`s$ 

‣  Pdjr`sjnmn Omseh JJJ n` Gmnsjn !3<=<*$ \sjrmoz mdn E`kme S`}pjs`g`d~ bhs 

N`r`eh|jdk Cjhg`~sjo Jn`d~jbjom~jhd _hb~{ms` jd Ohd~`q~'Cm`n M||ejom~jhd $

a~~|9(({{{$`so$hsk(ihpsdme(JIC_C^(rhe3Xdh=(3$|nb 

‣  Pdjr`sjnmn n` N`p~h " Pdjr`sjnmn n`e \mç Rmoh !3<<;  *$ Mdíejj `d ~hsdh m em 

~`odhehkçm cjhgê~sjom |msm eh j~`gm `e`o~sÿdjoh n` jn`d~jbjomojÿd z mp~`d~jomojÿd $

a~~|9(({{{$s`n`{`c$ohg(X~q~(2?<(03$|nb 

‣  Pdjr`sj~ì nj Chehkdm !3<<:*$ Cjhg`~sjo Bjdk`s|sjd~ S`ohkdj~jhd _z~`g $

a~~|9((mgnh~~hsm~h$ojc$pdjch$j~(=3?>(=(^`jBjdme`X'XGm~~`hXB`ssmsm$|nb 

‣  Pdjr`sj~z hb F`cmdkmmd " Jd~j~p~` hb @e`o~sjome mdn @e`o~shdjo @dkjd``s !3<==*$

_~m~` hb ~a` ms~ jd hbbejd` jkdm~ps` r`sjbjom~jhd z~`g$ 

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 97/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

MD@QH JJ9 ÇDNJO@_ N@ ^MCEM_% KSÍBJOH_ @

JEP_^SMOJHD@_

ÇDNJO@ N@ ^MCEM_

^mcem =9 _`dhs` `kùd ~j|h n` ~`odhehkçm cjhgê~sjom  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$3?

^mcem 39 \msíg`~sh ohdjn`smnh `d omnm ~`odhehkçm cjhgê~sjom  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$3>

^mcem ?9 Omsmo~`sç~jom `q~smçnm `d omnm ~êodjom cjhgê~sjom  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$30

^mcem >9 Rmehsmojÿd ohg|msm~jrm n` em nj~jd~m ~êodjom cjhgê~sjom  $$$$$$$$$$$$$$$$$$$$$$$$$$$$>=

^mcem 09 R`d~mim ` jdohdr`dj`d~` n` em nj~jd~m ~`odhehkçm  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>=

^mcem 29 Ohg|msm~jrm cjhg`~sçm r Ohd~sm`ým(~msi`~m  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>2

^mcem ;9 \sjdoj|me` ~ídnms` qj~`d~`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$;1

^mcem 19 Jg|mo~h `d em |sjrmojnmn  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1<

^mcem :9 Rped`smcjejnmn`  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1?

 

ÇDNJO@ N@ KSÍBJOH_

Ksíbjoh =9 \sho`h n` jdosj|ojÿd `d `e s`kj~sh  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$30

Ksíbjoh 39 \sho`h n` jn`d~jbjomojÿd `d em mp~`d~jomojÿd  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$32

Ksíbjoh ?9 \sho`h n` r`sjbjomojÿd `d em mp~`d~jomojÿd  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$3;

Ksíbjoh >9 Ksmnh n` jg|emd~mojÿd `d `e g`somnh  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>?

 

ÇDNJO@ N@ JEP_^SMOJHD@_

Jep~smojÿd =9 Gjdpojm n` pdm ap`eem nmo~jems  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?<

Jep~smojÿd 39 êodjom n` ohss`emojÿd  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?<

Jep~smojÿd ?9 S`ohdhojgj`d~h bmojme  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?=

Jep~smojÿd >9 S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh 

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?>

Jep~smojÿd 09 S`ohdhojgj`d~h n` s`~jdm  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?0

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 98/100

 

@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd 

Jep~smojÿd 29 S`ohdhojgj`d~h n` r`dm n` em gmdh  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?2

Jep~smojÿd ;9 S`ohdhojgj`d~h n` em bhsgm n` mdnms  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?:

Jep~smojÿd 19 Ohd~she n` moo`h  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$0;

Jep~smojÿd :9 Ohd~she n` |s``dojm n` nhce` bmo~hs  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$0;

Jep~smojÿd =<9 Moo`h sí|jnh m bshd~`sm m`sh|hs~pmsjm  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$2?

Jep~smojÿd ==9 M|ejomojÿd |msm k`~jÿd n` mzpnm |ùcejom m ~smrê n` omi`sh 

mp~hgí~joh  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$22

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 99/100

 

_çkp`dh m ~smrê n`9

[`c a~~|9((hc`srm~hsjh$jd~`oh$`

\`sbje Bmo`chhf Hc`srmJD^@OH

a~~|9(({{{$bmo`chhf$ohg(Hc`srmJD^@OH

\`sbje {j~~`s Hc`srmJD^@OH

a~~|9(({{{$~{j~~`s$ohg(Hc`srmJD^@OH\`sbje _osjcn Hc`srmJD^@OH

a~~|9(({{{$osjcn$ohg(Hc`srmJD^@OH

Omdme Zhp~pc` Hc`srmJD^@OH

a~~|9(({{{$zhp~pc`$ohg(Hc`srmJD^@OH

Cehk n`e Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd9

a~~|9(({{{$jd~`oh$`(cehk(jd~`oh(_`kpsjnmn(Cehk_`kpsjnmn 

@drçmdh ~p ohdpe~m z ohg`d~msjh m9

hc`srm~hsjhLjd~`oh$` 

8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad

http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 100/100

 

Jds~j~p~hDmojhdmen`^`odhehkçmsn`emOhgpdjomojÿd