Upload
inteco
View
218
Download
0
Embed Size (px)
Citation preview
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 1/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm = n` =<< Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
@~pnjh hcs` em ~`odhehkçm
cjhgê~sjom m|ejomnm m em `kpsjnmn
HC_@SRM^HSJH N@ EM _@KPSJNMN N@ EM JDBHSGMOJßD
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 2/100
@~pn jh hcs` em ~` odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3 n` =<< Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
@njojÿd9 Njoj`gcs` 3<==
@e ―@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn‗ am jnh `emchsmnh |hs `e
jkpj`d~` `}pj|h n` ~smcmih n`e Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd n` JD^@OH9
\mceh \ês`y _md'Ihê !njs`oojÿd*
@npmsnh Íerms`y Mehdh !ohhsnjdmojÿd*
_pmdm n` em Bp`d~` Shnsçkp`y
Empsm Kmsoçm \ês`y
Osj~jdm Kp~jêss`y Chsk`
Ohss`h `e`o~sÿdjoh n`e Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd9 hc`srm~hsjhLjd~`oh$`
Em |s``d~` |pcejomojÿd |`s~`d`o` me Jd~j~p~h Dmojhdme n` ^`odhehkçm n` em Ohgpdjomojÿd !JD^@OH* z `~í cmih pdmejo`dojm S`ohdhojgj`d~h'Dh ohg`sojme ?$< @|mým n` Os`m~jr` Ohgghd z |hs `eeh `~í |`sgj~jnh oh|jms nj~sjcpjs zohgpdjoms |ùcejomg`d~` ~m hcsm cmih em ohdnjojhd` jkpj`d~`9
‣ S`ohdhojgj`d~h9 @e ohd~`djnh n` `~` jdbhsg` ` |p`n` s`|shnpojs ~h~me h |msojmeg`d~` |hs ~`so`sh oj~mdnh p|sho`n`dojm z amoj`dnh s`b`s`dojm `q|s`m ~md~h m JD^@OH ohgh m p j~jh {`c9 {{{$jd~`oh$`$ Njoahs`ohdhojgj`d~h dh |hnsí `d djdkùd omh pk`sjs }p` JD^@OH |s`~m m|hzh m njoah ~`so`sh h m|hzm `e ph }p` amo`n` p hcsm$
‣ Ph Dh Ohg`sojme9 @e gm~`sjme hsjkjdme z eh ~smcmih n`sjrmnh |p`n`d `s nj~sjcpjnh oh|jmnh z `qajcjnhgj`d~sm p ph dh ~`dkm bjd` ohg`sojme`$
Me s`p~jejyms h nj~sjcpjs em hcsm ~j`d` }p` n`ims cj`d oemsh eh ~êsgjdh n` em ejo`dojm n` `~m hcsm$ Mekpdm n` `~mohdnjojhd` |p`n` dh m|ejoms` j ` hc~j`d` `e |`sgjh n` JD^@OH ohgh ~j~pems n` eh n`s`oah n` mp~hs$ Dmnm `d `~mejo`dojm g`dhomcm h s`~sjdk` eh n`s`oah ghsme` n` JD^@OH$ a~~|9((os`m~jr`ohgghd$hsk(ejo`d (cz'do(?$<(`(
@e |s``d~` nhopg`d~h opg|e` ohd em ohdnjojhd` n` moo`jcjejnmn n`e bhsgm~h \NB !\hs~mce` Nhopg`d~ Bhsgm~*$ Mç `~sm~m n` pd nhopg`d~h `~spo~psmnh z `~j}p`~mnh |shrj~h n` me~`sdm~jrm m ~hnh `e`g`d~h dh ~`q~pme gmsomnh n` jnjhgm zhsn`d n` e`o~psm mn`opmnh$
\msm mg|ejms jdbhsgmojÿd hcs` em ohd~spoojÿd n` nhopg`d~h \NB moo`jce` |p`n` ohdpe~ms em kpçm nj|hdjce` `d em`oojÿd Moo`jcjejnmn 4 Bhsgmojÿd 4 Gmdpme` z Kpçm n` em |íkjdm a~~|9(({{{$jd~`oh$`
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 3/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ? n` =<< Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
ÇDNJO@
=
JD^SHNPOOJßD Z HCI@^JRH_
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$=<
=$= \s``d~mojÿd $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$=<
=$3 @~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn $$$$$$$$$$$$$$$$$$=3
3 NJ_@ÝH G@^HNHEßKJOH $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$=0
3$= Bm` =9 Cù}p`nm z mdíejj nhopg`d~me$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$=0
3$3 Bm` 39 Ohdpe~m m `q|`s~h $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$=2
3$? Bm` ?9 @emchsmojÿd n`e jdbhsg` n` ohdoepjhd` bjdme` n`e |shz`o~h $$$$$$$$$$$$$$$3=
3$> Bm` >9 @emchsmojÿd n` pdm kpçm |sío~jom njsjkjnm m ppmsjh $$$$$$$$$$$$$$$$$$$$$$$$$$$$3=
? JD^SHNPOOJßD M EM_ ^@ODHEHKÇM_ CJHGÊ^SJOM_ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$33
?$= Md~`o`n`d~` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$33
?$3 Ohdo`|~h oemr` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$3?
?$? ^j|h ~êodjom z ~`odhehkçm m|ejomnm m em cjhg`~sçm $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$31
?$> Ohg|msm~jrm n` ~êodjom z ~`odhehkçm cjhgê~sjom $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?:
> MDÍEJ_J_ N@ EH_ \SHO@_H_ N@ JN@D^JBJOMOJßD $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>0
>$= Mdíejj n` em ~êodjom m|ejomnm z ~j|h n` jn`d~jbjomojÿd $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>0
>$3 _j~`gm n` mp~`d~jomojÿd n` nhce` bmo~hs $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>;
0 C@D@BJOJH_ N@ EM P^JEJYMOJßD N@ EM_ ^@ODHEHKÇM_ CJHGÊ^SJOM_ $$$$$$$$$0<
0$= \msm em `d~jnmn` ppmsjm $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$0<
0$3 \msm eh ppmsjh bjdme` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$03
2 P_H_ Z M\EJOMOJHD@_ N@ EM_ ^@ODHEHKÇM_ CJHGÊ^SJOM_ $$$$$$$$$$$$$$$$$$$$$$$$00
2$= M|ejomojhd` mo~pme` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$02
2$3 M|ejomojhd` `d bm` n` n`mssheeh $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$2<
; OM_H_ N@ ÊQJ^H $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$23
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 4/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm > n` =<< Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
;$= Moo`h sí|jnh m bshd~`sm m`sh|hs~pmsjm !@|mým* $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$23
;$3 K`~jÿd n` mzpnm |ùcejom !\hehdjm* $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$20
1 GMSOH S@KPEM^HSJH $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$21
1$= Dhsgm~jrm e`kme $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$21
1$3 Jdbhsg` Ipsçnjoh z ipsj|spn`dojm $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$;3
1$? @~ídnms` jd~`sdmojhdme` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$;2
: K@_^JßD N@ SJ@_KH_ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$;:
:$= Mg`dmym z rped`smcjejnmn` `d eh |sho`h $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$;:
:$3 Gê~hnh n` hepojÿd z |s`r`dojÿd $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1>
=< OHDOEP_JHD@_ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1;
=<$= Ohdoepjhd` k`d`sme` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1;
=<$3 Bhs~me`ym z h|hs~pdjnmn` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$11
=<$? N`cjejnmn` z |hjce` sj`kh $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1:
== S@OHG@DNMOJHD@_ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:<
==$= S`ohg`dnmojhd` njsjkjnm m em hskmdjymojhd` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:<
==$3 S`ohg`dnmojhd` njsjkjnm m em jdnp~sjm $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:3
==$? S`ohg`dnmojhd` njsjkjnm m em Mngjdj~smojhd` \ùcejom $$$$$$$$$$$$$$$$$$$$$$$$$$$$:?
==$>
S`ohg`dnmojhd` |msm e`kjemnhs` z mk`d~` n` `~mdnmsjymojÿd
$$$$$$$$$$$$$$$$$$:>
MD@QH J9 CJCEJHKSMBÇM $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:0
MD@QH JJ9 ÇDNJO@_ N@ ^MCEM_ KSÍBJOH_ @ JEP_^SMOJHD@_ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:;
Çdnjo` n` ~mcem $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:;
Çdnjo` n` ksíbjoh $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:;
Çdnjo` n` jep~smojhd` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$:;
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 5/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
\PD^H_ OEMR@
JD^@OH ohd em gjjÿd n` m|hs~ms rmehs z n`mssheems em _hoj`nmn n`e Ohdhojgj`d~h m~smrê n` |shz`o~h `d `e gmsoh n` em jddhrmojÿd z em ~`odhehkçm |pcejom `e @~pnjh hcs`
em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn $
@d `e g`somnh `qj~`d gùe~j|e` hepojhd` cjhgê~sjom njb`s`dojmnm ~md~h |hs em ~êodjom
}p` `g|e`md ohgh |hs em bpdojhdmejnmn }p` hbs`o`d jd `gcmskh ~hnm `eem `~íd
hsj`d~mnm me s`ohdhojgj`d~h n` |`shdm bçjom$ @~m bjdmejnmn ùe~jgm p|hd` `e
~sm~mgj`d~h n` nm~h n` omsío~`s |`shdme |hs eh }p` em |sjrmojnmn ` ohdrj`s~` `d pd
m|`o~h `|`ojmeg`d~` s`e`rmd~` `d `e ígcj~h n` em cjhg`~sçm$
Em g`~hnhehkçm p~jejymnm |msm em s`mejymojÿd n`e `~pnjh z em ohd`op`d~` |pcejomojÿd n`e|s``d~` jdbhsg` `~í bpdnmg`d~mnm `d nh m|`o~h ohg|e`g`d~msjh$
@d |sjg`s epkms ` cmm `d `e mdíejj nhopg`d~me |msm eh opme ` amd jdr`d~msjmnh em
bp`d~` n` jdbhsgmojÿd }p` nj|hd`d z |pcejomd `~pnjh jdbhsg` h ~smcmih
s`emojhdmnh ohd em cjhg`~sçm z ` amd mdmejymnh em |sjdoj|me` ohdoepjhd` n` m}p`eeh
jdbhsg` }p` ohd~j`d`d jdbhsgmojÿd mo~pme z ù~je |msm s`mejyms `~` `~pnjh$
\msme`emg`d~` ` am ohdpe~mnh g`njmd~` `d~s`rj~m m njb`s`d~` mo~hs` n` em jdnp~sjm
n` em cjhg`~sçm m djr`e gpdnjme jdrheposmdnh m bmcsjomd~` nj~sjcpjnhs` `q|`s~h `d
n`s`oah ohdpe~hs` ` jdr`~jkmnhs`$ Mç gjgh ` am s`mejymdnh pd mdíejj n`~meemnh
n` nh omh n` êqj~h s`ohdhojnh jd~`sdmojhdmeg`d~`$
@~m njr`sjnmn n` ohe`o~jrh |ms~joj|md~` `d `e `~pnjh |`sgj~` ipd~h me mdíejj n` eh
jdbhsg` z s`|hs~` ohdho`s `e `~mnh mo~pme n` eh j~`gm cjhgê~sjoh n`n`
njb`s`d~` |pd~h n` rj~m jn`d~jbjomdnh mç eh |sjdoj|me` |pd~h m bmrhs z h|hs~pdjnmn`
z eh |pd~h `d ohd~sm z |hjce` sj`kh }p` mbshd~md mo~pmeg`d~`$
J$ Jd~shnpoojÿd m em ~`odhehkçm cjhgê~sjom
@e mdíejj nhopg`d~me am |`sgj~jnh em jn`d~jbjomojÿd n` em |sjdoj|me` ~êodjom
cjhgê~sjom `qj~`d~`$ _j cj`d mekpdm n` `eem mùd ` `dop`d~smd `d `~mnh n`
gmnps`y jdpbjoj`d~` |msm |hn`s `dohd~sms` `d `e g`somnh n` pdm bhsgm `bjoj`d~` z
smyhdmce` `d opmd~h m oh~` gpoam h~sm ` `dop`d~smd pbjoj`d~`g`d~` gmnpsm z
hbs`o`d mo~pmeg`d~` hepojhd` n` mp~`d~jomojÿd `d gpz njr`sh ígcj~h$
Em ~êodjom cjhgê~sjom `qj~`d~` ` oemjbjomd `d bpdojÿd n`e smkh apgmdh mdmejymnh
`e opme |p`n` `s bjjheÿkjoh ‟nhdn` `dohd~smgh `e s`ohdhojgj`d~h n` ap`eem nmo~jems n`
jsj n` s`~jdm z n` sh~sh `d~s` h~sh‟ h n` ohg|hs~mgj`d~h ‟nhdn` ` `dop`d~smd `e
s`ohdhojgj`d~h n` rhy n` bjsgm h n` em gmd`sm n` mdnms `d~s` h~sh‟$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 6/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
@e `~pnjh s`r`em }p` `e s`ohdhojgj`d~h n` ap`eem nmo~jems z `e s`ohdhojgj`d~h n` jsj hd
em ~êodjom mo~pmeg`d~` gí `q~`dnjnm `d `e `o~hs n` em cjhg`~sçm$ Eh |sjdoj|me`
gh~jrh n` em `q|mdjÿd n` mgcm ~êodjom ` cmmd |sjdoj|meg`d~` `d }p` ` ~sm~m n`
gê~hnh n` mp~`d~jomojÿd gpz |hoh jd~spjrh ohd eh ppmsjh bjdme` z `d }p` mgcm
~êodjom bp`shd n` em |sjg`sm `d `s ohdo`cjnm eh }p` am |`sgj~jnh |hs pd emnh p
gmzhs n`mssheeh z `rhepojÿd amojm pdm s`npoojÿd n` oh~` n` jg|e`g`d~mojÿd z |hs
h~sh emnh em ohdbjmdym |hs |ms~` n` eh ojpnmnmdh }p` s`npo` em s`j~`dojm jdjojme me ph
n` dp`rm ~`odhehkçm$
JJ$ Mdíejj n` eh |sho`h n` jn`d~jbjomojÿd cmmnh `d cjhg`~sçm
@e |shks`jrh mrmdo` n` em ~`odhehkçm cjhgê~sjom am p|p`~h em |shks`jÿd n` em
bhsgm pdjghnme m j~`gm n` mp~`d~jomojÿd n` nhce` bmo~hs }p` |p`n`d jdohs|hsms gín` pdm ~`odhehkçm cjhgê~sjom ‟cjhg`~sçm cjghnme‟ h ohgcjdms `e ph n` em cjhg`~sçm ohd
h~sh j~`gm ohgh ~msi`~m n` jn`d~jbjomojÿd h ohd~sm`ým$ @ |hs `eeh }p` eh `q|`s~h
`ýmemd }p` em ohgcjdmojÿd n` ~êodjom cjhgê~sjom ohd h~sh j~`gm n`
s`ohdhojgj`d~h ` amcj~pmeg`d~` pd m|`o~h oemr` |msm `e êqj~h n` eh j~`gm n`
mp~`d~jomojÿd$
JJJ$ C`d`bjojh n` em p~jejymojÿd n` em ~`odhehkçm cjhgê~sjom
Em m|ejomojÿd n` ~`odhehkçm cjhgê~sjom s`|hs~m njb`s`d~` c`d`bjojh ~md~h |msm em
hskmdjymojhd` ohgh |msm eh |sh|jh ppmsjh$
Eh c`d`bjojh |msm em `d~jnmn` ` o`d~smd `d `e mpg`d~h n` eh djr`e` n` `kpsjnmn
em s`npoojÿd n` em |hjcjejnmn` n` bsmpn` jd~`sdh z em s`npoojÿd `d eh oh~` n`
gmd~`djgj`d~h n` eh j~`gm n` `kpsjnmn z mp~`d~jomojÿd$
\hs p |ms~` eh ppmsjh |p`n`d r`s ohgh mpg`d~m p ohghnjnmn me dh ~`d`s }p`
s`ohsnms gùe~j|e` z ohg|e`im ohd~sm`ým |hnsíd s`mejyms ~smgj~mojhd` s`gh~m ohd
gmzhs `kpsjnmn z `d `e omh n` h|`smojhd` |s``dojme` |hnsíd r`s s`npojnh eh
~j`g|h n` `|`sm$ \hs h~sm |ms~` p |sjrmojnmn |p`n` r`s` s`bhsymnm j `e moo`h m pnm~h |`shdme` ` s`mejym g`njmd~` mp~`d~jomojÿd cjhgê~sjom$
JR$ Ph z m|ejomojhd` n` em ~`odhehkçm cjhgê~sjom
Jdn`|`dnj`d~`g`d~` n` em ~êodjom `g|e`mnm eh j~`gm cjhgê~sjoh hd p~jejymnh `d
gpz njr`sh `d~hsdh z ohd gpz njr`sm bjdmejnmn`$
@d cm` m em `d~s`rj~m s`mejymnm em |sjdoj|me bjdmejnmn |msm em opme ` p~jejymd j~`gm
cjhgê~sjoh ` `e ohd~she n` moo`h !~md~h bçjoh ohgh eÿkjoh* m `njbjojh yhdm
s`~sjdkjnm z j~`gm n` jdbhsgmojÿd$ _jd `gcmskh `d `e g`somnh mo~pmeg`d~` ``dop`d~smd ~êodjom cjhgê~sjom `g|e`mnm ohd hci`~jrh ohgh `e ohd~she n` |s``dojm
`e ohd~she n` bshd~`sm em epoam ohd~sm `e bsmpn` z em jdr`~jkmojÿd n` n`ej~h$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 7/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Em p~jejymojÿd n` j~`gm n` s`ohdhojgj`d~h cmmnh `d cjhg`~sçm p|hd` ksmdn`
c`d`bjojh |msm em hskmdjymojhd` h `d~jnmn` }p` eh jg|emd~md `d m|`o~h ohgh em
s`npoojÿd n` oh~` `e mpg`d~h n` em `kpsjnmn z em `bjoj`dojm z em g`ihsm n` em jgmk`d
ohs|hsm~jrm$ ^mgcjêd p|hd` ksmdn` c`d`bjojh |msm eh ppmsjh bjdme` `d s`emojÿd m
p ohghnjnmn s`npoojÿd n` ~j`g|h n` `|`sm |hjcjejnmn n` s`mejyms ~smgj~mojhd`
s`gh~m z gmzhs mermkpmsnm n` p |sjrmojnmn `d~s` h~sm$
_` |p`n` n`~moms ~mgcjêd pdm `sj` n` m|ejomojhd` `d bm` n` n`mssheeh }p` amd jnh
jn`d~jbjomnm `d `e mdíejj nhopg`d~me z ohg`d~mnm |hs eh `q|`s~h }p` amd
ohemchsmnh `d `e |sho`h n` ohdpe~m$ Mo~pmeg`d~` ` `~íd n`mssheemdnh hepojhd`
|msm bmojej~ms em mp~`d~jomojÿd m nj~mdojm r`sjbjoms njb`s`d~` g`njh n` |mkh z g`ihsms eh
j~`gm n` ohd~she |ms`d~me z n` rjkjemdojm `d k`d`sme$ @ `|`ojmeg`d~` s``ýmce` `e
n`mssheeh }p` ` `~í |shnpoj`dnh n` j~`gm cjhgê~sjoh |msm em mp~`d~jomojÿd n`ppmsjh }p` s`mejymd ~smdmoojhd` g`njmd~` ~`eêbhdh gÿrje`$
R$ Omh n` êqj~h
@d `e |s``d~` `~pnjh ` amd `e`oojhdmnh nh omh n` êqj~h `|`oçbjoh
|sjdoj|meg`d~` |hs p njr`sjnmn `d opmd~h m bjdmejnmn z ~`odhehkçm `g|e`mnm9
‣ Moo`h sí|jnh m bshd~`sm m`sh|hs~pmsjm `d @|mým$
‣ K`~jÿd n` mzpnm |ùcejom `d \hehdjm$
@d mgch omh n`~mom em ohghnjnmn |msm eh ppmsjh }p` am p|p`~h em jg|emd~mojÿd
n` j~`gm cjhgê~sjoh z em `bjoj`dojm ohd`kpjnm |hs |ms~` n` em hskmdjymojhd` em
opme` amd |hnjnh n`~jdms p s`opsh }p` |s`rjmg`d~` n`~jdmcmd me s`ohdhojgj`d~h
n` |`shdm m h~sm bpdojhd`$
RJ$ Gmsoh s`kpem~hsjh
Eh nm~h cjhgê~sjoh hd ohdjn`smnh nm~h n` omsío~`s |`shdme |hs em njb`s`d~`
mp~hsjnmn` dmojhdme` z `psh|`m n` |sh~`oojÿd n` nm~h$ @ |hs `eeh }p` n`c`dm|ejoms` eh |sjdoj|jh `~mce`ojnh `d em E`z Hskídjom n` \sh~`oojÿd n` Nm~h n`
Omsío~`s \`shdme z em g`njnm n` `kpsjnmn `~mce`ojnm `d p S`kemg`d~h n`
N`mssheeh$
@d `e |s``d~` jdbhsg` ` |p`n` hc`srms pdm s`ohe`oojÿd n` e`kjemojÿd z ipsj|spn`dojm
n` m|ejomojÿd `ýmemnh |hs eh `q|`s~h ohdpe~mnh mç ohgh eh |sjdoj|me` `~ídnms`
mhojmnh m omnm ~êodjom cjhgê~sjom$
_`kùd `ýmemd eh `q|`s~h em s`kpemojÿd mo~pme `d @|mým `d gm~`sjm n` |sh~`oojÿd n`
nm~h ` pbjoj`d~` |msm s`kpems `e ígcj~h n` em cjhg`~sçm$ _jd `gcmskh n` omsm m pdjbjoms
osj~`sjh z m~`dn`s m pdm `|`ojme `djcjejnmn n` em |hcemojÿd |hnsçm `s ohdr`dj`d~`
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 8/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
n`mssheems pdm s`kpemojÿd `|`oçbjom |msm em cjhg`~sçm$ \msm `eeh ` n`c`sçm `rj~ms pdm
dhsgm~jrm `qo`jrmg`d~` sçkjnm }p` jg|jnm h njbjope~` `e ph n` em cjhg`~sçm h }p` dh `
|p`nm mnm|~ms bíojeg`d~` m eh bp~psh n`mssheeh$
\msme`emg`d~` eh `q|`s~h ~mgcjêd `ýmemd em ohdr`dj`dojm n` mrmdyms `d em s`kpemojÿd
e`kjem~jrm s`em~jrm m em p|emd~mojÿd n` jn`d~jnmn pdm n` em gmzhs` mg`dmym
jn`d~jbjomnm$
\hs h~sh emnh ` hc`srm `d em ipsj|spn`dojm mdmejymnm em osj~jojnmn n` em d`o`jnmn n`
nms opg|ejgj`d~h me n`c`s n` jdbhsgmojÿd `~mce`ojnh `d em EH\N |hs |ms~` n` em
`d~jnmn` }p` jg|emd~md j~`gm n` s`ohdhojgj`d~h cjhgê~sjoh |msm p `g|e`mnh$
RJJ$ K`~jÿd n` sj`kh
Dh hc~md~` `d em `emchsmojÿd n`e |s``d~` `~pnjh ` amd jn`d~jbjomnh pd ohdipd~h n`
mg`dmym z rped`smcjejnmn` jd~sçd`omg`d~` ejkmnh m em p~jejymojÿd n` ~`odhehkçm n`
s`ohdhojgj`d~h cmmnm `d cjhg`~sçm$ @d `~` `d~jnh eh `q|`s~h n`~momd
|sjdoj|meg`d~` em jkpj`d~`9
‣ Jnhd`jnmn n` em jg|emd~mojÿd9 @ d`o`msjh pd mdíejj |s`rjh |msm ee`rms m omch
em jg|emd~mojÿd n` j~`gm m|sh|jmnh$
‣
_p|emd~mojÿd n` jn`d~jnmn9 Ohgh `d ~hnh j~`gm n` mp~`d~jomojÿd ` pdm n`em |sjdoj|me` mg`dmym$
‣ Me~`smojÿd n` smkh9 @d homjhd` rhepd~msjm h jdrhepd~msjmg`d~` eh smkh
cjhgê~sjoh n` em |`shdm |p`n`d r`s` me~`smnh$
‣ Mo`|~mojÿd ope~psme9 Em jnjhjdosmjm ope~psme n` omnm |mç |p`n` p|hd`s pd
jdohdr`dj d~` |msm em jg|emd~mojÿd n` n`~`sgjdmnh j~`gm n` s`ohdhojgj`d~h$
‣ N`ohdhojgj`d~h9 @d homjhd` em `d~jnmn` }p` |hnsçmd `~ms jd~`s`mnm
n`ohdho`d em omejnmn h `e mcmdjoh n` |shnpo~h z p~jejnmn` nj|hdjce`$
‣ \`so`|ojÿd d`km~jrm9 \`so`|ojÿd n` mp`dojm n` |sjrmojnmn |hs |ms~` n` eh
ppmsjh$
Ohd `e hci`~jrh n` k`~jhdms eh sj`kh jn`d~jbjomnh eh `q|`s~h `ýmemd gê~hnh `
hepojÿd z |s`r`dojÿd n` eh gjgh }p` bmojej~md em jg|emd~mojÿd `qj~hm n` j~`gm
cjhgê~sjoh$ @d `~` `d~jnh omc` n`~moms em n`~`oojÿd n` rjnm em p~jejymojÿd n`
cjhg`~sçm `d ghrjgj`d~h `e megmo`dmgj`d~h `kpsh n` gp`~sm em bhsgmojÿd n` eh
ppmsjh bjdme` z em s`mejymojÿd n` pd mdíejj |s`rjh m em jg|emd~mojÿd$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 9/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm : n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
RJJJ$ S`ohg`dnmojhd` z cp`dm |sío~jom
\hs ùe~jgh npsmd~` `e |sho`h n` `emchsmojÿd n`e |s``d~` `~pnjh ` am s`oh|jemnh pd
ohdipd~h n` s`ohg`dnmojhd` njsjkjnm m eh njb`s`d~` mo~hs` n`e `o~hs n` em cjhg`~sçmnhdn` omc` n`~moms em jkpj`d~`$
‣ S`mejymojÿd n` pd mdíejj n`~meemnh |s`rjh m em jg|emd~mojÿd$
‣ P~jejymojÿd n` ~`odhehkçm n` omejnmn$
‣ Jdbhsgms z bhsgms m eh ppmsjh n` eh j~`gm$
‣ Kmsmd~jyms em `kpsjnmn n` eh nm~h cjhgê~sjoh$
‣ Mejd`mgj`d~h `d~s` g`somnh ` jdr`~jkmnhs`$
‣ Njrpekmojÿd amojm em ojpnmnmdçm ` jdr`sjÿd `d n`mssheeh n` dp`rm ~`odhehkçm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 10/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
= JD^SHNPOOJßD Z HCI@^JRH_
=$= \S@_@D^MOJßD
=$=$= Jd~j~p~h Dmojhdme n` ^`odhehkçm n` em Ohgpdjomojÿd
@e Jd~j~p~h Dmojhdme n` ^`odhehkçm n` em Ohgpdjomojÿd _$M$ !JD^@OH* ` pdm
hoj`nmn `~m~me mnosj~m me Gjdj~`sjh n` Jdnp~sjm ^psjgh z Ohg`sojh m ~smrê n` em
_`os`~msçm n` @~mnh n` ^`e`ohgpdjomojhd` z |msm em _hoj`nmn n` em Jdbhsgmojÿd$
JD^@OH ` pd o`d~sh n` n`mssheeh n` omsío~`s jddhrmnhs z n` jd~`sê |ùcejoh n` ígcj~h
dmojhdme }p` ` hsj`d~m m em m|hs~mojÿd n` rmehs m em jdnp~sjm z m eh ppmsjh z m em
njbpjÿd n` em dp`rm ~`odhehkçm n` em jdbhsgmojÿd z em ohgpdjomojÿd !^JO* `d @|mým
`d oemsm jd~hdçm ohd @psh|m$
_p hci`~jrh bpdnmg`d~me ` `srjs ohgh jd~spg`d~h |msm n`mssheems em _hoj`nmn n` em
Jdbhsgmojÿd ohd mo~jrjnmn` |sh|jm `d `e ígcj~h n` em jddhrmojÿd z `e n`mssheeh n`
|shz`o~h mhojmnh m em ^JO cmídnh` `d ~s` |jems` bpdnmg`d~me`9 em jdr`~jkmojÿd
m|ejomnm em |s`~mojÿd n` `srjojh z em bhsgmojÿd$
Em gjjÿd n` JD^@OH ` m|hs~ms rmehs ` jddhrmojÿd m eh ojpnmnmdh m em \ZG@_ m em
Mngjdj~smojhd` \ùcejom z me `o~hs n` em ~`odhehkçm n` em jdbhsgmojÿd m ~smrê n`e
n`mssheeh n` |shz`o~h }p` ohd~sjcpzmd m s`bhsyms em ohdbjmdym `d eh `srjojh n` em_hoj`nmn n` em Jdbhsgmojÿd `d dp`~sh |mç |shghrj`dnh mn`gí pdm eçd`m n`
|ms~joj|mojÿd jd~`sdmojhdme$
\msm eeh JD^@OH n`mssheem mo~pmojhd` d em jkpj`d~` eçd`m9
‣ _`kpsjnmn ^`odheÿkjom9 JD^@OH `~í ohg|shg`~jnh ohd em |shghojÿd n`
`srjojh n` em _hoj`nmn n` em Jdbhsgmojÿd omnm r`y gí `kpsh }p` |sh~`imd
eh nm~h |`shdme` n` eh jd~`s`mnh p jd~jgjnmn em jd~`ksjnmn n` p
jdbhsgmojÿd z `rj~`d m~m}p` }p` |hdkmd `d sj`kh eh `srjojh |s`~mnh$ Z |hs
p|p`~h }p` kmsmd~jo`d pd opg|ejgj`d~h `~sjo~h n` em dhsgm~jrm e`kme `dgm~`sjm n` ^JO$ \msm `eeh ohhsnjdm nj~jd~m jdjojm~jrm |ùcejom `d ~hsdh m em
`kpsjnmn n` em ^JO }p` ` gm~`sjmejymd `d em |s`~mojÿd n` `srjojh |hs |ms~`
n`e Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd `e O`d~sh n` S`|p`~m m
Jdojn`d~` n` _`kpsjnmn `d ^`odhehkçm n` em Jdbhsgmojÿd !JD^@OH'O@S^* ohd
p O`d~sh N`gh~smnhs n` ^`odhehkçm n` _`kpsjnmn z em Hbjojdm n` _`kpsjnmn
n`e Jd~`sdmp~m n` eh }p` ` c`d`bjojmd ojpnmnmdh \ZG@_ Mngjdj~smojhd`
\ùcejom z `e `o~hs ~`odheÿkjoh$
‣ Moo`jcjejnmn9 JD^@OH |shgp`r` `srjojh n` em _hoj`nmn n` em Jdbhsgmojÿdgí moo`jce` }p` p|sjgmd em cmss`sm n` `qoepjÿd opme}pj`sm }p` `m em
njbjope~mn h oms`dojm ~êodjom bhsgm~jrm `~o$ jdoeph njom|mojnmn }p` ~`dkmd p
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 11/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm == n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
ppmsjh$ Z }p` bmojej~`d em jd~`ksmojÿd |shks`jrm n` ~hnh eh ohe`o~jrh n`
ppmsjh n` ghnh }p` ~hnh `eeh |p`nmd c`d`bjojms` n` em h|hs~pdjnmn` }p`
hbs`o` em _hoj`nmn n` em Jdbhsgmojÿd$ Mjgjgh n`mssheem |shz`o~h `d `e ígcj~h
n` em moo`jcjejnmn hsj`d~mnh m kmsmd~jyms `e n`s`oah n` ojpnmnmdh z `g|s`m
m s`emojhdms` e`o~sÿdjomg`d~` ohd em MM$\\$
‣ Omejnmn ^JO9 JD^@OH |shgp`r` pdh `srjojh n` em _hoj`nmn n` em Jdbhsgmojÿd
}p` omnm r`y `md n` gmzhs omejnmn }p` kmsmd~jo`d pdh mn`opmnh djr`e` n`
`srjojh eh opme ` ~smnpo` `d pdm gmzhs shcp~`y n` m|ejomojhd` z j~`gm pd
ohg|shgjh `d em nj|hdjcjejnmn z eh ~j`g|h n` s`|p`~m pd mn`opmnh h|hs~`
|msm eh ppmsjh pdm jdbhsgmojÿd |s`ojm z oemsm hcs` em `rhepojÿd n` em
bpdojhdmejnmn` n` eh `srjojh z `d s`pg`d `srjojh omnm r`y g`ihs`$ @d
`~m eçd`m jg|pem em ohg|`~j~jrjnmn n` em jdnp~sjm n`e _hb~{ms` m ~smrê n` em|shghojÿd n` em g`ihsm n` em omejnmn z em o`s~jbjomojÿd n` em `g|s`m z
|shb`jhdme` n` em jdk`dj`sçm n`e hb~{ms`$
‣ Bhsgmojÿd9 em bhsgmojÿd ` pd bmo~hs n`~`sgjdmd~` |msm em m~smoojÿd n` ~me`d~h z
|msm em g`ihsm n` em ohg|`~j~jrjnmn n` em `g|s`m$ \hs `eeh JD^@OH jg|pem em
bhsgmojÿd n` pdjr`sj~msjh z |shb`jhdme` `d em ~`odhehkçm gí n`gmdnmnm
|hs em jdnp~sjm$
=$=$3 Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
@e Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd ` jd`s~m n`d~sh n` em eçd`m `~sm~êkjom
n` mo~pmojÿd n` JD^@OH `d gm~`sjm n` _`kpsjnmn ^`odheÿkjom$
Dmo` ohd `e hci`~jrh n` n`osjcjs n` gmd`sm n`~meemnm z j~`gí~jom `e djr`e n` `kpsjnmn
z ohdbjmdym `d em _hoj`nmn n` em Jdbhsgmojÿd z n` k`d`sms ohdhojgj`d~h `|`ojmejymnh `d
em gm~`sjm$ N` `~` ghnh ` `dop`d~sm me `srjojh n` eh ojpnmnmdh em `g|s`m z em
mngjdj~smojhd` |ùcejom `|mýhem |msm n`osjcjs mdmejyms m`hsms z njbpdnjs em ope~psm
n` em `kpsjnmn n` em jdbhsgmojÿd z em `'ohdbjmdym$
@e Hc`srm~hsjh am nj`ýmnh pd \emd n` Mo~jrjnmn` z @~pnjh ohd `e hci`~h n` |shnpojsohdhojgj`d~h `|`ojmejymnh z ù~je `d gm~`sjm n` `kpsjnmn |hs |ms~` n` JD^@OH mç
ohgh n` `emchsms s`ohg`dnmojhd` z |sh|p`~m }p` n`bjdmd ~`dn`dojm ríejnm |msm em
~hgm n` n`ojjhd` bp~psm |hs |ms~` n` eh |hn`s` |ùcejoh$
N`d~sh n` `~` |emd n` moojÿd ` s`mejymd emchs` n` jdr`~jkmojÿd mdíejj `~pnjh
m`hsmgj`d~h z njrpekmojÿd }p` m~`dn`síd `d~s` h~sm m em jkpj`d~` `~sm~`kjm9
‣ @emchsmojÿd n` `~pnjh ` jdbhsg` |sh|jh `d gm~`sjm n` `kpsjnmn n` em
^`odhehkçm n` em Jdbhsgmojÿd z em Ohgpdjomojÿd ohd `|`ojme êdbmj `d em_`kpsjnmn d Jd~`sd`~$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 12/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =3 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ _`kpjgj`d~h n` eh |sjdoj|me` jdnjomnhs` z |heç~jom |ùcejom s`emojhdmnm ohd
em `kpsjnmn n` em jdbhsgmojÿd z em ohdbjmdym `d `e ígcj~h dmojhdme `
jd~`sdmojhdme$
‣ K`d`smojÿd n` pdm cm` n` nm~h }p` |`sgj~m `e mdíejj z `rmepmojÿd n` em
`kpsjnmn z em ohdbjmdym ohd pdm |`s|`o~jrm ~`g|hsme$
‣ Jg|peh n` |shz`o~h n` jdr`~jkmojÿd `d gm~`sjm n` `kpsjnmn ^JO$
‣ Njbpjÿd n` `~pnjh ` jdbhsg` |pcejomnh |hs h~sm `d~jnmn` z hskmdjgh
dmojhdme` ` jd~`sdmojhdme` mç ohgh n` jdbhsgmojÿd hcs` em mo~pmejnmn
dmojhdme z `psh|`m `d gm~`sjm n` em `kpsjnmn z ohdbjmdym `d em _hoj`nmn n` em
Jdbhsgmojÿd$
‣ M`hsmgj`d~h m em Mngjdj~smojhd` \ùcejom `d gm~`sjm n` `kpsjnmn n` em
jdbhsgmojÿd z ohdbjmdym mç ohgh `e m|hzh m em `emchsmojÿd `kpjgj`d~h z
`rmepmojÿd n` |heç~jom |ùcejom `d `~` ígcj~h$
=$3 @_^PNJH _HCS@ EM_ ^@ODHEHKÇM_ CJHGÊ^SJOM_ M\EJOMNM_ M EM
_@KPSJNMN
@e |s``d~` `~pnjh psk` n` em d`o`jnmn n` ohdho`s `e djr`e n` n`mssheeh z ohdbjmdym
n` em ~`odhehkçm cjhgê~sjom mç ohgh p om|mojnmn |msm mbshd~ms eh sj`kh `qj~`d~`
z p bp~psm eçd`m n` n`mssheeh$
\msm em s`mejymojÿd n`e gjgh ` |emd~`md pdm `sj` hci`~jrh }p` ` n`mssheemd m
ohd~jdpmojÿd$
=$3$= Hci`~jrh k`d`sme`
@e hci`~jrh k`d`sme n` `~` `~pnjh ` `e mdíejj n` em ~êodjom cjhgê~sjom `qj~`d~`
p njb`s`d~` ph z m|ejomojhd` mg`dmym z rped`smcjejnmn` m em }p` `~íd
`q|p`~m em ~`odhehkçm cjhgê~sjom$ @~` mdíejj ` cmmsí `d em |`so`|ojÿd n`
`q|`s~h `d njr`sh omg|h mç ohgh `d em nhopg`d~mojÿd zm |pcejomnm$
H~sh hci`~jrh n` `~` mdíejj ` em |sh|p`~m n` s`ohg`dnmojhd` n` mo~pmojÿd h cp`dm
|sío~jom m ppmsjh |`}p`ým z g`njmdm `g|s`m jdnp~sjm z Mngjdj~smojhd`
\ùcejom |msm jg|pems `e opg|ejgj`d~h n` `~ídnms` `e ohdhojgj`d~h z `e n`mssheeh n`
em cjhg`~sçm$
=$3$3 Hci`~jrh `|`oçbjoh
Eh md~`sjhs` hci`~jrh ` n`kehmd h|`sm~jrmg`d~` `d eh jkpj`d~` hci`~jrh
`|`oçbjoh }p` |`sgj~`d mn`gí hsj`d~ms em `~spo~psm ~`gí~jom n`e |s``d~` jdbhsg`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 13/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Jd~shnpoojÿd m em ~`odhehkçm cjhgê~sjom
‣ N`osjcjs `e ohdo`|~h n` cjhg`~sçm eh md~`o`n`d~` `qj~`d~` mç ohgh
ohdo`|~h oemr` s`emojhdmnh$
‣ Jn`d~jbjoms eh ~j|h n` ~`odhehkçm cjhgê~sjom `qj~`d~` `d `e g`somnh$
‣ @~mce`o`s pdm ohg|msm~jrm n` em njb`s`d~` ~`odhehkçm jn`d~jbjomnm
oemjbjoídnhem `d bpdojÿd n` p ksmnh n` gmnps`y z n` jg|emd~mojÿd `d `e
g`somnh ohdjn`smdnh ~mgcjêd `d~s` h~sh m|`o~h ohgh em s`emojÿd
oh~`(c`d`bjojh$
Mdíejj n` eh |sho`h n` jn`d~jbjomojÿd cmmnh `d cjhg`~sçm
‣ N`osjcjs em ~êodjom m|ejomnm z eh ~j|h n` jn`d~jbjomojÿd$
‣ Ohg|msms em ~`odhehkçm cjhgê~sjom bs`d~` m h~sh ~j|h n` j~`gm n`
jn`d~jbjomojÿd n`osjcj`dnh em |hjce` r`d~mim$
‣ Mdmejyms em mp~`d~jomojÿd n` nhce` bmo~hs `d s`emojÿd m em cjhg`~sçm$
C`d`bjojh n` em p~jejymojÿd n` em ~`odhehkçm cjhgê~sjom
‣ Jn`d~jbjoms em r`d~mim }p` em cjhg`~sçm s`|hs~m m eh ppmsjh
‣ Jn`d~jbjoms eh |pd~h oemr` n`e c`d`bjojh |msm em hskmdjymojhd` me jg|emd~ms
j~`gm cjhgê~sjoh$
Ph z m|ejomojhd` n` em ~`odhehkçm cjhgê~sjom
‣ Mdmejyms ` jn`d~jbjoms em |sjdoj|me` m|ejomojhd` mo~pme` n` em cjhg`~sçm$
‣ Jn`d~jbjoms eh njb`s`d~` `o~hs` n` `|`ojme s`e`rmdojm `d `e ígcj~h cjhgê~sjoh$
‣ @~pnjms em |hjcjejnmn` n` `q|mdjÿd m h~sm ís`m n` em ~`odhehkçm m g`njh
|emyh$
‣ Ohdho`s em ís`m n` jdr`~jkmojÿd }p` s`pe~`d jd~`s`md~` |msm `e n`mssheeh `
jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom `d `e g`somnh$
S`kpemojÿd9 e`kjemojÿd z `~ídnms` jd~`sdmojhdme` n`mssheemnh
‣ Jn`d~jbjoms z mdmejyms em e`kjemojÿd mo~pmeg`d~` m|ejomce`$
‣ Jn`d~jbjoms eh `~ídnms` jd~`sdmojhdme `qj~`d~`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 14/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm => n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
K`~jÿd n` sj`kh
‣ Jn`d~jbjoms em mg`dmym z rped`smcjejnmn` }p` |p`nmd ohg|shg`~`s em
`kpsjnmn h em ohdbjmdym `d `~h |sho`h$
‣ Mdmejyms eh gê~hnh n` hepojÿd z |s`r`dojÿd }p` |`sgj~`d k`~jhdms eh sj`kh
jn`d~jbjomnh |s`rjmg`d~ $
S`ohg`dnmojhd`
‣ Ohdho`s em cp`dm |sío~jom s`em~jrm m eh ghg`d~h n` n`ojjÿd `
jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom `d |`}p`ým z g`njmdm `g|s`m$
‣ Mdmejyms `e ph n` `~ídnms` mp~h's`kpemojÿd z ís`m n` n`mssheeh `d emjdnp~sjm cjhgê~sjom$
‣ Jn`d~jbjoms |heç~jom n` jd~mpsmojÿd z ohdoj`dojmojÿd s`ohg`dnmce` |msm em
Mngjdj~smojhd` \ùcejom$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 15/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
3 NJ_@ÝH G@^HNHEßKJOH
@~m jdr`~jkmojÿd ` am n`mssheemnh jkpj`dnh pd `dbh}p` opmej~m~jrh me ~j`g|h }p` `amd p~jejymnh nm~h opmd~j~m~jrh |sho`n`d~` n` h~sm jdr`~jkmojhd` ohgh
ohg|e`g`d~h$ Em bm` `d }p` ` am mchsnmnh amd jnh9
‣ Bm` =9 S`oh|jemojÿd z `~pnjh n` jdbhsg`$
‣ Bm` 39 @d~s`rj~m m `q|`s~h `jÿd n` ~smcmih z m|hs~mojÿd 3$<$
‣ Bm` ?9 @emchsmojÿd n`e jdbhsg` n` ohdoepjhd` bjdme` n`e |shz`o~h$
‣
Bm` >9 @emchsmojÿd n` pdm kpçm |sío~jom njsjkjnm m ppmsjh hcs` `kpsjnmn zohdbjmdym `d `e ph n` em ~`odhehkçm cjhgê~sjom$
3$= BM_@ =9 CÙ_]P@NM Z MDÍEJ_J_ NHOPG@D^ME$
@~m `~m|m am mcmsomnh `e mdíejj n` em j~pmojÿd mo~pme n` em ~`odhehkçm cjhgê~sjom
`d s`emojÿd m p ksmnh n` gmnps`y r`d~mim jdohdr`dj`d~` mç ohgh em ~`dn`dojm
bp~psm `d bpdojÿd n` em jdnp~sjm h `e `o~hs$
\msm em ohd`opojÿd n` `~h hci`~jrh ` amd jdr`d~msjmnh em bp`d~` n` jdbhsgmojÿd
}p` nj|hd`d z |pcejomd `~pnjh jdbhsg` z(h ~smcmih s`emojhdmnh ohd em cjhg`~sçm$
Bjdmeg`d~` ` amd mdmejymnh z `q~smçnh em |sjdoj|me` ohdoepjhd` n` m}p`eeh jdbhsg`
}p` ohd~j`d`d jdbhsgmojÿd mo~pme z ù~je |msm `e |s``d~` `~pnjh$
@ jg|hs~md~` n`~moms }p` pdm ksmd |ms~` n` `~m |pcejomojhd` |`s~`d`o`d m
`d~jnmn` |ùcejom h |sjrmnm opzh ígcj~h n` `~pnjh ` j~ùm `d Dhs~`mgêsjom !@~mnh
Pdjnh z Omdmní* p h~sh |mç` `psh|`h gí n`mssheemnh n`n` `e |pd~h n` rj~m n`e
hci`~h n`e |s``d~` `~pnjh$
@d `e Md`qh J9 Cjcejhksmbçm ` jdoepz` pdm s`emojÿd n` em |pcejomojhd` ohdjn`smnm `d em
s`mejymojÿd n`e jdbhsg`$ ^hnm `eem hd |sh|j`nmn n` em jkpj`d~` `d~jnmn`9
‣ Mjs Pdjr`sj~z
‣ O`d~sme Jd~j~p~` hb ^`oadhehkz hb
Fhfsmiams
‣ O`d~s` bhs @psh|`md \hejoz
_~pnj`
‣ Ohg|e`~` Ohdpe~md~ [hsen{jn`
‣ Ohg|p~`s Em{ " _`opsj~z
S`rj`{
‣ N`ehj~~`
‣ Êohe` \hez~`oadj}p` Bênêsme` n`
Empmdd`
‣ @psh|`md Ohggj~`` bhs_~mdnmsjym~jhd
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 16/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ Bhss`~`s
‣ Kms~d`s
‣ Jd~j~p~` hb @e`o~sjome mdn
@e`o~shdjo @dkjd``s
‣ J}sm Pdjr`sj~z
‣ Gjoajkmd _~m~` Pdjr`sj~z
‣ Dm~jhdme Jd~j~p~` hb _~mdnmsn
mdn ^`oadhehkz !DJ_^*
‣ _sj Imzmoamgmsmi`dnsm Ohee`k`
hb @dkjd``sjdk
‣ ^spc MK
‣ Pdjÿd @psh|`m
‣ Pdjr`sjnmn Omseh JJJ n` Gmnsjn
‣ Pdjr`sjnmn n` N`p~h
‣ Pdjr`sjnmn n`e \mç Rmoh
‣ Pdjr`sj~ì nj Chehkdm
‣ Pdjr`sj~z hb Msfmdm
‣ Pdjr`sj~z hb F`cmdkmmd
3$3 BM_@ 39 OHD_PE^M M @Q\@S^H_
@~m bm` n`e |shz`o~h ` am n`~jdmnh m ohdpe~ms em h|jdjÿd n` `q|`s~h hcs` eh
njb`s`d~` ígcj~h n` mdíejj |sh|p`~h |msm `e `~pnjh$
3$3$= _`e`oojÿd n` `q|`s~h
Eh |`sbje` }p` amd mcmsomnh eh `q|`s~h |ms~joj|md~` `d em jdr`~jkmojÿd hd ehjkpj`d~`9
‣ Bmcsjomd~` n` j~`gm cjhgê~sjoh9 hbs`o`d em rjjÿd n`e bmcsjomd~` n` `~`
~j|h n` j~`gm m|hs~mdnh `|`ojmeg`d~` p |`s|`o~jrm hcs` `e n`mssheeh n`e
g`somnh em n`cjejnmn` z cmss`sm mo~pme` mn`gí n` em `q|`o~m~jrm }p`
~j`d` em jdnp~sjm$ \p`n`d m|hs~ms p ohdhojgj`d~h hcs` `e gmsoh s`kpem~hsjh
mo~pme z eh `~ídnms`$
‣ Nj~sjcpjnhs` n` j~`gm cjhgê~sjoh9 m|hs~md em rjjÿd n`n` pd |pd~h n`
rj~m n` d`khojh z n`gmdnm n` oej`d~` `d opmd~h me g`somnh mo~pme n` j~`gmcjhgê~sjoh em d`o`jnmn` n` eh oej`d~` z em cmss`sm m em }p` ` `dbs`d~md m
em ahsm n` moo`n`s m `~` ~j|h n` hepojhd`$
‣ Jd~`ksmnhs` ( ohdpe~hs`9 ohd~sjcpz`d m em jdr`~jkmojÿd ohd p `q|`sj`dojm `d
em jg|emd~mojÿd n` j~`gm cjhgê~sjoh hcs` ~hnh n`n` `e |pd~h n` rj~m n` em
cp`dm |sío~jom n` `kpsjnmn z n` eh sj`kh }p` ` n`c`d ~`d`s `d op`d~m `d
`e ghg`d~h n` em mnh|ojÿd n` `~m ~`odhehkçm$ ^mgcjêd |p`n`d ohg|e`g`d~ms
em rjjÿd `qj~`d~` hcs` em d`o`jnmn` n` eh oej`d~` z `e ph }p` mo~pmeg`d~`
`~íd ~`dj`dnh em ~`odhehkçm cjhgê~sjom$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 17/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ @q|`s~h `d `kpsjnmn jdbhsgí~jom9 csjdnmd pdm rjjÿd gí hci`~jrm hcs` `e
ph z m|ejomojÿd n` em ~`odhehkçm cjhgê~sjom s`|`o~h m em `kpsjnmn n` em
jdbhsgmojÿd jn`d~jbjomojÿd n` |`shdm z ohd~she n` moo`h$ ^mgcjêd s`pe~m
s`e`rmd~` p ohdhojgj`d~h hcs` eh sj`kh z n`cjejnmn` n` `~` ~j|h n`
~`odhehkçm z em cp`dm |sío~jom m ~`d`s `d op`d~m |msm p n`|ej`kp` z ph
`bjomy$
‣ @q|`s~h `d n`s`oah `d dp`rm ~`odhehkçm9 hbs`o`d me `~pnjh p rjjÿd n`n`
`e |pd~h n` rj~m ipsçnjoh hcs` em |s`ompojhd` z(h ejgj~mojhd` `qj~`d~` `d em
m|ejomojÿd n` `~` ~j|h n` ~`odhehkçm$
‣ Ppmsjh bjdme`9 m|hs~md me `~pnjh em `q|`sj`dojm n`e oej`d~` bjdme m em ahsm n`
mnh|~ms ~`odhehkçm cjhgê~sjom z em |hjce` d`o`jnmn` }p` |p`n`d opcsjs ohdem gjgm$ _p |ms~joj|mojÿd mzpnm ~mgcjêd m mdmejyms em cmss`sm n` `d~smnm
`qj~`d~` z hc~`d`s pdm rjjÿd hcs` `e ksmnh n` m|ejomojÿd n` em gjgm `d em
mo~pmejnmn$ M}p`eeh ppmsjh }p` amzmd mchsnmnh |shz`o~h n` jg|emd~mojÿd n`
`~` ~j|h n` ~`odhehkçm mzpnmsíd m ohd~`g|ems `e om~íehkh n` cp`dm |sío~jom$
‣ Jdr`~jkmnhs` ( momnêgjoh9 ohd~sjcpz`d ohd p h|jdjÿd hcs` `e bp~psh n` `~`
~j|h n` ~`odhehkçm z eh ohdnjojhdmd~` `qj~`d~` `d s`emojÿd m p `rhepojÿd z
mn`opmojÿd m dp`rm d`o`jnmn`$ ^mgcjêd m|hs~md me |shz`o~h p rjjÿd hcs`
h~sh ~j|h n` m|ejomojhd` }p` |p`n`d ~`d`s `~m ~`odhehkçm$
‣ @q|`s~h jd~`sdmojhdme`9 csjdnmd me |shz`o~h pdm rjjÿd jd~`ksme n`e `~mnh n`
n`mssheeh n` `~m ~`odhehkçm bp`sm n`e ígcj~h dmojhdme z em `rhepojÿd }p` |p`n`
~`d`s `~m jdnp~sjm n` gmd`sm gí kehcme$ ^mgcjêd m|hs~md ohdhojgj`d~h hcs`
opíe` hd eh eçn`s` n`n` pd |pd~h n` rj~m n` bmcsjomojÿd ` jg|emd~mojÿd n`
hepojhd` cjhgê~sjom$
‣ Omh n` êqj~h9 hbs`o`d `i`g|eh hcs` jg|emd~mojhd` n` hepojhd`
cjhgê~sjom !~md~h m |`}p`ým `omem ohgh n`|ej`kp` gí jkdjbjom~jrh*
jep~smdnh `e |sho`h n` mnh|ojÿd n` `~` ~j|h n` ~`odhehkçm z mdmejymdnh ehc`d`bjojh m|hs~mnh |hs p jg|emd~mojÿd$
_` `ýmemd m ohd~jdpmojÿd em jd~j~pojhd` z |shb`jhdme` }p` amd ohemchsmnh `d em
s`mejymojÿd n`e `~pnjh9
‣ Mkdj~jh$ Imrj`s Om~mýh z Gms~m Kmsoçm'Khgms _hojh bpdnmnhs z Njs`o~hsm n`
~`odhehkçm$
‣ Mrmehd Cjhg`~sjo$ Jhd H~mypm z Imrj`s \ês`y _~sm~`kjo moohpd~ gmdmk`s z
\shi`o~ gmdmk`s$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 18/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ Cz^`oa$ _`cm~jíd Khdyíe`y Mdnjdh S`|hdmce` n`e n`|ms~mg`d~h n`
bjsg{ms`$
‣ Omjqm \`d`nê$ Gmsjh ^hss` Mdmej~m n` `kpsjnmn$
‣ O`d~sh |`s em _oj`dym% em _hoj`~ì ` em Oj~~mnjdmdym n` Shgm $ @gjejh Ghsnjdj
Njs`o~hs$
‣ Ohdjkejh Dmyjhdmee` n`ee` Sjo`soa` !ODS*$ Gmsjh _mrm~mdh _`djhs
s``msoa`s$
‣ N`ehj~~` Mchkmnh$ Dhsgmd A`ofa Njs`o~hs$
‣ N`ehj~~`$ _sjdj _pcsmgmdjmd Njs`o~hs$
‣ @op`em Pdjr`sj~msjm n` Gm~msÿ$ Gmsoh Bmùdn`y Njs`o~hs$
‣ Kmd`~`o$ I`ù ^`i`nhs Smgÿd Eehsom z Gj}p`e Ghsm S " N _hb~{ms` `dkjd``s
z K`s`d~`$
‣ Ksp|h Ohg`q$ Ipmd Kmsoçm ` Jkdmojh Rjeme~m Njs`o~hs n` h|`smojhd` z Omejnmn$
‣ Ksp|h _|`o$ Gmsjm n`e Omsg`d Khdyíe`y A`sdídn`y z Md~hdjh ^hgmm
Njs`o~hsm ohg`sojme z Njs`o~hs n` J&N$
‣ Kpmsnjm Ojrje$ Ihê Ipmd Epo`dm Ghejdm ^`dj`d~` Ohshd`e$
‣ Aj~moaj$ \`~`s Ihd` Cpjd` Gmdmk`s$
‣ AS Moo`$ Osj~jdm _js`sm S`|hdmce` ipsçnjoh$
‣ Jomsrjjhd$ Me`imdnsh Amsh Njs`o~hs ohg`sojme$
‣ Jdnsm$ Nmrjn \ês`y K`s`d~` n` `kpsjnmn$
‣ Ghcc``e$ Ihê Epj Ap`s~m Njs`o~hs k`d`sme$
‣ Dm~jhdme Jd~j~p~` hb _~mdnmsn mdn ^`oadhehkz !DJ_^*$ Ns$ @emjd` D`{~hd
_`djhs Mnrjhs bhs Jn`d~j~z ^`oadhehkj`$
‣ _md Ihê _~m~` Pdjr`sj~z$ Ijg [mzgmd Njs`o~hs n`e n`|ms~mg`d~h ‑Dm~jhdme
Cjhg`~sjo ^`~ O`d~`s‚$
‣ ^s`n`$ Mebhdh S`|s`m I`b` n` \shnpo~h Rjn`h _p|`srjjÿd$
‣ Pdjr`sjnmn Mp~ÿdhgm n` Gmnsjn$ Jkdmojh Kmssh~` \shb`hs$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 19/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm =: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ Pdjr`sjnmn Mp~ÿdhgm n` Gmnsjn$ Imrj`s Hs~`km'Kmsoçm Njs`o~hs n`e M^R_ ‟
Ís`m n` ^sm~mgj`d~h n` Rhy z _`ýme`$
‣ Pdjr`sjnmn Omseh JJJ n` Gmnsjn$ Smùe _ídoa`y S`jeeh Njs`o~hs n`e KP^J ' Ksp|h Pdjr`sj~msjh n` ^`odhehkçm n` Jn`d~jbjomojÿd$
‣ Pdjr`sjnmn n` em \megm n` Ksmd Omdmsjm$ Gjkp`e Ídk`e B`ss`s z Omseh
^smrj`h Jdr`~jkmnhs`$
‣ RmdjH_$ Ihsk` Psjh O@H$
N`n` JD^@OH ` e` mksmn`o` p ohemchsmojÿd z nj|hdjcjejnmn$
3$3$3 S`mejymojÿd n` `d~s`rj~mEm `d~s`rj~m n`mssheemnm ohd eh `q|`s~h amd `kpjnh `e jkpj`d~` kpjÿd9
m* \s``d~mojÿd z n`~mee` n`e `q|`s~h9 |s``d~mojÿd |sjdoj|me` omg|h n`
mo~pmojÿd z `q|`sj`dojm `d |shz`o~h cjhgê~sjoh$
c* Gmnps`y n` em ~`odhehkçm cjhgê~sjom9 k`d`sme z `kùd ~`odhehkçm z
`o~hs`$ S`b`s`dojm m omh n` êqj~h ohdhojnh$
o* S`kpemojÿd m|ejomce`9 h|jdjÿd hcs` em e`kjemojÿd z em `~mdnmsjymojhd`
`qj~`d~` z em d`o`jnmn` bp~psm me s`|`o~h$
n* Sj`kh z mg`dmym n` em ~`odhehkçm cjhgê~sjom9 jdohdr`dj`d~` m em ahsm
n` em jg|emd~mojÿd m|`o~h n` g`ihsm mg`dmym ohd~she` ohg|`dm~hsjh z
ompm n` em rped`smcjejnmn` n` em ~`odhehkçm cjhgê~sjom$
`* S`ohg`dnmojhd`9 c`d`bjojh n` em jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom z
s`ohg`dnmojhd` m ppmsjh jdnp~sjm e`kjemnhs` z Mngjdj~smojhd` \ùcejom$
b* H|jdjÿd n` eh ojpnmnmdh9 |`so`|ojÿd k`d`sme n` eh ojpnmnmdh hcs` em~`odhehkçm cjhgê~sjom$
k* Bp~psh n` em ~`odhehkçm cjhgê~sjom9 rjjÿd hcs` `e bp~psh m g`njh z emskh
|emyh eçd`m n` jdr`~jkmojÿd gí jd~`s`md~` z `o~hs` |shoejr` m em
jg|emd~mojÿd$
3$3$? Jdr`~jkmojÿd opmej~m~jrm 3$<
Ohgh ohg|e`g`d~h m em bm` opmej~m~jrm `~sjo~p `dp |msm mg|ejms em |ms~joj|mojÿd n`
h~sh `|`ojmej~m mç ohgh s`omcms em h|jdjÿd n` h~sh jd~`s`mnh `d em gm~`sjm ` am
s`mejymnh pdm ohdpe~m m bhsh |shb`jhdme` g`njmd~` em |shghojÿd n` n`cm~` `dEjdf`nJd pdm n` em gmzhs` s`n` |shb`jhdme` n`e gpdnh `d Jd~`sd`~$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 20/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Mç n`d~sh n`e ksp|h ―Cjhg`~sjo D`~{hsf " Bhspg‗ ‚ ‟ ksp|h `qj~`d~` ohd md~`sjhsjnmn m
`~m jdr`~jkmojÿd z ohd~j~pjnh |hs ?$<<< |shb`jhdme` n` em cjhg`~sçm ‟ ` amd emdymnh
pdm `sj` n` |s`kpd~m mo`som n` `q|`sj`dojm omh n` êqj~h cmss`sm `d em
jg|e`g`d~mojÿd z bp~psh n` em cjhg`~sçm$ Em ohdoepjhd` me s`|`o~h ` amd pgmnh m
em zm hc~`djnm `d em `d~s`rj~m s`mejymnm$
3$3$> _`jÿd n` ~smcmih
Em bm` n` jdr`~jkmojÿd opmej~m~jrm ` am ohg|e`~mnh ohd pdm `jÿd n` ~smcmih `d em }p`
` amd `q|p`~h em |sjdoj|me` ohdoepjhd` hc~`djnm npsmd~` em jdr`~jkmojÿd |msm p
rmehsmojÿd |hs |ms~` n`e |md`e n` `q|`s~h$
\msm em s`mejymojÿd n` `~m `jÿd n` mdíejj n` ohdoepjhd` ` am `g|e`mnh pdm
a`ssmgj`d~m hb~{ms` !\h{`s Rh~`*% n` bíoje ph }p` |`sgj~` k`~jhdms s`pdjhd` `dksp|h n` bhsgm jd~`smo~jrm `q|ehsmdnh em nj~jd~m h|jdjhd` z |hjcjejnmn` }p` ` rmd
|emd~`mdnh z hc~`dj`dnh m}p`eem ohdjn`smojhd` }p` op`d~md ohd gmzhs mo`|~mojÿd
!ksmojm m pd em p~jejymojÿd n` pdh ~`sgjdme` n` rh~mojÿd jdmeígcsjoh }p` p~jejymd eh
mj~`d~` m em s`pdjÿd |msm mdmejyms omnm m|`o~h m n`cm~js*$
Mn`gí m |ms~js n` em |s`|msmojÿd jdjojme n` eh ~`gm m ~sm~ms `d em s`pdjÿd ` |hjce`
mýmnjs ghnjbjoms h `ejgjdms jdbhsgmojÿd m g`njnm }p` mrmdym `e n`cm~` `d bpdojÿd n` eh
a`oah s`ohkjnh$ @~m omsmo~`sç~jom bmojej~m em k`~jÿd n` s`pdjhd` n` bhsgm njdígjom z
be`qjce` |`sgj~j`dnh hc~`d`s ohdoepjhd` d ~j`g|h s`me$
_` |emd~`mshd pd ~h~me n` =1 ohdoepjhd` }p` bp`shd rmehsmnm z rh~mnm |hs eh
jkpj`d~` q|`s~h9
‣ Imrj`s Om~mýh !Mkdj~jh*
‣ Jhd H~mypm z Imrj`s \ês`y !Mrmehd Cjhg`~sjo*
‣ _`cm~jíd Khdyíe`y !Cz~`oa*
‣ Smùe Mehdh !Omseh JJJ n` Gmnsjn*
‣ Dhsgmd A`ofa !N`ehj~~` Mchkmnh*
‣ Smgÿd Eehsom !Kmd`~`o*
‣ Nmdj`e Op`~m !Jdnsm*
‣ \mceh \ês`y !JD^@OH*
‣ Ihsk` Psjh !RmdjH_*
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 21/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Em ohdoepjhd` hc~`djnm `d `~m `jÿd ` amd ~`djnh `d op`d~m |msm s`bs`dnms
m|`o~h n`~`o~mnh z moemsms n`~`sgjdmnm op`~jhd`$
3$? BM_@ ?9 @EMCHSMOJßD N@E JDBHSG@ N@ OHDOEP_JHD@_ BJDME@_ N@E\SHZ@O^H
Pdm r`y bjdmejymnm em `~m|m ohss`|hdnj`d~` m eh ~smcmih n` jdr`~jkmojÿd `
nhopg`d~md z `q|hd`d em ohdoepjhd` meomdymnm `d `e jdbhsg` bjdme$
@d em `emchsmojÿd n`e |s``d~` jdbhsg` ` s`ohk` `e mdíejj z em ohdoepjhd` n` em
jdr`~jkmojÿd ipd~h ohd em s`ohg`dnmojhd` n` mo~pmojÿd njsjkjnm m eh ppmsjh m em
jdnp~sjm z m em Mngjdj~smojhd` \ùcejom$
3$> BM_@ >9 @EMCHSMOJßD N@ PDM KPÇM \SÍO^JOM NJSJKJNM M P_PMSJH_@d |msme`eh m em s`mejymojÿd n`e `~pnjh hcs` `e djr`e n` n`mssheeh z ohdbjmdym n` em
~`odhehkçm cjhgê~sjom z m|shr`oamdnh eh s`pe~mnh n`e gjgh ` am `emchsmnh pdm
kpçm njrpekm~jrm ohd em jd~`dojÿd n` nms m ohdho`s em njb`s`d~` ~`odhehkçm cjhgê~sjom
p njb`s`d~` ph z m|ejomojhd` eh sj`kh m eh }p` `~íd `q|p`~m z n`mssheems pd
om~íehkh n` cp`dm |sío~jom z s`ohg`dnmojhd`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 22/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 33 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
? JD^SHNPOOJßD M EM_ ^@ODHEHKÇM_
CJHGÊ^SJOM_
?$= MD^@O@N@D^@_
Em cjhg`~sçm ` pd gê~hnh n` s`ohdhojgj`d~h n` |`shdm cmmnh `d p omsmo~`sç~jom
bjjheÿkjom h n` ohg|hs~mgj`d~h$ _` ~sm~m n` pd |sho`h jgjems me }p` amcj~pmeg`d~`
s`mejym `e `s apgmdh s`ohdhoj`dnh ` jn`d~jbjomdnh m p ohdkêd`s` |hs p m|`o~h
bçjoh p rhy p bhsgm n` mdnms `~o$
@d em mo~pmejnmn em ~`odhehkçm am |`sgj~jnh mp~hgm~jyms z |`sb`oojhdms `~h |sho`h n`
s`ohdhojgj`d~h cjhgê~sjoh n` bhsgm }p` ~j`d`d gpe~j~pn n` m|ejomojhd` z bjdmejnmn` ‟z
`|`ojmeg`d~` m}p`eem s`emojhdmnm ohd em `kpsjnmn‟ mekpdm n` em opme` ``q|hdnsíd m eh emskh n`e |s``d~` jdbhsg`$
Eh |sjg`sh md~`o`n`d~` n` eh }p` ` ~j`d` s`b`s`dojm hcs` em cjhg`~sçm nm~md n`
amo` gí n` gje mýh `d Oajdm nhdn` eh mebms`sh ohg`dymshd m jdoepjs p ap`eem
nmo~jems` `d eh |shnpo~h }p` s`mejymcmd ohgh çgcheh n` nj~jdojÿd h bjsgm eh }p` e`
|`sgj~çm njb`s`dojms` n`e s`~h$
_jd `gcmskh dh bp` am~m bjdme` n`e jkeh QJQ opmdnh Me|ahd` C`s~jeehd ‟md~sh|ÿehkh
bsmdoê }p` ~smcmiÿ |msm em |hejoçm‟ ohg`dyÿ m nms m em cjhg`~sçm `e omsío~`s n` oj`dojm
|shb`jhdmejymdnh p |sío~jom$ Cmmcm p ~`hsçm `d }p` pdm oj`s~m ohgcjdmojÿd n`
g`njnm n`e op`s|h apgmdh `sm jdrmsjmce` `d `e ~j`g|h eh }p` |`sgj~jÿ nms hepojÿd me
|shce`gm n` jn`d~jbjoms m eh osjgjdme` ohdrjo~h m eh emskh n` ~hnm p rjnm$
@e j~`gm n` C`s~jeehd h ―Md~sh|hg`~sçm‗ }p` jdoepçm `d~s` h~sm g`njnm ohgh `e emskh
z mdoah n` em omc`ym h em ehdkj~pn n`e |j` jy}pj`snh z n`e md~`csmyh ` ohg`dyÿ m p~jejyms
ohgùdg`d~` m eh emskh n` ~hnh `e gpdnh$ _jd `gcmskh p `b`o~jrjnmn ` |ph `d npnm me
|s``d~ms` mekpdh |shce`gm `d `e ph n` njb`s`d~` g`njnm z `|`ojmeg`d~` |hs em
njbjope~mn` `d em njb`s`dojmojÿd n` pi`~h `q~s`gmnmg`d~` jgjems` ohgh eh k`g`eh$
@~m n`mos`nj~mojÿd ajyh }p` _js @n{msn A`dsz Jd|`o~hs K`d`sme n` em \hejoçm n`
C`dkmem cpom` h~sm ~êodjom z ` jd~`s`m` |hs em jdr`~jkmojhd` n` _js Bsmdoj
Kme~hd `e opme p~jejymcm em ap`eem nmo~jems ohgh gê~hnh n` jn`d~jbjomojÿd$ \sjg`sh `d
C`dkmem z |h~`sjhsg`d~` `d Ehdns` !=:<=* _js @n{msn A`dsz `~mce`ojÿ p hbjojdm n`
ap`eem nmo~jems `qj~hmg`d~` z ohdjkpjÿ sí|jnmg`d~` em mo`|~mojÿd n` em ohgpdjnmn m
djr`e gpdnjme$ Mç eh gê~hnh p~jejymnh `d hsj`d~` n`n` jkeh m~sí bp`shd
jd~shnpojnh qj~hmg`d~` d hoojn`d~`$
Zm m ohgj`dyh n` eh mýh ;< _a`mshd Amgje pdm `g|s`m n` [mee _~s``~ jd~meÿJn`d~jgm~ pd j~`gm n` jn`d~jbjomojÿd mp~hgí~jom cmmnh `d ap`eem nmo~jems }p` ` p~jejyÿ
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 23/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
|msm `e ohd~she n` moo`h bçjoh m jd~memojhd` j`dnh em |sjg`sm hepojÿd cjhgê~sjom n`
ph ohg`sojme$
N`n` `d~hdo` ` am jdr`~jkmnh gpoah `d `e omg|h n` em cjhg`~sçm n`~`o~ídnh`gpe~j~pn n` smkh cjhgê~sjoh njb`s`d~` m em ap`eem nmo~jems$
M nçm n` ahz `e mrmdo` `d `e ohdhojgj`d~h n` njoah smkh z p ohss`|hdnj`d~`
r`d~mim ` jdohdr`dj`d~` pdjnh m em |hjcjejnmn` }p` hbs`o` em ~`odhehkçm amo`d }p`
em cjhg`~sçm ` ohdjn`s` pdh n` eh `e`g`d~h oemr` `d opmd~h m em ~êodjom n`
jn`d~jbjomojÿd z `kpsjnmn `d `e bp~psh$
?$3 OHDO@\^H_ OEMR@
Opmdnh ` mchsnm em cjhg`~sçm ` amo` s`b`s`dojm m pdm ~`odhehkçm |pd~`sm hcs` emopme dh gpoam k`d~` ~j`d` ohdhojgj`d~h |s`ojh$ @ |hs `eeh }p` ` ohdr`dj`d~`
`ýmems z moemsms m}p`eeh ohdo`|~h }p` ` ohdjn`smd ``dojme` |msm em ohg|s`djÿd
n`e bpdojhdmgj`d~h n` eh j~`gm cjhgê~sjoh$ M ohd~jdpmojÿd ` jn`d~jbjomd pdm `sj`
n` ohdo`|~h cíjoh z ohgpd` m ~hnm em ~`odhehkçm cjhgê~sjom$
?$3$= Ohg|hd`d~` n` pd j~`gm cjhgê~sjoh
Eh |sjdoj|me` ohg|hd`d~` }p` ` |p`n`d jn`d~jbjoms `d pd j~`gm cjhgê~sjoh hd9
‣ _`dhs9 @ `e nj|hj~jrh }p` om|~psm eh smkh h omsmo~`sç~jom cjhgê~sjom$
N`|`dnj`dnh n` eh smkh cjhgê~sjoh }p` ` }pj`smd s`kj~sms z ohdr`s~js `d
nm~h njkj~me` ` d`o`j~msíd eh `dhs` mn`opmnh$ M ohd~jdpmojÿd `
gp`~sm pdm ~mcem ohd mekpdh n` eh njb`s`d~` ~j|h n` `dhs` p~jejymnh |msm
mekpdm n` em ~`odhehkçm cjhgê~sjom }p` ` ~sm~msíd gí mn`emd~`$
^mcem =9 _`dhs` `kùd ~j|h n` ~`odhehkçm cjhgê~sjom
^`odhehkçm Nj|hj~jrh n` om|~psm
Ap`eem nmo~jems \`sjbêsjoh n` `osj~hsjh ~msi`~m \OGOJM h e`o~hsjd~`ksmnh$
S`ohdhojgj`d~h n` rhy Gjosÿbhdh h ~`eêbhdh
S`ohdhojgj`d~h bmojme Oígmsm n` rjn`h h oígmsm jd~`ksmnm `d pd \O
S`ohdhojgj`d~h n` jsj Oígmsm n` jdbsmsshih
S`ohdhojgj`d~h n` s`~jdm Pdjnmn |sh|j`~msjm n` `osj~hsjh h n` |ms`n
S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh Pdjnmn |sh|j`~msjm n` |ms`n h n` |j`
S`ohdhojgj`d~h n` bjsgm ^mce`~m n` bjsgm |pd~`sh `dhs me ghrjgj`d~h
S`ohdhojgj`d~h n` `osj~psm n` ~`oemnh ^`oemnh
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 24/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ S`|hj~hsjh9 @ em cm` n` nm~h nhdn` ` megmo`dmd em |emd~jeem cjhgê~sjom
jdosj~m |msm p ohg|msmojÿd$ N`c`sçm |sh~`k`s` `d pd ís`m bçjom `kpsm mç
ohgh `s ojbsmnm z bjsgmnm njkj~meg`d~ $
‣ Mekhsj~gh9 Pmnh |msm em `q~smoojÿd n` omsmo~`sç~jom !|sho`mgj`d~h* z p
ohg|msmojÿd$ Em ~s` bpdojhd` cíjom mhojmnm m `eeh hd9 s`kj~sh
r`sjbjomojÿd jn`d~jbjomojÿd$
?$3$3 S`kj~sh `d `e j~`gm
@d em gmzhs |ms~` n` eh omh eh ppmsjh n`c`d s`kj~sms p jn`d~jnmn `d `e j~`gm
md~` n` amo`s ph n` êe$ @~h ` s`mejym |hs g`njh n` em hc~`dojÿd n` eh |msíg`~sh
cjhgê~sjoh$ @~` |sho`h ` `e n` s`kj~sh z ` ohg|hd` n` ~s` bm` nj~jd~m9
‣ Om|~psm9 _` s`ohk`d eh |msíg`~sh cjhgê~sjoh$ @~h |msíg`~sh rmsçmd `d
omnm ~`odhehkçm ohgh ` hc`srm `d em jkpj`d~` ~mcem$
^mcem 39 \msíg`~sh ohdjn`smnh `d omnm ~`odhehkçm cjhgê~sjom
^`odhehkçm Gp`~sm cjhgê~sjom
Ap`eem nmo~jems Jgmk`d h gjdpojm n` em ap`eem nmo~jems
S`ohdhojgj`d~h n` rhy Ksmcmojÿd n` rhy
S`ohdhojgj`d~h bmojme Jgmk`d bmojme
S`ohdhojgj`d~h n` jsj Jgmk`d n`e jsj
S`ohdhojgj`d~h n` s`~jdm Jgmk`d n` em s`~jdm
S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh Jgmk`d `d ?'N n` em |ms~` p|`sjhs z em~`sme n`gmdh z n`nh
S`ohdhojgj`d~h n` bjsgm Jgmk`d n` em bjsgm z s`kj~sh n` g`njnms`emojhdmnm ohd em njdígjom
S`ohdhojgj`d~h n` `osj~psm n` ~`oemnh S`kj~sh n` em ~`oem |pemnm z s`kj~sh n`g`njnm s`emojhdmnm ohd em njdígjom
‣ \sho`mgj`d~h9 _` k`d`sm pdm |emd~jeem ohd em omsmo~`sç~jom |`shdme` n` eh
|msíg`~sh om|~psmnh$ Em jkpj`d~` ~mcem gp`~sm eh njb`s`d~` smkh
`q~smçnh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 25/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 30 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
^mcem ?9 Omsmo~`sç~jom `q~smçnm `d omnm ~êodjom cjhgê~sjom
^`odhehkçm Omsmo~`sç~jom `q~smçnm
Ap`eem nmo~jems Pcjomojÿd z njs`oojÿd n`e bjdme n` em gjdpojmh bhsgm n` em ap`eem
S`ohdhojgj`d~h n` rhy Bs`op`dojm omn`dojm z npsmojÿd n`e |m~sÿdrhome$
S`ohdhojgj`d~h bmojme\hjojÿd s`em~jrm z bhsgm n` em dmsjy |hjojÿdn` em gmdnçcpem
S`ohdhojgj`d~h n` jsj _psoh z `~sçm n`e jsj
S`ohdhojgj`d~h n` s`~jdm \m~shd` n` eh rmh mdkpçd`h n` em s`~jdm
S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdhMe~psm z mdoapsm n` eh ap`h z em
ms~jopemojhd` n` eh n`nh z n` em gmdh
S`ohdhojgj`d~h n` bjsgmR`ehojnmn hsn`d n` eh ~smyh |s`jÿd zm|msj`dojm n` em bjsgm
S`ohdhojgj`d~h n` `osj~psm n` ~`oemnh_`op`dojm n` ~`oem z |mpm `d~s`|pemojhd`
‣ Jdosj|ojÿd9 Em |emd~jeem |sho`mnm ` kpmsnm `d pd g`njh n` megmo`dmgj`d~h
mn`opmnh$ Pdm r`y }p` em jdosj|ojÿd `~í ohg|e`~m `e j~`gm |p`n` mp~`d~joms
m em |`shdm g`njmd~` `e ph n` `~m |emd~jeem$ \msm `eeh ` jkp` `e
|sho`njgj`d~h }p` ` `ýmem `d `e jkpj`d~` `}p`gm9
Ksíbjoh =9 \sho`h n` jdosj|ojÿd `d `e s`kj~sh
Jn`d~jnmn n` ppmsjh
_`dhs \s ' sho mgj`d~h
@q~smo~hs n` omsmo~`sç~jom
K`d`smnhs n` |emd~jeem\emd~jeem
kpmsnmnm
Jdbhsgmojÿd
cjhgê~sjom
\emd~jeem n`e ppmsjh
Jdosj|ojÿd
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 26/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 32 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
?$3$? Mp~`d~jomojÿd
Em mp~`d~jomojÿd ` `e |sho`h g`njmd~` `e opme ` om|~psm pdm gp`~sm cjhgê~sjom n`ejdnjrjnph |msm p ohg|msmojÿd ohd em |emd~jeem zm s`kj~smnm$ @~m mp~`d~jomojÿd |p`n`s`mejyms` n` nh gmd`sm njb`s`d~` jn`d~jbjomojÿd z r`sjbjomojÿd }p` ohdrj`d` nj~jdkpjs9
‣ Jn`d~jbjomojÿd9 Ohdj~` `d em ohg|msmojÿd n` em gp`~sm s`ohkjnm n`e ppmsjh
bs`d~` m pdm cm` n` nm~h n` smkh cjhgê~sjoh s`kj~smnh |s`rjmg`d~`$ Dh `
|s`ojm n` n`oemsmojÿd jdjojme n` p jn`d~jnmn |hs |ms~` n`e ppmsjh ` n`ojs `e
ùdjoh nm~h }p` ` p~jejym ` em gp`~sm cjhgê~sjom s`ohkjnm `d `e ghg`d~h n`
ph jd m|hzh n` pd s`kj~sh md~`sjhs dj pd dhgcs` n` ppmsjh h opme}pj`s h~sh
~j|h n` s`ohdhojgj`d~h$ @~` gê~hnh s`}pj`s` n` pd |sho`h n` oíeopeh ohg|e`ih
|p`~h }p` ` am n` ohg|msms `~m gp`~sm ohd omnm pdm n` em md~`sjhsg`d~`
megmo`dmnm |msm cpoms pdm ohjdojn`dojm$ @e |sho`h n`mssheemnh ` `ejkpj`d~`9
Ksíbjoh 39 \sho`h n` jn`d~jbjomojÿd
`d em mp~`d~jomojÿd
‣ R`sjbjomojÿd9 @d `~` omh jd `gcmskh `e |sjg`s |mh n`e |sho`h ` em
jn`d~jbjomojÿd n`e jdnjrjnph g`njmd~` pd dhgcs` n` ppmsjh ~msi`~m h mekùd h~sh
gê~hnh$ N` `~` ghnh ` `e`oojhdm n` em cm` n` nm~h `e |m~sÿd }p`md~`sjhsg`d~` ` am s`kj~smnh |msm njoah ppmsjh$ \h~`sjhsg`d~` `e j~`gm
Jn`d~jbjomojÿd
_`dhsJdbhsgmojÿd
cjhgê~sjom
\s ' sho`mgj`d~h
@q~smo~hs n` omsmo~`sç~jom
K`d`smnhs n` |emd~jeem
\emd~jeem
Ohjdojn`dojm
!d ohjdojn`dojm*
Jn`d~jbjomojÿd n`e
ppmsjh h dh
\emd~jeem
kpmsnmnm
^hnm em |emd~jeem
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 27/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
s`ohk` em omsmo~`sç~jom cjhgê~sjom z em ohg|msm ohd em }p` ~j`d` megmo`dmnm$ @
pd |sho`h jg|e` me ~`d`s }p` ohd~sm~ms ùdjomg`d~` nh gp`~sm `d `e }p` `e
s`pe~mnh ` |hj~jrh h d`km~jrh9
Ksíbjoh ?9 \sho`h n` r`sjbjomojÿd
`d em mp~`d~jomojÿd
?$3$> ^hgm n` n`ojjhd`
@e |sho`h n` ~hgm n` n`ojjhd` `d em cjhg`~sçm ohd~m n` opm~sh `~m|m9
‣ Cù}p`nm n` ohjdojn`dojm9 Ohg|msmojÿd n` em gp`~sm cjhgê~sjom |msm
n`~`sgjdms `e ksmnh n` jgjej~pn h ohss`emojÿd `d~s` `eem$
‣ Oíeopeh n` pdm |pd~pmojÿd9 \msm em ohg|msmojÿd n` nm~h cjhgê~sjoh `
omeopem pd rmehs dpgêsjoh }p` jdnjom `e ksmnh n` jgjej~pn h ohss`emojÿd `d~s` em
gp`~sm$ Eh gê~hnh n` r`sjbjomojÿd ~smnjojhdme` !ohd~sm`ým \JD `~o$* hd
cjdmsjh ` n`ojs hbs`o`d pdm s`|p`~m |hj~jrm h d`km~jrm$ @~` dh ` `e omh
`d em gmzhsçm n` j~`gm cjhgê~sjoh$ Em gmzhs |ms~` eh j~`gm cjhgê~sjoh` cmmd `d mekhsj~gh n` cù}p`nm n` ohjdojn`dojm }p` k`d`smd pdm
R`sjbjomojÿd
_`dhsJdbhsgmojÿd
cjhgê~sjom\s ' sho mgj d~h
@q~smo~hs n` omsmo~`sç~jom
K`d`smnhs n` |emd~jeem
\emd~jeem
Ohjdojn`dojm
R`snmn`sh(Bmeh
Jn`d~jnmn n`oemsmnm
\emd~jeem
kpmsnmnm
\emd~jeem n`oemsmnm
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 28/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 31 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
|pd~pmojÿd$ @~m |pd~pmojÿd s`|s``d~m `e ksmnh n` ohss`emojÿd `d~s` em gp`~sm
m mp~`d~joms z em n` s`kj~sh$
‣ Ohg|msmojÿd ohd `e pgcsme `~mce`ojnh9 @e pgcsme ` pd dùg`sh |s`n`bjdjnhdhsgmeg`d~` |hs `e mngjdj~smnhs n`e j~`gm cjhgê~sjoh }p` `~mce`o` `e ksmnh
n` ohss`emojÿd d`o`msjh |msm }p` pdm gp`~sm ` ohdjn`s` jgjems m h~sm$ _j em
|pd~pmojÿd s`pe~md~` n` em ohg|msmojÿd n` gp`~sm p|`sm `e pgcsme em
gp`~sm ` ohdjn`smd ohjdojn`d~` mpd}p` em gp`~sm `d ç dh `md
d`o`msjmg`d~` jnêd~jom$ @~h ` n`c` m em jdoepjÿd `d `e mdíejj n` em
|hjce` n`bjoj`dojm `d em om|~psm n` em gp`~sm$
‣ N`ojjÿd9 S`pe~mnh n` em ohg|msmojÿd `d~s` em |pd~pmojÿd z `e pgcsme$ Em
n`ojjhd` }p` |p`n` ~hgms pd j~`gm cjhgê~sjoh jdoepz`d9 ohjdojn`dojm dhohjdojn`dojm ` jdohdoepz`d~` !`e j~`gm dh ` om|my n` n`~`sgjdms j em gp`~sm
s`ohkjnm ` ohjdojn`d~` h dh*$ N`|`dnj`dnh n`e j~`gm cjhgê~sjoh
jg|e`g`d~mnh pdm ohjdojn`dojm |p`n` |`sgj~js `e moo`h pdm dh ohjdojn`dojm
s`~sjdkjseh z pdm gp`~sm jdohdoepz`d~` |p`n` hejoj~ms me ppmsjh h~sm gp`~sm$
?$3$0 Bpdojhdmgj`d~h n`e j~`gm
@e bpdojhdmgj`d~h z bjmcjejnmn n`e j~`gm ` |p`n` rmehsms g`njmd~` pdm `sj` n` ~mm9
‣ ^mm n` `sshs n` mn}pjjojÿd !Bmjeps` ^h Mn}pjs` sm~` *9 \sh|hsojÿd n` homjhd`
`d em }p` `e j~`gm dh ` om|my n` om|~psms pdm gp`~sm n` omejnmn pbjoj`d~`
|msm `s |sho`mnm$
‣ ^mm n` `sshs n` s`kj~sh !Bmjeps` ^h @dshe sm~`*9 \sh|hsojÿd n` em |hcemojÿd
|msm em opme `e j~`gm cjhgê~sjoh dh ` om|my n` k`d`sms gp`~sm n` omejnmn
pbjoj`d~`$
‣ ^mm n` bmeh d`km~jrh !Bme` S`i`o~jhd Sm~`*9 \sh|hsojÿd n` homjhd` `d em
}p` `e j~`gm dh rjdopem m pd jdnjrjnph ohd p |sh|jm |emd~jeem cjhgê~sjom
`qj~`d~` `d `e s`kj~sh$
‣ ^mm n` bmeh |hj~jrh !Bme` Moo`|~mdo` Sm~` *9 \sh|hsojÿd n` homjhd` `d em
}p` pd j~`gm rjdopem `ssÿd`mg`d~` m pd jdnjrjnph ohd em jdbhsgmojÿd
cjhgê~sjom qj~`d~` n` h~sm |`shdm$
?$? ^J\H_% ^ÊODJOM_ Z ^@ODHEHKÇM_ M\EJOMNM_ M EM CJHG@^SÇM
Em ~`odhehkçm cjhgê~sjom ` n`bjd`d ohgh gê~hnh mp~hgí~joh p~jejymnh |msm
s`ohdho`s m |`shdm hcs` em cm` n`e mdíejj n` p omsmo~`sç~jom bçjom h n`
ohg|hs~mgj`d~h$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 29/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 3: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
N`|`dnj`dnh n` em ~êodjom cjhgê~sjom `g|e`mnm eh |msíg`~sh ohdjn`smnh hd
njb`s`d~`9 psoh n` em ap`eem nmo~jems k`hg`~sçm n` em gmdh jgmk`d bmojme `~o$ N` `~h
|msíg`~sh ` `q~sm` pd |m~sÿd ùdjoh |msm omnm |`shdm }p` `sí p~jejymnh |msm
|h~`sjhs` ohg|msmojhd`$
Bpdnmg`d~meg`d~` ` nj~jdkp`d nh ksp|h n` ~`odhehkçm cjhgê~sjom `d bpdojÿd n` em
g`~hnhehkçm p~jejymnm9 m}p`eem }p` mdmejymd omsmo~`sç~jom bjjheÿkjom n` em |`shdm z
m}p`eem }p` mdmejymd p ohg|hs~mgj`d~h$
?$?$= ^`odhehkçm cjhgê~sjom bjjheÿkjom
Em ~`odhehkçm cjhgê~sjom bjjheÿkjom ` omsmo~`sjymd |hs ohdjn`sms |msíg`~sh
n`sjrmnh n` em g`njojÿd njs`o~m n` mekùd smkh `~sjo~mg`d~` bçjoh n`e op`s|h apgmdh m
em ahsm n` jn`d~jbjoms |`shdm$
Ap`eem nmo~jems
Em jn`d~jbjomojÿd cmmnm `d ap`eem nmo~jems ` em gí md~jkpm n` em ~êodjom cjhgê~sjom z
am jnh p~jejymnm `d pd ksmd dùg`sh n` m|ejomojhd` n`cjnh m }p` em gmzhsçm n` em
|hcemojÿd ~j`d` ap`eem nmo~jems` ùdjom ` jdme~`smce`$
@ `e smkh cjhgê~sjoh gí p~jejymnh |msm mp~`d~jomojÿd z ~j`d` em gmzhs kmgm n`
~`odhehkçm n` om|~psm ohd nj~jd~m omsmo~`sç~jom n` bpdojhdmgj`d~h$ Mjgjgh ~j`d`
ohgh r`d~mim p me~m ~mm n` |s`ojjÿd z }p` amcj~pmeg`d~` eh ppmsjh ~j`d`dohdhojgj`d~h pbjoj`d~` hcs` p p~jejymojÿd$
@qj~`d nh ~j|h n` ~êodjom n` cù}p`nm n` ohjdojn`dojm `d~s` gp`~sm n` ap`eem
nmo~jems9
‣ Cmmnm `d gjdpojm9 @~m ~êodjom cmm p g`omdjgh n` mp~`d~jomojÿd `d em
―gjdpojm‗ ` n`ojs `d n`~`sgjdmnm bhsgm bíojeg`d~` jn`d~jbjomce` `qj~`d~`
`d em ap`eem nmo~jems$ Mç ` s`kj~sm `e ~j|h n` gjdpojm z p |hjojÿd n`d~sh n` em
ap`eem `~mce`oj`dnh pdm `sj` n` g`njojhd`$ N` `~m bhsgm `e ghn`eh h
|emd~jeem ohss`|hdnj`d~` m omnm ppmsjh ` pd `}p`gm `d `e }p` ` jdnjomd em
gjdpojm }p` ` amd n` n`~`o~ms p |hjojÿd z em nj~mdojm }p` `|msmd pdm
n` h~sm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 30/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Jep~smojÿd =9 Gjdpojm n` pdm ap`eem nmo~jems
Dh hc~md~` `qj~`d mekpdm njbjope~mn` mhojmnm m `~` gê~hnh$ \hs pd emnh
dh ` `dojeeh `q~sm`s n` bhsgm |s`ojm em g`dojhdmnm gjdpojm opmdnh em
omejnmn n` em gp`~sm dh ` cp`dm$ \hs h~sh emnh dh ` ~j`d` `d op`d~m `e |m~sÿd
kehcme n` os`~m z psoh$
‣ Cmmnm `d ohss`emojÿd9 G`njmd~` em p~jejymojÿd n` `~m ~êodjom ` mdmejym `e
|m~sÿd kehcme `kpjnh |hs em ap`eem nmo~jems ` n`ojs `e `}p`gm k`d`sme n`e
ohdipd~h n` em ap`eem `d epkms n` em gjdpojm$ @~m ~êodjom dh s`}pj`s` n` pd
s`kj~sh ~md |s`ojh |`sh p |sjdoj|me jdohdr`dj`d~` ` }p` ` r` mb`o~mnm |hs em
~smemojÿd z em sh~mojÿd n` em jgmk`d$
Jep~smojÿd 39 ^êodjom n` ohss`emojÿd
@e |`}p`ýh ~mgmýh n` eh s`o`|~hs` p bíoje jd~`ksmojÿd !|pnj`dnh `s jdoepjnh n`
bhsgm `dojeem `d ~`oemnh* z p pmcjejnmn mç ohgh eh cmih oh~` mhojmnh m eh
gjgh ohdrj`s~`d m em ap`eem nmo~jems `d pdm ~`odhehkçm gpz ù~je |msm p jg|emd~mojÿd `d
hbjojdm z ahkms`$
\msme`emg`d~` z n` gmd`sm jdn`|`dnj`d~` m em ~êodjom p~jejymnm |msm em cù}p`nm n`
ohjdojn`dojm qj~`d njb`s`d~` ~j|h n` `dhs`9
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 31/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ _`dhs` ÿ|~joh9 _hd eh gí ohgpd` `d `e g`somnh z op`d~md ohd pdm
p|`sbjoj` n` osj~me nhdn` ` ohehom `e n`nh e`d~` pd |sjgm pdm bp`d~` n` epy
z pdm oígmsm$ Em oígmsm ` cmm `d ~`odhehkçm OON !Oamsk`'Ohp|e`n N`rjo` *
h OGH_ !Ohg|e`g`d~msz G`~me Hqjn` _`gjohdnpo~hs * j`dnh mgch ~j|h n`
jejojh z jgjems` `d opmd~h m `djcjejnmn$ Em oígmsm ohd~m n` rmsjh oj`d~h n`
gje` n` |çq`e` j~pmnh `d bhsgm n` gmeem }p` opmdnh ` r`d `~jgpemnh ohd
em epy }p` jdojn` hcs` `eeh megmo`dmd pdm |`}p`ým omskm n` `e`o~sjojnmn
~smd|hs~mdnh m eh ojsopj~h n` |sho`mgj`d~h n` em oígmsm em gp`~sm s`ojcjnm$
‣ _`dhs` om|moj~jrh9 @~íd ohg|p`~h `d em p|`sbjoj` n` pd ojsopj~h
jd~`ksmnh n` jejohdm }p` nj|hd` n` pdm gmeem n` om|moj~hs` }p` gjn`d em
njb`s`dojm n` rhe~mi` `d `e ohd~mo~h ohd em p|`sbjoj` nmo~jems$
@~h `dhs` ÿeh ~smcmimd ohd |j`e` mdm dhsgme` zm }p` dh hd
h|`sm~jrh opmdnh ` p~jejymd hcs` |j`e` ohd yhdm npsm omeeh h ojom~sjo`$ Em
apg`nmn em ksmm h `e |herh ~mgcjêd |p`n`d mb`o~ms m p bpdojhdmgj`d~h$
S`ohdhojgj`d~h bmojme
@e s`ohdhojgj`d~h bmojme ` pdm ~êodjom g`njmd~` em opme ` s`ohdho` m pdm |`shdm m
|ms~js n` pdm jgmk`d h bh~hksmbçm$ \msm `eeh ` p~jejymd |shksmgm n` oíeopeh }p` mdmejymd
jgík`d` n` sh~sh apgmdh$ @e |sho`h n` s`kj~sh npsm `d~s` 3< z ?< `kpdnh
~j`g|h `d `e opme ` ~hgmd rmsjm bh~hksmbçm n` em omsm$ Jn`meg`d~` em `sj` n` jgík`d`n`c`sçm jdoepjs njb`s`d~` ídkpeh z `q|s`jhd` bmojme` |msm |`sgj~js pdm cù}p`nm n`
ohjdojn`dojm gí |s`ojm$
Jep~smojÿd ?9 S`ohdhojgj`d~h bmojme
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 32/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?3 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Eh opm~sh gê~hnh |sjdoj|me` `g|e`mnh |hs eh |shr``nhs` n` s`ohdhojgj`d~h bmojme
` n`osjc`d m ohd~jdpmojÿd9
=$ @jk`dbmo` 9 \hnsçm ~smnpojs` ohgh #omsm n` pdh gjgh#$ @ pdm ~`odhehkçm|m~`d~mnm `d `e Gmmoap`~~ Jd~j~p~` hb ^`oadhehkz !GJ^* }p` p~jejym jgík`d`
cjnjg`djhdme` `d `omem n` ksj` }p` s`|s``d~md omsmo~`sç~jom nj~jd~jrm n`
pdm jgmk`d bmojme$
3$ Mdíejj n` omsmo~`sç~jom ehome`9 @ em ~`odhehkçm gí p~jejymnm `d `e
s`ohdhojgj`d~h bmojme$ @~m ~`odhehkçm `~í s`emojhdmnm ohd @jk`dbmo` |`sh `
om|my n` mnm|~ms` g`ihs m eh omgcjh `d em m|msj`dojm h m|`o~h bmojme
!hdsj`dnh bspdoj`dnh `e o`ýh `~o$*$ @e mdíejj n` omsmo~`sç~jom ehome` !Ehome
B`m~ps` Mdmezj * p~jejym nho`dm n` omsmo~`sç~jom n` em njb`s`d~` s`kjhd` n`em omsm z ~mgcjêd jdohs|hsm em pcjomojÿd s`em~jrm n` `~h smkh$ Em |`}p`ým
omsmo~`sç~jom `q~smçnm hd ceh}p` n` ohd~spoojÿd z ~md~h `e ~j|h n` ceh}p`
ohgh p nj|hjojÿd ` p~jejymd |msm jn`d~jbjoms z(h r`sjbjoms$
?$ D`psme D`~{hsf Gm||jdk 9 @d `~` gê~hnh em s`n` d`pshdme` `g|e`md pd
mekhsj~gh |msm n`~`sgjdms em jgjej~pn n` em omsmo~`sç~jom ùdjom n` em gp`~sm
mn}pjsjnm z n` em hc~`djnm `d `e s`kj~sh p~jejymdnh ~md~m |ms~` n` em jgmk`d
bmojme ohgh `m |hjce`$
>$ \sho`mgj`d~h mp~hgí~joh n` em omsm !Mp~hgm~jo Bmo` \sho`jdk *9 @ pdm~`odhehkçm gí spnjg`d~msjm }p` p~jejym em sm~jh n` nj~mdojm `d~s` em
omsmo~`sç~jom n` bíoje mn}pjjojÿd ~me` ohgh eh hih em |pd~m n` em dmsjy z em
ohgjpsm n` em chom$ Mpd}p` `d k`d`sme dh ` ~md shcp~h ohgh eh n`gí
gê~hnh em MB\ |p`n` `s gí `bjomy opmdnh em om|~psm n` jgmk`d ` bshd~me `d
ohdnjojhd` n` |hom epy$
M njb`s`dojm n` h~sh j~`gm cjhgê~sjoh `e s`ohdhojgj`d~h bmojme |p`n` `s p~jejymnh
|msm em rjkjemdojm amcj~pmeg`d~` g`njmd~` oígmsm n` rjn`h$ @ |hs `eeh }p` `d `~`
omh dh ` d`o`msjm pdm jdr`sjÿd `d nj|hj~jrh `|`oçbjoh$
Pdh n` eh |sjdoj|me` jdohdr`dj`d~` }p` |s``d~m `~m ~êodjom ` p `omm s`j~`dojm
me bsmpn` |p`~h }p` pdm |`shdm |p`n` ghnjbjoms rjpmeg`d~` p omsm n` gmd`sm
`dojeem ohgh |hs `i`g|eh p~jejymdnh pdm kmbm n` he h n`iídnh` os`o`s em cmscm$
Mjgjgh n`c` ohdjn`sms` }p` `e sh~sh n` em |`shdm rmsçm ohd em `nmn$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 33/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
S`ohdhojgj`d~h n` jsj
@e jsj ` em |ms~` |jkg`d~mnm n`e hih }p` shn`m em |p|jem$ @~` gê~hnh p~jejym em
omsmo~`sç~jom n`e jsj apgmdh ohd `e bjd n` r`sjbjoms em jn`d~jnmn n` pd jdnjrjnph$
Eh |m~shd` n` jsj rj`d`d gmsomnh n`n` `e dmojgj`d~h z smsm r`y omgcjmd$ _hd
`q~s`gmnmg`d~` ohg|e`ih ohd~j`d`d pdm ksmd omd~jnmn n` jdbhsgmojÿd z ~j`d`d gí n`
3<< |sh|j`nmn` ùdjom$
@e `omd`mnh n` jsj ` ee`rm m omch g`njmd~` pdm oígmsm n` jdbsmsshih `|`ojmejymnm
‟j~pmnm |hs eh k`d`sme gpz o`som n` em |`shdm‟ }p` jepgjdm `e hih s`mejymdnh pdm
bh~hksmbçm n` me~m s`hepojÿd$ @~` |sho`h npsm ÿeh pdh h nh `kpdnh z |sh|hsojhdm
eh n`~mee` n`e jsj }p` ` ehomejymd s`kj~smd z megmo`dmd |msm s`mejyms bp~psm
r`sjbjomojhd`$
@ jg|hs~md~` `ýmems }p` dh `qj~` djdkùd sj`kh |msm em mepn zm }p` me hc~`d`s` em
gp`~sm g`njmd~` pdm oígmsm n` jdbsmsshih dh amz |`ejksh n` }p` `e hih s`pe~` nmýmnh
`d `e |sho`h$
Pdm r`y ~hgmnm em gp`~sm ` ``dojme em ohss`o~m pcjomojÿd z mjemgj`d~h n`e jsj `d em
jgmk`d zm }p` `d omh n` dh s`mejyms` mn`opmnmg`d~` em jd~`sb`s`dojm k`d`smnm
|hs `e `qo`h n` jdbhsgmojÿd }p` |shrhomd em |`~mým s`be`ih z em |p|jem |hnsçmd
s`pe~ms `d |shce`gm `d `e bpdojhdmgj`d~h n`e j~`gm$
\hs `eeh z |s`rjmg`d~` m em ohg|msmojÿd n` em gp`~sm ` s`mejym pd |s`'|sho`mgj`d~h
n` em jgmk`d ‟ amcj~pmeg`d~` m|ejomojÿd n` bje~sh z gíomsm ‟ |msm mejrjms n` omskm
ohg|p~mojhdme d`o`msjm me |sho`h n` s`ohdhojgj`d~h$
Em ohg|msmojÿd `d~s` gp`~sm n` jsj ` s`mejym p~jejymdnh em nj~mdojm n` Amggjdk =
@e a`oah n` }p` eh jsj n` eh hih n`s`oah ` jy}pj`snh n` omnm |`shdm `md njb`s`d~`
z }p` eh |m~shd` `md njbçoje` n` om|~psms ~j`d`d ohgh ohd`op`dojm }p` `e
s`ohdhojgj`d~h n` jsj `m pdm n` em ~`odhehkçm cjhgê~sjom gí s`j~`d~` me bsmpn`$
|msm `q~sm`s em njb`s`dojm `d~s` em jgík`d` |s`'|sho`mnm$ Pd rmehs jdb`sjhs me
pgcsme `~mce`ojnh s`em~jrh m em nj~mdojm gíqjgm `d~s` em jgík`d` p|hd` pdm
ohjdojn`dojm `d~s` eh |m~shd` ohg|msmnh$
= Em nj~mdojm n` Amggjdk ` pd gê~hnh n` g`njojÿd n` em njb`s`dojm `d~s` nh `e`g`d~h$ _` n`bjd` ohgh `e dùg`sh
n` omsmo~`s` }p` n`c`sçmd ghnjbjoms` |msm ~smdbhsgms pd `e`g`d~h `d h~sh s`b`s`d~` h eh }p` ` eh gjgh `e dùg`sh n`omsmo~`s` }p` e` njb`s`dojm ~`dj`dnh `d op`d~m em gmkdj~pn n` omnm n` em n`jkpmenmn`$ N` `~` ghnh ` |p`n` g`njs`e dùg`sh n` `sshs` }p` ` n`c`sçmd nms |msm }p` pdm gp`~sm ` jd~`s|s`~m` ohgh ohjdojn`d~` h njb`s`d~` m h~sm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 34/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh
@~m ~`odhehkçm p~jejym em bhsgm n` em gmdh |msm ohdbjsgms em jn`d~jnmn n`e jdnjrjnph$ _p
mo`|~mojÿd |hs |ms~` n` eh ppmsjh ` gpz `e`rmnm zm }p` dh s`}pj`s` jdbhsgmojÿdn`~meemnm n` eh jdnjrjnph$
Jep~smojÿd >9 S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh
\hs h~sh emnh ` ~sm~m n` pdm ~êodjom }p` ` |s`b`sjce` }p` `m p~jejymnm |msm em
r`sjbjomojÿd n` |`shdm z dh s`ohg`dnmnm |msm em jn`d~jbjomojÿd m dh `s }p` `m
ohgcjdmnm ohd h~sm omsmo~`sç~jom g`njmd~` j~`gm cjhgê~sjoh cjghnme`$
\msm em om|~psm n` em gp`~sm ` n`c` ohehoms em gmdh hcs` em p|`sbjoj` n` pd e`o~hs$
Em |hjojÿd ` n`~`sgjdm g`njmd~` ojdoh kpçm }p` j~ùmd ohss`o~mg`d~` em gmdh |msm em
om|~psm$ Pdm `sj` n` oígmsm ~hgmd jgík`d` `d ?'N n` em gmdh n`n` njb`s`d~`
ídkpeh$ _` ~sm~m n` pd |sho`h sí|jnh z `dojeeh$ @e nj|hj~jrh n` `omd`h n` gmdh
|p`n` |sho`ms em jgík`d` ?'N `d 0 `kpdnh h g`dh z em r`sjbjomojÿd n` em gmdhnpsm g`dh n` = `kpdnh$
Em omsmo~`sç~jom `q~smçnm jdoepz`d em opsrm n` eh n`nh p kshhs z ehdkj~pn em
me~psm z em mdoapsm n`e nhsh n` em gmdh em nj~mdojm `d~s` em ms~jopemojhd` z em
`~spo~psm ÿ`m `d k`d`sme$ Dh ~j`d`d `d op`d~m n`~mee` p|`sbjojme` ~me` ohgh ap`eem
nmo~jems` eçd`m ojom~sjo` h poj`nmn mç ohgh em pým }p` |p`n`d rmsjms n` ~mgmýh
`d pd cs`r` |`sçhnh n` ~j`g|h$
_j cj`d ` oj`s~h }p` em `~spo~psm n` eh ap`h z em ms~jopemojhd` n` em gmdh hdsmkh s`em~jrmg`d~` ohd~md~` h~sm ojsopd~mdojm ohgh pdm jdbemgmojÿd h pdm
e`jÿd |p`n`d rmsjms em `~spo~psm cíjom n` em gmdh njbjope~mdnh em mp~`d~jomojÿd$ M
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 35/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
|`ms n` }p` em ~`odhehkçm n`osj~m ` s`em~jrmg`d~` |s`ojm dh ` cmm `d pd ohdipd~h
n` nm~h ~md sjoh ohgh pdm ap`eem nmo~jems h pd |m~sÿd n` jsj$
S`ohdhojgj`d~h n` s`~jdm
@e `oíd`s cjhgê~sjoh n` em s`~jdm ` cmm `d em p~jejymojÿd n`e |m~sÿd n` eh rmh
mdkpçd`h ohd~`djnh `d em gjgm$ @e a`oah n` }p` omnm |m~sÿd `m ùdjoh !jdoeph `d
k`g`eh jnêd~joh me `s jdn`|`dnj`d~` n` bmo~hs` k`dê~joh* z }p` ` gmd~`dkm
jdrmsjmce` m eh emskh n`e ~j`g|h em ohdrj`s~`d `d pdm ~êodjom jnÿd`m |msm `d~hsdh n` me~m
`kpsjnmn$
Jep~smojÿd 09 S`ohdhojgj`d~h n` s`~jdm
\`` m }p` p ~mm n` bmeh |hj~jrh `m |sío~jomg`d~` dpem `~m ~`odhehkçm ~j`d` pd
jdohdr`dj`d~` ohdjn`smce` zm }p` ` d`o`msjm em ~h~me ohemchsmojÿd |hs |ms~` n`e
ppmsjh me ~sm~ms` n` pd |sho`h }p` |p`n` s`pe~ms jdoÿghnh$ Em ~hgm n` em gp`~sm `
s`mejym m |ms~js n` em |p|jem eh }p` s`}pj`s` }p` `e ppmsjh |`sgmd`yom jdgÿrje z gpz
o`som n`e `dhs npsmd~` em om|~psm n` em jgmk`d$ Dh hc~md~` me s`mejyms` em om|~psm n`
`~m gp`~sm g`njmd~` pdm oígmsm n` jdbsmsshih dh `qj~` `e sj`kh n` }p` `e hih s`pe~`
nmýmnh `d `e |sho`h$
_j cj`d ` pdm n` em ~`odhehkçm }p` m|ms`d~`g`d~` |p`n`d ee`kms m hbs`o`s g`ihs`s`pe~mnh z gmzhs `kpsjnmn em cmim mo`|~mojÿd |hs |ms~` n` eh ppmsjh mç ohgh `e
me~h oh~` n` eh nj|hj~jrh amo`d }p` em p~jejymojÿd n` `~m ~`odhehkçm ` ejgj~` m
jd~memojhd` gjej~ms` dpoe`ms` h emchsm~hsjh$
S`ohdhojgj`d~h n` em k`hg`~sçm n` em r`dm
@~m ~`odhehkçm ` cmm `d em `~spo~psm n` em r`dm n` em gmdh h n`e n`nh$ N` bhsgm
jgjems me jsj h m em s`~jdm em k`hg`~sçm n` em r`dm ` n`bjd` md~` n`e dmojgj`d~h z `
njb`s`d~` jdoeph `d k`g`eh jnêd~joh$ @d `e |sho`h n` om|~psm n` em gp`~sm `e `dhs
jdbsmsshih hc~j`d` pdm jgmk`d n`e |m~sÿd n` em r`dm m |ms~js n`e opme ` k`d`sm pdm
|emd~jeem cjhgê~sjom$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 36/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Jep~smojÿd 29 S`ohdhojgj`d~h n` r`dm n` em gmdh
Ohgh omsmo~`sç~jom gí s``ýmce` n` `~m ~êodjom n`~momd em pdjojnmn pdjr`smejnmn
z |`sgmd`dojm n` `~h smkh ipd~h m em dh d`o`jnmn n` ohd~mo~h `d `e ghg`d~h n`
~hgms em gp`~sm$ Mnjojhdmeg`d~` me ~sm~ms` n` pd ÿskmdh jd~`sdh s`pe~m gí ohg|e`ih
s`mejyms opme}pj`s rmsjmojÿd hcs` `e gjgh$ Dh hc~md~` `qj~`d ohdnjojhd` `q~`sdm
ohgh em s`mejymojÿd n` `i`sojojh bçjoh z njb`s`d~` `db`sg`nmn` !njmc`~`
ms~`sjh`oe`shj h ~pghs`* }p` |p`n`d mb`o~ms m em m|msj`dojm n` eh rmh mdkpçd`h$
_` ~sm~m n` pdm ~`odhehkçm s`em~jrmg`d~` s`oj`d~`$ ^sm p mnh|ojÿd |hs |ms~` n` mekpdhcmdoh im|hd`` z |hemoh `d omi`sh mp~hgí~joh !pdh n` eh omh n` êqj~h ~sm~mnh
`d `e |s``d~` `~pnjh* `~í ohg`dymdnh m `s jg|emd~mnm |hs em `g|s`m
`|`ojmeg`d~` `d `e `o~hs mdj~msjh nhdn` pd gê~hnh n` mp~`d~jomojÿd `d epkms`
`~êsje` jdoeph opmdnh eh ppmsjh p~jejo`d kpmd~` gênjoh s`pe~m n` ksmd p~jejnmn$
H~sm ~`odhehkçm bjjheÿkjom
Mnjojhdmeg`d~` m eh j~`gm zm n`osj~h `qj~`d ~`odhehkçm }p` ` `dop`d~smd `d pd
`~mnh n` n`mssheeh jdoj|j`d~`$ @d~s` `eeh ` `dop`d~smd |sjdoj|meg`d~` eh jkpj`d~`9
‣ Eçd`m n` em |megm n` em gmdh9 Em jgmk`d n` em |megm n` em gmdh n` pd
jdnjrjnph ohdj~` `d pdm `sj` n` psoh z |ej`kp`$ N` bhsgm jgjems m mekpdh
j~`gm n` s`ohdhojgj`d~h n` ap`eem nmo~jems `~m ~êodjom p~jejym gjdpojm |msm
cpoms ohjdojn`dojm$ _p ph `~í |hs `e ghg`d~h cm~md~` ejgj~mnh m em
jdr`~jkmojÿd bhs`d`$
‣ M$N$D$9 _` ~hgm pdm gp`~sm n` ~`ijnh n` pd jdnjrjnph |msm em `q~smoojÿd n`e
M$N$D$ !Íojnh N`hqjssjchdpoe`joh* n`e dùoe`h n` pdm oêepem$ @~m ~êodjom s`pe~m
mn`opmnm |msm `e ph bhs`d` |`sh dh |msm em jn`d~jbjomojÿd `d ~j`g|h s`me n`cjnhm em ohg|e`ijnmn n`e |sho`h z me ~j`g|h d`o`msjh |msm `q~sm`s pdm ap`eem
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 37/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
k`dê~jom m |ms~js n` pdm gp`~sm n` ~`ijnh$ @~` j~`gm ~j`d` jdohdr`dj`d~`
mhojmnh zm }p` eh k`g`eh jnêd~joh ohg|ms~`d M$N$D$ z n` pdm gp`~sm `
|p`n` hc~`d`s jdbhsgmojÿd hcs` em smym z em mepn n` pd jdnjrjnph nm~h n`
omsío~`s |`shdme `|`ojmeg`d~` `djce`$
‣ Bhsgm n` em hs`im9 Em jn`d~jbjomojÿd ` s`mejym m |ms~js n` em bhsgm n` em hs`im
n`e jdnjrjnph$ _` ~hgm ohgh gp`~sm pdm jgmk`d jdbsmsshim n` em gjgm$ @~m
~êodjom dh s`}pj`s` n` em ohemchsmojÿd n`e ppmsjh z |`sgj~` em jn`d~jbjomojÿd m
g`njm nj~mdojm$
‣ \j`e9 _` ~hgm pdm jgmk`d n` em p|`sbjoj` n` em |j`e$ @~m jgmk`d ` oemjbjom
pmdnh `e mekhsj~gh n` mdíejj n` em ~`q~psm n` em p|`sbjoj` n` em |j`e }p` ~j`d`
`d op`d~m pdm `sj` n` omsmo~`sç~jom me`m~hsjm z k`d`sm pdm |emd~jeem$
?$?$3 ^`odhehkçm cjhgê~sjom n` ohg|hs~mgj`d~h
Em ~`odhehkçm cjhgê~sjom n` ohg|hs~mgj`d~h ` omsmo~`sjymd |hs ohdjn`sms `d `e
|sho`h n` mp~`d~jomojÿd smkh n`sjrmnh n` pdm moojÿd s`mejymnm |hs pdm |`shdm$ \hs
~md~h jdoepz`d em rmsjmce` ~j`g|h zm }p` ~hnm moojÿd ~j`d` pd ohgj`dyh pd n`mssheeh z
pd bjdme$
S`ohdhojgj`d~h n` rhy
Ipd~h ohd `e s`ohdhojgj`d~h bmojme `e s`ohdhojgj`d~h ehop~hs ` pd gê~hnh dm~psme n`jn`d~jbjomojÿd$ @ pd |sho`h s`mejymnh m njmsjh |hs eh jdnjrjnph |msm s`ohdho`s m pd
ohdhojnh `d pdm eemgmnm ~`e`bÿdjom h me hçs pdm rhy$ @~m m|ejomojhd` pmd s`n`
d`pshdme` |msm m|s`dn`s m jn`d~jbjoms rho`$ Eh mekhsj~gh n`c`d g`njs z `~jgms em
jgjej~pn |msm n`rher`s pd s`pe~mnh h pdm ej~m n` |hjce` omdnjnm~h$ Em mp~`d~jomojÿd
` ohg|ejom n`cjnh m bmo~hs` ohgh `e spjnh n` bhdnh em omejnmn n` em gp`~sm z p
npsmojÿd |hs eh }p` j`g|s` ` d`o`msjh ohdjn`sms pd gmsk`d n` `sshs$
Mo~pmeg`d~` `qj~`d nh gê~hnh n` r`sjbjomojÿd }p` ` pmd n`|`dnj`dnh n` em
dm~psme`ym z hci`~jrh n` em m|ejomojÿd9
‣ R`sjbjomojÿd dh's`~sjdkjnm9 P~jejym pdm ohdr`smojÿd dhsgme ohgh gp`~sm$
‣ R`sjbjomojÿd s`~sjdkjnm9 @ `e gê~hnh gí ohgùd$ Em gp`~sm ` ejgj~m m
n`~`sgjdmnm |memcsm bsm` ohs~m h `q|s`jhd`$ \hs `~m smyÿd em ~mm n`
`sshs ` s`npo`d ohdjn`smce`g`d~`$ Mn`gí me `~ms cmmnm em r`sjbjomojÿd `d
ehopojhd` n` |hom npsmojÿd `e j~`gm s`|hdn` n` gmd`sm gí sí|jnm$
M |`ms n` }p` jkp`d `qj~j`dnh njbjope~mn` |msm s`ohdho`s em bhsgm dm~psme n` amcems
n` oj`s~h jdnjrjnph `~m ~`odhehkçm op`d~m ohd em r`d~mim n` }p` `e nj|hj~jrh n`mn}pjjojÿd ` jg|e`g`d~` pd gjosÿbhdh !jd~`ksmnh n`n` amo` mýh `d ~`eêbhdh z
hsn`dmnhs` |`shdme`* |hs eh }p` dh s`}pj`s` jdr`sjhd` mnjojhdme`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 38/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Dh hc~md~` em rhy dh ` ~md ùdjom h |`sgmd`d~` ohgh h~sm omsmo~`sç~jom eh opme
jg|ejom }p` em |s`ojjÿd n` `~` gê~hnh ` g`dhs$
Em p~jejymojÿd n` `~` gê~hnh `~í gí `q~`dnjnm `d j~`gm n` s`|p`~m |hs rhy z `do`d~sh n` m~`dojÿd n` eemgmnm ~`e`bÿdjom !omee o`d~`s* }p` `d `e ohd~she n` moo`h
bçjoh m `njbjojh h m s`n` z `}pj|h jdbhsgí~joh$
S`ohdhojgj`d~h n` bjsgm
@~m ~êodjom mdmejym em bjsgm gmdposj~m |msm ohdbjsgms em jn`d~jnmn n`e ppmsjh$ Omc` em
|hjcjejnmn n` }p` `qj~md ejk`sm rmsjmojhd` `d em bjsgm n` pdm |`shdm |`sh em
ohdj~`dojm os`mnm |hs `e ghrjgj`d~h dm~psme z em |sío~jom m eh emskh n`e ~j`g|h os`m pd
|m~sÿd s`ohdhojce` }p` amo` }p` |p`nm pms` |msm em jn`d~jbjomojÿd cjhgê~sjom$
@qj~`d nh rmsjmd~` m em ahsm n` jn`d~jbjoms m em |`shdm `kùd p bjsgm9
‣ Ohg|msmojÿd jg|e`9 ` ohdjn`sm `e ksmnh n` |ms`ojnh `d~s` nh bjsgm em
hsjkjdme z em }p` `~í j`dnh r`sjbjomnm$
‣ R`sjbjomojÿd njdígjom n` bjsgm9 ` s`mejym pd mdíejj n` em bhsgm em r`ehojnmn
em |s`jÿd n` em |epgm h cheçksmbh z em npsmojÿd n`e |sho`h n` bjsgm$ Dh `
ohdjn`sm jkdjbjom~jrm em bhsgm h `e m|`o~h n` em bjsgm jdh eh omgcjh `d em
r`ehojnmn z em |s`jÿd }p` hopss`d npsmd~` `e |sho`h zm }p` ÿeh `e bjsgmd~`hsjkjdme |p`n` s`|shnpojs `~m omsmo~`sç~jom$
Em bjsgm ` z am jnh npsmd~` gpoah mýh pdm n` em ~êodjom gí amcj~pme` n`
jn`d~jbjomojÿd n` em |`shdm ` |hs `eeh }p` khym n` pdm ksmd mo`|~mojÿd `d~s` em
ojpnmnmdçm$
S`ohdhojgj`d~h n` `osj~psm n` ~`oemnh
@~m ~êodjom ` cmm `d em `qj~`dojm n` pd |m~sÿd n` `osj~psm `d ~`oemnh }p` `
|`sgmd`d~` z |sh|jh n` omnm jdnjrjnph$ N` `~` ghnh ` gjn` em bp`sym n` ~`oe`h emnpsmojÿd n` em |pemojÿd z `e |`sjhnh n` ~j`g|h }p` |mm `d~s` }p` ` |s`jhdm pdm ~`oem
z h~sm$
Em |sjdoj|me r`d~mim n` `~m ~êodjom ` }p` em jdr`sjÿd d`o`msjm `d `dhs` `
|sío~jomg`d~` dpem zm }p` eh ~`oemnh n` hsn`dmnhs `~íd |s``d~` `d gùe~j|e`
m|`o~h n` dp`~sm rjnm oh~jnjmdm z mn`gí `~íd me~mg`d~` mo`|~mnh |hs em
|hcemojÿd }p` amo` ph n` `eeh m njmsjh$ N` `~` ghnh eh oh~h n` jg|emd~mojÿd `
o`d~smsçmd `d `e hb~{ms` $
Dh hc~md~` `e |m~sÿd n` `osj~psm |p`n` r`s` mb`o~mnh |hs m|`o~h ohgh `e djr`e n`bm~jkm `~sê nj~smoojÿd |h~psm n`e ppmsjh z n`e ~`oemnh$ ^mgcjêd ` n`c` ~`d`s `d
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 39/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ?: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
op`d~m em |hcemojÿd }p` dh `~í amcj~pmnm me ph n` ~`oemnh z opzh |m~sÿd n` `osj~psm
` ghnjbjomsçm sí|jnmg`d~` m ompm n`e m|s`dnjymi`$
Mnjojhdmeg`d~` m p ph ohgh gê~hnh n` mp~`d~jomojÿd ~mgcjêd |p`n` `s `g|e`mnh|msm em ghdj~hsjymojÿd$ N` `~m gmd`sm ` |hnsçm |s`r`djs `e ph dh mp~hsjymnh n`
~`sgjdme` dh p|`srjmnh mç ohgh hc~`d`s `rjn`dojm n` mpnj~hsçm$
S`ohdhojgj`d~h n` em bhsgm n` mdnms
@~` gê~hnh ~hgm ohgh s`b`s`dojm em bhsgm n` omgjdms n` pdm |`shdm$ @~` mo~h `
ksmcm z ` hg`~` m pd |sho`h mdmeç~joh }p` k`d`sm pdm |emd~jeem cjhgê~sjom ùdjom
n`sjrmnm n` njoah ohg|hs~mgj`d~h$ @e nj|hj~jrh n` om|~psm ` pdm oígmsm `~ídnms |hs
eh }p` dh ` s`}pj`s` pdm ksmd jdr`sjÿd$ Mnjojhdmeg`d~` `~` j~`gm |`sgj~` em
jn`d~jbjomojÿd m nj~mdojm$
Jep~smojÿd ;9 S`ohdhojgj`d~h n` em bhsgm n` mdnms
@~m ~`odhehkçm `~í ~hnmrçm `d n`mssheeh z dh am meomdymnh mùd eh djr`e` n`
s`dnjgj`d~h d`o`msjh |msm `s jg|emd~mnm n` gmd`sm jgjems me s`~h n` ~`odhehkçm
cjhgê~sjom
?$> OHG\MSM^JRM N@ ^ÊODJOM_ Z ^@ODHEHKÇM_ CJHGÊ^SJOM_
Em ~`odhehkçm cjhgê~sjom `ýmemnm ohg|ms~`d `d p gmzhsçm `e gjgh hci`~jrh$ @
|hs `eeh }p` |p`n` `~mce`o`s` pdm ohg|msmojÿd `d~s` `eem `d bpdojÿd n` njb`s`d~`
m|`o~h }p` ` n`osjcjsíd m ohd~jdpmojÿd jn`d~jbjomdnh |msm omnm pdh n` `eeh em
~`odhehkçm }p` gí n`~momd z em }p` g`dh n`mssheemnm `~íd$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 40/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
?$>$= Osj~`sjh n` `rmepmojÿd
Eh |msíg`~sh p~jejymnh |msm `rmepms pdm ~`odhehkçm cjhgê~sjom jdoepz`d9
‣ Ksmnh n` mo`|~mojÿd9 Nj|hjojÿd n` eh ppmsjh m p~jejyms pdm ~`odhehkçmcjhgê~sjom$ @~` bmo~hs `~í s`emojhdmnh ohd eh jd~spjrm }p` ` ohdjn`s` pdm
~êodjom |hs |ms~` n` eh jdnjrjnph$ @ d`o`msjh m p r`y ohdjn`sms eh bmo~hs`
hojme` z ope~psme` }p` |p`n`d p|hd`s }p` pdm ~êodjom `md gí mo`|~mnm
h g`dh mo`|~mnm `d bpdojÿd n`e `d~hsdh nhdn` ` jg|emd~`d$
‣ S`j~`dojm me bsmpn`9 Om|mojnmn n`e j~`gm n` n`~`o~ms z n``oams eh
jd~`d~h n` mp~`d~jomojÿd |hs |ms~` n` ppmsjh dh mp~hsjymnh mç ohgh n`
|s`r`djs em dh jn`d~jbjomojÿd |hs |ms~` n` ppmsjh }p` |s`~`dn`d dh `s
s`ohdhojnh$
‣ G`dpsmcjejnmn9 N`~`sgjdm em om|mojnmn n` mn}pjjojÿd z g`njojÿd |s`ojm n`
em omsmo~`sç~jom |s``d~` `d em gp`~sm ohdjn`smdnh m p r`y em bmojejnmn
`d p om|~psm me p~jejyms` |s`b`sjce`g`d~` gê~hnh dh jd~spjrh |msm eh
ppmsjh$
‣ Ohg|hs~mgj`d~h9 \s`ojjÿd n` s`ohdhojgj`d~h }p` hbs`o` pdm ~êodjom
cjhgê~sjom$ _p`e` g`ihsms `kùd pdm ~êodjom rm gmnpsmdnh$
‣ \`sgmd`dojm9 Omsmo~`sç~jom }p` n`~`sgjdm `e ksmnh n` rmsjmojÿd n` pd smkhcjhgê~sjoh m eh emskh n`e ~j`g|h$ M pdm g`dhs rmsjmojÿd e` ohss`|hdn` pdm g`ihs
rmehsmojÿd `d opmd~h m em |`sgmd`dojm$
‣ Pdjojnmn9 @ em omsmo~`sç~jom }p` n`~`sgjdm em njb`s`dojmojÿd `d~s` jdnjrjnph$
Opmd~h gmzhs ` em pdjojnmn n` eh smkh s`ohkjnh gí njbçoje s`pe~m `dohd~sms
nh |`shdm }p` opzm gp`~sm cjhgê~sjom `md jkpme` z |hs eh ~md~h ` gí
`dojeeh njo`sdjs `d~s` eh ppmsjh$
‣ Pdjr`smejnmn9 ^hnh jdnjrjnph }p` rmzm m amo`s ph n` em ~`odhehkçm am n`|h``s em omsmo~`sç~jom cjhgê~sjom `rmepmnm$ Opmd~h gmzhs `m em pdjr`smejnmn
n` em omsmo~`sç~jom mdmejymnm gmzhs dùg`sh n` |`shdm |hnsí p~jejymsem$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 41/100
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 42/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >3 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
^`odhehkçm R`d~mim Jdohdr`dj`d~`
S`ohdhojgj`d~h n` jsj‣
\m~shd` gpz ohg|e`ih‣ Pdjojnmn gpz me~m‣ Me~h ksmnh n` |`sgmd`dojm
‣ Oh~` n` jg|emd~mojÿd
me~h‣ G`dhs ksmnh n`
mo`|~mojÿd
S`ohdhojgj`d~h n` s`~jdm ‣ Pdjojnmn gpz me~m‣ Me~h ksmnh n` |`sgmd`dojm
‣ \s`ojm n` ~h~meohemchsmojÿd n`eppmsjh
S`ohdhojgj`d~h n` emk`hg`~sçm n` em gmdh
‣ Me~h ksmnh n` |`sgmd`dojm‣ Bmojejnmn n` ph
‣ Pdjojnmn ejgj~mnm
S`ohdhojgj`d~h n` bjsgm ‣ Cp`dm mo`|~mojÿd‣ Bmojejnmn n` ph
‣ Njbjope~mn n` om|~psm|hs omgcjh n`|hjojÿd
S`ohdhojgj`d~h n` `osj~psmn` ~`oemnh
‣ Dh s`}pj`s` jdr`sjÿd `dnj|hj~jrh‣ \hjcjejnmn n` s`mejyms
ghdj~hsjymojÿd
‣ ^`odhehkçm `g`sk`d~`
?$>$? Ksmnh n` gmnps`y
@e ksmnh n` gmnps`y ` `e djr`e n` `q|`sj`dojm }p` |s``d~md em ~`odhehkçm cjhgê~sjom
~md~h `d em jdr`~jkmojhd` n`mssheemnm ohgh `d `e g`somnh mo~pme$
Em ap`eem nmo~jems ` em ~`odhehkçm n`~momnm `d `~` m|`o~h n`cjnh m }p` ` em gí
r`~`smdm n` em `qj~`d~`$ @ |hs `eeh }p` ` em ~êodjom hcs` em }p` gí ` am
jdr`~jkmnh z em }p` ee`rm gí ~j`g|h `d `e g`somnh$ @~h am |`sgj~jnh pd ksmd n`mssheeh
~md~h n` p hb~{ms` ohgh n` p amsn{ms` z ~j`d` ohgh ohd`op`dojm pdm njgjdpojÿd
n` p oh~`$
@e s`ohdhojgj`d~h n` jsj ` h~sm n` em ~`odhehkçm gí gmnpsm mpd}p` e`ih n`e djr`e
|s``d~mnh |hs em ap`eem nmo~jems$ @d ohdos`~h ` `dop`d~sm gí n`mssheemnm `d `e ís`m
n` em jdr`~jkmojÿd ~`dj`dnh pd g`dhs s`ohssjnh `d `e g`somnh$ @~h ` n`c` m }p` p
oh~` mpd ` ohdjn`sm `e`rmnh eh }p` njbjope~m p `q|mdjÿd$
\hs h~sh emnh em ~`odhehkçm g`dh gmnpsm mo~pmeg`d~` hd m}p`eem }p` `
`dop`d~smd `d pd `~mnh n` jdr`~jkmojÿd ~`g|smdh$ @d~s` `eem |hn`gh n`~moms9
s`ohdhojgj`d~h n` em bhsgm n` mdnms h s`ohdhojgj`d~h n` `osj~psm n` ~`oemnh$
@~m ~êodjom ~j`d`d gpoah gmsk`d n` g`ihsm `d `e omg|h n` em jdr`~jkmojÿd me `s n`
s`oj`d~` m|msjojÿd$
?$>$> Jg|emd~mojÿd `d `e g`somnh
M ohd~jdpmojÿd ` gp`~sm pd ksíbjoh }p` n`~meem em |s``dojm }p` ~j`d`d em njb`s`d~`
~êodjom `d `e g`somnh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 43/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Ksíbjoh >9 Ksmnh n` jg|emd~mojÿd `d `e g`somnh
Bp`d~`9 O`d~sme Jd~j~p~` hb ^`oadhehkz hb Fhfsmiams !3<=<*
Ohgh ` |p`n` hc`srms em ap`eem nmo~jems ~mgcjêd ` em ~`odhehkçm gmzhsj~msjm `d eh
}p` ` s`bj`s` m jg|emd~mojÿd `d `e g`somnh cjhgê~sjoh mcmsomdnh gí n` em gj~mn n`e
gjgh$ @~h ` ohd`op`dojm n` p me~h ksmnh n` gmnps`y }p` jg|ejom pd oh~` g`dhs$
@e s`ohdhojgj`d~h bmojme ` `dop`d~sm `d `kpdnh epkms mpd}p` gpz me`imnh n` em
|sjg`sm |hjojÿd$ Em jdoepjÿd n` pdm bh~hksmbçm n` em omsm n`e jdnjrjnph `d em gmzhsçm n`
nhopg`d~h n` jn`d~jbjomojÿd ` pd bmo~hs }p` am bmojej~mnh p jg|emd~mojÿd$
\hs h~sh emnh z ohd m|`dm |s``dojm `d `e g`somnh ` j~ùm `e s`ohdhojgj`d~h n`
`osj~psm n` ~`oemnh$ Mnjojhdmeg`d~` omc` n`~moms em mp`dojm n` hepojhd`
s`emojhdmnm ohd `e s`ohdhojgj`d~h n` s`~jdm$
?$>$0 S`emojÿd oh~`'c`d`bjojh
Pd m|`o~h s`e`rmd~` m ~`d`s `d op`d~m m em ahsm n` `rmepms pdm ~`odhehkçm cjhgê~sjom `
`e c`d`bjojh }p` em gjgm |p`n` m m|hs~ms `d ohd~sm|hjojÿd me oh~` }p` p|hd` p
mnh|ojÿd$
@d `~` `d~jnh `qj~`d njr`sm ~`odhehkçm opzh oh~` n` jg|emd~mojÿd dh ` gpz
`e`rmnh$ \hs pd emnh `~í em ap`eem nmo~jems% n`cjnh m p me~h ksmnh n` gmnps`y$ \hs h~sh
emnh `~íd ~êodjom ohgh `e s`ohdhojgj`d~h bmojme `e s`ohdhojgj`d~h n` rhy h `e
s`ohdhojgj`d~h n` `osj~psm n` ~`oemnh }p` dh |emd~`md em d`o`jnmn n` mn}pjsjs pd
nj|hj~jrh n` om|~psm n` gp`~sm `|`oçbjoh$
Dh hc~md~` `d em s`emojÿd oh~`'c`d`bjojh ~mgcjêd ` s`e`rmd~` `rmepms em osj~jojnmn n`e
j~`gm }p` rm m `s |sh~`kjnh g`njmd~` cjhg`~sçm$ @ |hs `eeh }p` pd me~h oh~` |p`n`
Ap`eem nmo~jems
01%
S`ohdhojgj`d~h
n` jsj=>%
S`ohdhojgj`d~h
n` bjsgm
=3%
S`ohdhojgj`d~h
bmojme
;%
K`hg`~sçm n` em
gmdh
0%
S`ohdhojgj`d~h
n` rhy
?%
S`ohdhojgj`d~hn` `osj~psm n`e
~`oemnh
=%
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 44/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
`~ms ip~jbjomnh |hs `e c`d`bjojh hc~`djnh ohd pdm mp~`d~jomojÿd n` me~m `kpsjnmn$ @d
`~` m|`o~h n`~mom `e s`ohdhojgj`d~h n` jsj$
Ohgh ohdoepjÿd ` |p`n` jdnjoms }p` `~` |msíg`~sh ` rmsjmce`$ @e hci`~jrh n` ph n`ej~`gm ` `e }p` gmsomsí `e c`d`bjojh m ohd`kpjs z `d bpdojÿd n` `~h ` n`ojnjsí `e
oh~` mpgjce`$ Em |sh|hsojhdmejnmn `d~s` em d`o`jnmn n` em `d~jnmn z em `kpsjnmn
m|hs~mnm |hs em hepojÿd bpdnmg`d~me$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 45/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
> MDÍEJ_J_ N@ EH_ \SHO@_H_ N@ JN@D^JBJOMOJßD
>$= MDÍEJ_J_ N@ EM_ ^ÊODJOM_ M\EJOMNM_ Z ^J\H_ N@ JN@D^JBJOMOJßDEm ~`odhehkçm cjhgê~sjom psk`d ohgh me~`sdm~jrm z(h ohg|e`g`d~h m em ~êodjom n`
jn`d~jbjomojÿd z mp~`d~jomojÿd zm `qj~`d~`$ \hs `eeh ` |hjce` `~mce`o`s pdm
ohg|msmojÿd njs`o~m `d~s` mgcm n`~momdnh c`d`bjojh }p` s`pe~md n`e ph n`
cjhg`~sçm ipd~h ohd m|`o~h `d eh }p` em ~êodjom ~smnjojhdme` hd p|`sjhs`$
_` amd n` ohdjn`sms eh jkpj`d~` m|`o~h9
‣ D`o`jnmn n` `os`~h9 Em ohd~sm`ým amd n` hope~ms` z em ~msi`~m dh n`c`d
n` `~ms me meomdo` n` ~`so`sh gj`d~sm }p` em cjhg`~sçm dh s`}pj`s` n` `~m
g`njnm n` |sh~`oojÿd }p` hd `qoepjrmg`d~` n`|`dnj`d~` n`e ppmsjh$
‣ \hjcjejnmn n` shch9 Em ~msi`~m z ohd~sm`ým |p`n`d `s shcmnm$ _jd
`gcmskh shcms pd smkh cjhgê~sjoh ` `q~s`gmnmg`d~` ohg|e`ih$
‣ \hjcjejnmn n` |êsnjnm9 Em ohd~sm`ým hd bíojeg`d~` herjnmce` z em ~msi`~m
` |p`n`d |`sn`s$ Eh smkh cjhgê~sjoh |`sgmd`o`d jdrmsjmce` merh `d
ohd~mnm `qo`|ojhd` z j`g|s` `~íd ohd `e pi`~h m }pj`d jn`d~jbjomd$
‣
S`kj~sh jdjojme z |hjcjejnmn n` s`k`d`smojÿd9 Em bmojejnmn ohd em }p` `|p`n` `drjms pdm ohd~sm`ým h ~msi`~m dp`rm ohd~sm~m ohd em ohg|e`ijnmn }p`
p|hd` `e s`kj~sh `d pd j~`gm cjhgê~sjoh zm }p` s`}pj`s` n` em |s``dojm
bçjom n`e jdnjrjnph `d `~m bm`$ Amz }p` `ýmems }p` eh smkh cjhgê~sjoh hd
|hs n`bjdjojÿd ejgj~mnh gj`d~sm }p` em k`d`smojÿd n` ohd~sm`ým ` jejgj~mnm
eh opme ` pdm r`d~mim$
‣ \sho`h n` ohg|msmojÿd9 Em ohg|msmojÿd n` nh ohd~sm`ým ` pd |sho`h
`dojeeh$ _jd `gcmskh ohg|msms nh smkh cjhgê~sjoh s`}pj`s` n` gmzhs
om|mojnmn ohg|p~mojhdme$
‣ Ohghnjnmn n`e ppmsjh9 @e ppmsjh am n` g`ghsjyms pdm h gùe~j|e`
ohd~sm`ým z `d `e omh n` }p` p` pdm ~msi`~m am n` ee`rms` j`g|s` ohdjkh$
P~jejymdnh ~`odhehkçm cjhgê~sjom dh ` d`o`j~m amo`s ~h bp`syh$
‣ Rped`smcjejnmn md~` `e `|jhdmi`9 Pdm njos`~m rjkjemdojm n` dp`~sm mo~jrjnmn
|hnsçm `srjs |msm hc~`d`s dp`~sm ohd~sm`ým h shcms dp`~sm ~msi`~m$ @` gê~hnh
dh ` ríejnh md~` eh j~`gm cjhgê~sjoh$
‣
Rped`smcjejnmn m pd m~m}p` |hs bp`sym csp~m9 Em ohd~sm`ým ~j`d`d pdmehdkj~pn n` rmsjh omsmo~`s`$ \hs p |ms~` pdm gp`~sm cjhgê~sjom `g|e`m
oj`d~h n` cz~` eh }p` ohg|ejom gpoah eh m~m}p` |hs bp`sym csp~m$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 46/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ G`njnm n` |s`r`dojÿd9 Eh m~m}p` ohd~sm j~`gm |sh~`kjnh |hs ohd~sm`ým
h ~msi`~m ` |shnpo`d n`n` amo` mýh z em g`njnm n` |s`r`dojÿd ohd~sm `eeh
zm ` `dop`d~smd gmnpsm$ \hs `e ohd~smsjh eh m~m}p` m eh j~`gm
cjhgê~sjoh hd pd ís`m `d em }p` `~m g`njnm n` |s`r`dojÿd ` `~íd
k`d`smdnh `d `~h ghg`d~h$
‣ Mp~`d~jomojÿd n` ppmsjh ‑s`me`‚9 Em mp~`d~jomojÿd n` ppmsjh g`njmd~`
ohd~sm`ým h ~msi`~m z p `b`o~jrjnmn n`|`dn`d mchep~mg`d~` n` em rhepd~mn n`e
ppmsjh m em ahsm n` amo`sem |`shdme` ` jd~smdb`sjce`$ Em cjhg`~sçm `~í
me~mg`d~` s`emojhdmnm ohd `e |sh|jh ppmsjh |p` dh |p`n` `s |s`~mnm dj
ohg|ms~jnm$
‣ Oh~` n` jg|emd~mojÿd9 @d `e ghg`d~h n` em jg|emd~mojÿd `e a`oah n` jd~mpsmspd j~`gm n` ohd~sm`ým ~j`d` pd oh~` cmih gj`d~sm }p` `d `e omh n` pd
j~`gm cmmnh `d gp`~sm cjhgê~sjom ` gí oh~hh$
‣ Oh~` n` gmd~`djgj`d~h9 @e oh~` n` gmd~`djgj`d~h n` pd j~`gm cjhgê~sjoh
pdm r`y `~í jg|emd~mnh ohd êqj~h ` g`dhs me n` pd j~`gm n` ohd~sm`ým h
~msi`~m zm }p` dh ohdee`rm km~h n` k`~jÿd mhojmnh m em |êsnjnm p herjnh n`
os`n`dojme`$
M ohd~jdpmojÿd ` gp`~sm pdm ~mcem jep~sm~jrm jn`d~jbjomdnh `d }pê m|`o~h n`~mom
omnm gê~hnh n` mp~`d~jomojÿd9
^mcem 29 Ohg|msm~jrm cjhg`~sçm r Ohd~sm`ým(~msi`~m
M|`o~h Cjhg`~sçm Ohd~sm`ým(^msi`~m
D`o`jnmn n` _`os`~h
\hjcjejnmn n` shch
\hjcjejnmn n` |êsnjnm
Oh~` n` gmd~`djgj`d~h
S`kj~sh jdjojme z |hjcjejnmn n`s`k`d`smojÿd
\sho`h n` ohg|msmojÿd
Ohghnjnmn n`e ppmsjh
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 47/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
M|`o~h Cjhg`~sçm Ohd~sm`ým(^msi`~m
Rped`smcjejnmn md~` `e `|jhdmi`
Rped`smcjejnmn m pd m~m}p` |hsbp`sym csp~m
G`njnm n` |s`r`dojÿd
Mp~`d~jomojÿd n` ppmsjh‑s`me`‚
Oh~` n` jg|emd~mojÿd
>$3 _J_^@GM_ N@ MP^@D^JOMOJßD N@ NHCE@ BMO^HS
@e |shks`jrh mrmdo` n` em ~`odhehkçm cjhgê~sjom am p|p`~h `e |mh n` em bhsgm
jn`d~jbjomojÿd pdjghnme m j~`gm n` mp~`d~jomojÿd n` nhce` bmo~hs }p` |p`n`d ohgcjdms
`e ph n` em cjhg`~sçm ohd h~sh j~`gm ohgh ~msi`~m n` jn`d~jbjomojÿd h ohd~sm`ým h
jdohs|hsms gí n` pdm ~`odhehkçm cjhgê~sjom cjhg`~sçm cjghnme$
>$3$= Jd~`smoojÿd n` em cjhg`~sçm ohd h~sh j~`gm
Em mp~`d~jomojÿd n` nhce` bmo~hs ` em ohgcjdmojÿd n` nh ~êodjom n` jn`d~jbjomojÿd
njb`s`d~` |pnj`dnh `s pdm n` `eem opme}pj`s ~`odhehkçm$
@e |sjdoj|me hci`~jrh n` `~m ohgcjdmojÿd ` mpg`d~ms ohdjn`smce`g`d~` em `kpsjnmn z
s`npojs |hs ~md~h em |hjcjejnmn bsmpn`$
―@e bp~psh |mm |hs em p~jejymojÿd n` em nhce` jn`d~jbjomojÿd9 cjhgê~sjom z dh
cjhgê~sjom‗
@d em gmzhsçm n` eh omh |emd~`mnh |hs eh `q|`s~h `e j~`gm dh cjhgê~sjoh
`g|e`mnh ` pdm ~msi`~m n` jn`d~jbjomojÿd h pdm ohd~sm`ým$
‣ ^msi`~m n` jn`d~jbjomojÿd9 \hs dhsgm k`d`sme ` p~jejym |msm s`mejyms em
jn`d~jbjomojÿd n`e jdnjrjnph$ \h~`sjhsg`d~` ` pmsçm pdm ~`odhehkçm cjhgê~sjom
|msm r`sjbjomsem$ Em nj|hdjcjejnmn n` em ~msi`~m ` jdnj|`dmce` |msm em
mp~`d~jomojÿd$ @d mekpdh omh `e |sh|jh `dhs z em jdbhsgmojÿd cjhgê~sjom
`~íd jd~`ksmnh `d em ~msi`~m$
‣ Ohd~sm`ým9 Pmnm `d ohgcjdmojÿd ohd pd smkh cjhgê~sjoh m|hs~mdnh pdm
om|m `q~sm n` `kpsjnmn$
‣ Osj|~hksmbçm9 Em jd~`smoojÿd `d~s` em cjhg`~sçm z em osj|~hksmbçm ` pd ís`m n`
jdr`~jkmojÿd s`em~jrmg`d~` s`oj`d~` z ohd pd n`mssheeh jdoj|j`d~`$ @d em gmzhsçm
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 48/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
n` m|ejomojhd` mo~pme` em osj|~hksmbçm ` p~jejym |msm m`kpsms eh nm~h
cjhgê~sjoh$
‣ @d em mo~pmejnmn em ohgcjdmojÿd n` ~êodjom cjhgê~sjom z ohdr`dojhdme` zm ``~í m|ejomdnh |hs `i`g|eh mekpdm Mngjdj~smojhd` \ùcejom p~jejymd `e
s`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh pgmnh me ph n` pd \JD |msm `e
ohd~she ahsmsjh$
>$3$3 A`ssmgj`d~m cjhgê~sjom cjghnme`
Pd j~`gm cjhgê~sjoh cjghnme ` m}p`e }p` p~jejym nh ~êodjom nj~jd~m |msm em om|~psm
n` smkh cjhgê~sjoh$ @~m ojsopd~mdojm p|hd` em p~jejymojÿd n` nh `dhs` n`
s`ohdhojgj`d~h z p ohss`|hdnj`d~` j~`gm n` r`sjbjomojÿd ohd `e ohdjkpj`d~`
mpg`d~h n` em `kpsjnmn }p` `~h p|hd`$
@~m `~spo~psm g`ihsmnm ` m|shr`oam n` em r`d~mim }p` m|hs~m omnm ~êodjom z `
|p`n` p~jejyms |msm p|`sms mekpdm n` em ejgj~mojhd` n` pd j~`gm cjhgê~sjoh ùdjoh$
Ohgh `i`g|eh n` ejgj~mojhd` n`~moms }p` ` `~jgm }p` pd |`}p`ýh |hso`d~mi` n` em
|hcemojÿd dh ~j`d` ap`eem nmo~jems` e`kjce` em rhy |p`n` `s me~`smnm |hs pd s`bsjmnh z
eh j~`gm n` s`ohdhojgj`d~h bmojme hd po`|~jce` m eh omgcjh `d em epy mgcj`d~me
h em mo~j~pn n`e pi`~h$
Pd j~`gm cjghnme }p` ohgcjd` em ohdoepjhd` hc~`djnm ~sm em p~jejymojÿd n` nh~êodjom njb`s`d~` |p`n` p|`sms gpoah n` `~h jdohdr`dj`d~`$ Mnjojhdmeg`d~` em
ohgcjdmojÿd n` nh bmo~hs` p|hd` pd mpg`d~h jkdjbjom~jrh n` em `kpsjnmn z n` em
s`j~`dojm me bsmpn`$
Pd j~`gm cjghnme |hnsçm `s |hs `i`g|eh pdm ohgcjdmojÿd n` r`sjbjomojÿd n` ap`eem
njkj~me` z s`ohdhojgj`d~h bmojme$ @~` ~j|h n` j~`gm `~í j`dnh pmnh mo~pmeg`d~` `d
`e ohd~she bshd~`sjyh n` rmsjh m`sh|p`s~h `|mýhe`$
>$3$? Rmehsmojÿd n` em mp~`d~jomojÿd n` nhce` bmo~hs
Mgch |sho`h n` mp~`d~jomojÿd n` nhce` bmo~hs }p` jdoepz`d em cjhg`~sçm p|hd`d pdm
`rhepojÿd s`|`o~h m eh j~`gm pdjghnme` `qj~`d~`$ @e ph n` em mp~`d~jomojÿd n`
nhce` bmo~hs |s``d~m m|`o~h r`d~mihh ` jdohdr`dj`d~`$
@d~s` em r`d~mim omc` n`~moms9
j* @e c`d`bjojh bpdnmg`d~me n` em p~jejymojÿd n` nh bmo~hs` n` mp~`d~jomojÿd ` `e
mpg`d~h n` em `kpsjnmn ehksmnh$ @~` m|`o~h zm ` ohdjkp` `g|e`mdnh pd heh
bmo~hs cjhgê~sjoh |`sh me jd~shnpojs h~sh bmo~hs ` |h~`dojm dh~mce`g`d~` me jdoepjs
pdm om|m n` `kpsjnmn mnjojhdme$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 49/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm >: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
jj* Em s`j~`dojm me bsmpn`
jjj* Em
}p` |s``d~md `~h j~`gm ~mgcjêd s`pe~m s`bhsymnm
zm }p` pd jdnjrjnph dh mp~hsjymnh am n` cpsems mgch ohd~she` |msm |hn`s
moo`n`s me j~`gm h jd~memojÿd }p` ` |sh~`k`$
rped`smcjejnmn` z mg`dmym m em }p` `~í `q|p`~h `e j~`gm ` s`npo`d
jr* @d `e omh n`e ph n` ~msi`~m n` jn`d~jbjomojÿd ` |p`n` jdoepjs em jdbhsgmojÿd
cjhgê~sjom `d em gjgm |hs eh }p` em r`sjbjomojÿd dh ` ~`dnsí }p` amo`s s`|`o~h
m pdm cm` n` nm~h s`gh~m jdh s`|`o~h m em |sh|jm ~msi`~m$ @~h jg|ejom pd
zm }p` `d gpoah omh pdh n` eh bmo~hs` mo~ùm ohgh ohd~she gj~jkmd~` n`e
h~sh$
mpg`d~h n` em `bjoj`dojm z n` em |sjrmojnmn n` eh nm~h |`shdme`
Dh hc~md~` em mp~`d~jomojÿd n` nhce` bmo~hs |s``d~m oj`s~h jdohdr`dj`d~` ohgh hd9
n`e ppmsjh$
j* Em jg|emd~mojÿd n` pd nhce` bmo~hs n` mp~`d~jomojÿd jg|ejom pd mpg`d~h n` oh~`
jj* _j cj`d pdh n` eh c`d`bjojh |sjdoj|me` n` em p~jejymojÿd n` j~`gm n`
s`ohdhojgj`d~h cjhgê~sjoh ` `e mahssh n` oh~` bs`d~` me gmd~`djgj`d~h n`
ohd~sm`ým z ~msi`~m opmdnh ohgcjdmgh em cjhg`~sçm z pdh n` `~h nh
bmo~hs` `m
n`e j~`gm$
jjj* Em jd~`smoojÿd n` em cjhg`~sçm ohd h~sh j~`gm jg|ejom }p` dh nj|hd`s n` em
ohd~sm`ým h ~msi`~m jg|hjcjej~` em mp~`d~jomojÿd$ @~h ohdee`rm pdm
njgjdpojÿd n` oh~` ` jd`qj~`d~`$
s`npoojÿd n`
em ohghnjnmn n`e ppmsjh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 50/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
0 C@D@BJOJH_ N@ EM P^JEJYMOJßD N@ EM_
^@ODHEHKÇM_ CJHGÊ^SJOM_
Eh `q|`s~h ohdpe~mnh ohjdojn`d `d }p` |msm em s`mejymojÿd n` pd mdíejj n` eh
c`d`bjojh n` em ~`odhehkçm cjhgê~sjom n`c`d ohdjn`sms` njb`s`d~` bmo~hs` ohgh p
bjdmejnmn dùg`sh `~jgmnh n` ppmsjh ~êodjom cjhgê~sjom `g|e`mnm `d~hsdh n`
ohdbjmdym h n`ohdbjmdym nhdn` ` `dop`d~sm `~o$ @ |hs `eeh }p` n`c` s`mejyms` pd
mdíejj n`~meemnh omh m omh |msm mc`s j s`meg`d~` s`pe~msçm s`d~mce` p mnh|ojÿd$
―Em jdr`sjÿd `ohdÿgjom }p` p|hd` em jg|emd~mojÿd n` em ~`odhehkçm
cjhgê~sjom |p`n` `s pdh n` eh |sjdoj|me` jdohdr`dj`d~` `d p n`mssheeh‗
Em jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom ohdee`rm pd ohdipd~h n` c`d`bjojh ~md~h |msm
`d~jnmn` |ùcejom z |sjrmnm ohgh |msm eh ppmsjh bjdme`$
0$= \MSM EM_ @D^JNMN@_ P_PMSJM_
\msm eh njb`s`d~` `q|`s~h em ksmdn` hskmdjymojhd` n`c`d p|hd`s `e |sjdoj|me
gh~hs }p` |shgp`rm ` jdrj`s~m `d `e n`mssheeh n` em ~`odhehkçm cjhgê~sjom$
―Em cjhg`~sçm% ~`odheÿkjomg`d~`% `~í pbjoj`d~`g`d~` gmnpsm% mahsm `
bpdojÿd n` em ksmdn` ohs|hsmojhd ohg`dyms m hbs`o s `srjojh cmídnh`
`d eh c`d`bjojh }p` m|hs~m‗
\msm }p` `~h hopssm eh c`d`bjojh |h~`dojme` m hc~`d`s ohd p jg|emd~mojÿd amd n` `s
oemsh z s`e`rmd~`$ M ohd~jdpmojÿd ` n`osjc`d eh gí n`~momnh9
0$=$= Mpg`d~h n` em `kpsjnmn
_jd npnm eh `d~s`rj~mnh ohjdojn`d `d }p` pdm n` em r`d~mim gí jg|hs~md~` n` em
p~jejymojÿd n` ~êodjom cjhgê~sjom |msm em mp~`d~jomojÿd n` ppmsjh ` }p` kmsmd~jymd
}p` em |`shdm ` }pj`d njo` `s ` n`ojs }p` eh smkh cjhgê~sjoh ` `dop`d~smd
`qoepjrmg`d~` ejkmnh m p e`kç~jgh ppmsjh$
G`njmd~` `e shch n` os`n`dojme` mi`dm pd jdnjrjnph |p`n` moo`n`s m yhdm
s`~sjdkjnm h s`mejyms h|`smojhd` dh |`sgj~jnm jdope|mdnh m ~`so`sh$ Mjgjgh `
|hjce` }p` `~m os`n`dojme` ` ohg|ms~md rhepd~msjmg`d~` `d~s` `g|e`mnh$
^md~h `e shch ohgh em p~jejymojÿd |hs |ms~` n` rmsjh ppmsjh n` em gjgm os`n`dojme`
p|hd`d pdm ksmr` cs`oam `d em `kpsjnmn `d em `d~jnmn` }p` |p`n` `s `rj~mnm$ M
~smrê n` em jg|e`g`d~mojÿd n` j~`gm cjhgê~sjoh ` mpg`d~m em `kpsjnmn
s`npoj`dnh em |shcmcjejnmn n` }p` mekpj`d dh mp~hsjymnh moo`nm m yhdm h m m|ejomojhd`
s`~sjdkjnm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 51/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
0$=$3 S`npoojÿd n` oh~` n` gmd~`djgj`d~h
_j cj`d em ~êodjom ~smnjojhdme` ‟ohgh `e ph n` ohd~sm`ým h ~msi`~m n`
jn`d~jbjomojÿd‟ s`}pj`s`d pdm jdr`sjÿd gpz cmim `d p jg|emd~mojÿd dh hc~md~`
ohdee`rmd oh~` `e`rmnh mhojmnh m p k`~jÿd njmsjm$ @~m ` em ohd`op`dojm n` pdh
n` eh sj`kh gí `rjn`d~` mhojmnh m `~` ~j|h n` gê~hnh n` mp~`d~jomojÿd9 em
|hjcjejnmn n` }p` em os`n`dojme` `md |`snjnm shcmnm p herjnmnm$
―@e ph n` em cjhg`~sçm jg|ejom pd mahssh n` ~j`g|h% pdm s`npoojÿd n` oh~`
n` gmd~`djgj`d~h z pd mpg`d~h n` em `kpsjnmn‗
_jd `gcmskh `d `e omh n` em ~`odhehkçm cjhgê~sjom ‟nhdn` em jdr`sjÿd jdjojme |p`n`
ee`kms m `s `e`rmnm `d `e omh n` }p` `m d`o`msjh ohg|sms nj|hj~jrh h hb~{ms` n`
mn}pjjojÿd z |sho`mgj`d~h n` gp`~sm‟ pdm r`y em ~`odhehkçm `~í `d bpdojhdmgj`d~hz p ppmsjh moh~pgcsmnh m pmsem `e oh~` n` gmd~`djgj`d~h ` gpz s`npojnh zm
}p` dh ` nmd eh sj`kh md~`sjhsg`d~` s`b`sjnh$
@~` c`d`bjojh ` gí dh~mce` `d em ~`odhehkçm opzh oh~` n` jg|emd~mojÿd dh ` gpz
me~h ohgh em ap`eem nmo~jems `e s`ohdhojgj`d~h n` rhy `e s`ohdhojgj`d~h bmojme h `e
s`ohdhojgj`d~h n` `osj~psm n` ~`oemnh$
0$=$? Mpg`d~h n` em `bjoj`dojm
Dh n`c`gh herjnms }p` em s`mejymojÿd n` eh njb`s`d~` |sho`h n` mp~`d~jomojÿd
ohd~she n` moo`h ` jn`d~jbjomojÿd g`njmd~` ~êodjom dh cjhgê~sjom p|hd` `d
homjhd` pdm jdr`sjÿd `qo`jrm n` ~j`g|h$ M r`o` mpd}p` `e |sho`h nps` |hoh
`kpdnh j ` s`mejymnh |hs pd ksmd dùg`sh n` ppmsjh `d pd ohs~h |`sçhnh n` ~j`g|h
|p`n` s`pe~ms me~mg`d~` jd`bjoj`d~`$ @~h po`n` |hs `i`g|eh `d eh moo`h m ksmdn`
`njbjojh n` hbjojdm h `d `e ohd~she bshd~`sjyh n` pd m`sh|p`s~h `d ahsm n` gíqjgm
mbep`dojm$
Ohgh ` |p`n` hc`srms `d eh nh omh n` êqj~h mdmejymnh `d `e |s``d~` `~pnjh
g`njmd~` em `e`oojÿd n` em ~`odhehkçm cjhgê~sjom gí mn`opmnm |msm eh njb`s`d~` omh
z em d`o`msjm bhsgmojÿd n` eh ppmsjh !pdm dhojhd` cíjom n` p~jejymojÿd* ` |p`n`mpg`d~ms ohdjn`smce`g`d~` em `bjoj`dojm n` eh |sho`h ohd `e ohdjkpj`d~` c`d`bjojh
`ohdÿgjoh s`pe~md~` |msm em `d~jnmn$
0$=$> S`npoojÿd n`e bsmpn` jd~`sdh
Pdh n` eh gê~hnh gí amcj~pme` n` ohg`~`s bsmpn` jd~`sdh `d `g|s`m z `d
hskmdjgh |ùcejoh ` em jg|p~mojÿd n` ahsm n` ~smcmih jd`qj~`d~` `d mekpdh omh
dh `~mdnh ~md j}pj`sm `e `g|e`mnh bçjomg`d~` `d em jd~memojhd` n` em `d~jnmn$ \msm
`eeh ` |p`n`d m|hzms `d ohg|mý`sh }p` ―bjoamd‗ `d p epkms$ Ohgh ohd`op`dojm n`
`eeh em `g|s`m `~msçm s`gpd`smdnh me `g|e`mnh |hs pdm ahsm n` ~smcmih }p` `ds`mejnmn dh am s`mejymnh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 52/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 03 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
@~m j~pmojÿd momss`m |êsnjnm `ohdÿgjom mç ohgh |hjce` |`sipjojh m em jgmk`d
ohs|hsm~jrm$ @e ph n` ~`odhehkçm cjhgê~sjom |msm `e ohd~she ahsmsjh n` eh `g|e`mnh
|p`n` mzpnms m |s`r`djs `~` ~j|h n` bsmpn` r`sjbjomdnh g`njmd~` njb`s`d~` gê~hnh
~md~h `e ~j`g|h n` ~smcmih jg|p~mnh ohgh }p` `e ~smcmimnhs }p` s`kj~sm p `d~smnm `
s`meg`d~` }pj`d njo` `s$
0$=$0 G`ihsm n` jgmk`d ohs|hsm~jrm
Em jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom ohd~sjcpz` m }p` pdm `g|s`m `m gí
`bjoj`d~` gí `kpsm z s`npyom `e bsmpn` jd~`sdh$
―Em jg|emd~mojÿd n` cjhg`~sçm p|hd` pdm g`ihsm n` jgmk `d n` em `kpsjnmn
n` pdm d~jnmn‗
@ |hs `eeh }p` pgmnh m ~hnm em r`d~mim n`osj~m md~`sjhsg`d~` ` |shnpo` pdm
jg|hs~md~` g`ihsm `d em h|jdjÿd k`d`sme hcs` em ohg|mýçm$ Mç gjgh ` mhojmsçm em
`d~jnmn ohd em jddhrmojÿd em jdr`sjÿd `d jdr`~jkmojÿd z n`mssheeh z em m|p`~m |hs
~`odhehkçm |pd~`sm$
0$=$2 Hb`s~m n` dp`rh `srjojh
@e n`mssheeh n` em eçd`m n` jdr`~jkmojÿd }p` mo~pmeg`d~` ` `~íd ee`rmdnh m omch `d
~hsdh m em cjhg`~sçm |p`n` s`pe~ms `d em hb`s~m n` dp`rh `srjojh `d pd bp~psh o`somdh$
@~h `srjojh mcmsomd njr`sm m|ejomojhd` `d `e `o~hs mdj~msjh `e |mkh g`njmd~`
nj|hj~jrh gÿrje` ohd~she |ms`d~me rjn`hrjkjemdojm ~o$
0$3 \MSM EH_ P_PMSJH_ BJDME@_
Eh ppmsjh bjdme` ~mgcjêd ` r`d bmrhs`ojnh |hs em jg|emd~mojÿd n` ~`odhehkçm
cjhgê~sjom$ Em `q|`sj`dojm n` eh |shb`jhdme` `d~s`rj~mnh ~md~h n`n` `e |pd~h n`
rj~m n` ppmsjh ohgh n` |shr``nhs` n` j~`gm cjhgê~sjoh e` ee`rm m n`~moms eh
jkpj`d~` c`d`bjojh |msm eh }pj`d` p~jejymd amcj~pmeg`d~` `~h j~`gm$
0$3$= Mpg`d~h n` em ohghnjnmn
Em p~jejymojÿd n` ~êodjom cjhgê~sjom `d |sho`h n` jn`d~jbjomojÿd mp~`d~jomojÿd z
ohd~she n` moo`h p|hd` pd mpg`d~h ohdjn`smce` n` ohghnjnmn |msm eh
ppmsjh `d em s`mejymojÿd n` `~m ~ms`m$
―Em dh d`o`jnmn n` s`ohsnms ohd~sm`ým ` pdm n` em ksmdn` r`d~mim n`
em cjhg`~sçm% `|`ojmeg`d~` n`n` `e |pd~h n` rj~m n` em ohghnjnmn |msm `e
ppmsjh‗
@e `g|e`h n` ~`odhehkçm cjhgê~sjom `ejgjdm em d`o`jnmn n` s`ohsnms gùe~j|e`
ohd~sm`ým }p` |hs `kpsjnmn ` n`c`d omgcjms omnm ohs~h |`sjhnh n` ~j`g|h$ @d `~``d~jnh `e ppmsjh ~mg|hoh ` ~`dnsí }p` |hd`s `d ohd~mo~h merh `qo`|ojhd` ohd `e
`srjojh n` h|hs~` jdbhsgí~joh h n` m~`dojÿd me oej`d~` |msm s`~mpsms p os`n`dojme`
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 53/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
n`cjnh me herjnh n` ohd~sm`ým dj n`c`sí `q~s`gms em |s`ompojhd` |msm |s``srms em
|sjrmojnmn n` em gjgm$ N`e gjgh ghnh ~mg|hoh e` s`pe~msí d`o`msjh ee`rms ohdjkh
djdkpdm ~msi`~m n` jn`d~jbjomojÿd `d ~hnh ghg`d~h dj `qj~jsí `e sj`kh n` |`sn`sem h n`
}p` ` nmý`$
0$3$3 S`npoojÿd n` ~j`g|h n` `|`sm
Em jn`d~jbjomojÿd z ohd~she n` moo`h s`mejymnh |hs gê~hnh ~smnjojhdme` p|hd`d
~j`g|h n` `|`sm }p` s`pe~md ghe`~h |msm `e ppmsjh$ @e ph `b`o~jrh n` em cjhg`~sçm
|p`n` s`npojs ohdjn`smce`g`d~` em `|`sm z |hs ~md~h c`d`bjojms me ppmsjh$ N` `~`
ghnh `d njb`s`d~` omh n` êqj~h g`dojhdmnh |hs eh `q|`s~h ` hc`srm pdm
s`npoojÿd n` `|`sm `d m`sh|p`s~h ~j`dnm o`d~sh n` hojh `d~jnmn` cmdomsjm `~o$
0$3$? \hjcjejnmn n` ~smgj~mojhd` s`gh~m@ |hjce` `g|e`ms ~êodjom cjhgê~sjom ohgh bhsgm n` r`sjbjomojÿd `d h|`smojhd` dh
|s``dojme` n` bhsgm me~mg`d~` bjmce` |pnj`dnh p|`sms m em bjsgm `e`o~sÿdjom
mo~pme`$ N` `~m bhsgm ` |p`n`d s`npojs eh ~smemnh z ~sígj~` jdd`o`msjh `
jdohdr`dj`d~` |msm `e ppmsjh bjdme$
―_` `~í ~smcmimdnh `d }p` opme}pj`s ~smdmoojÿd }p` mo~pmeg`d~` ` rmejn`
ohd em bjsgm `e`o~sÿdjom h gmdposj~m n` pdm |`shdm% ` amkm g`njmd~` `e
ph n` bjsgm cjhgê~sjom‗
0$3$> Gmzhs `kpsjnmn
Em ~`odhehkçm cjhgê~sjom m|hs~md pd mpg`d~h n` `kpsjnmn ohgh ohd`op`dojm n` eh
sj`kh }p` gj~jkmd$ @~h s`npdnm `d c`d`bjojh |msm `e ppmsjh me s`npojs em |hjcjejnmn`
n` }p` pd ~`so`sh p|emd~` p jn`d~jnmn |msm em ohgjjÿd n` mekùd n`ej~h h |shrhomse`
mekùd ~j|h n` |`sipjojh$
Em p~jejymojÿd n` em cjhg`~sçm |hs |ms~` n` em mngjdj~smojhd` |ùcejom `d em epoam ohd~sm
`e osjg`d ~mgcjêd s`bp`sym em `dmojÿd n` `kpsjnmn n` eh ojpnmnmdh$
0$3$0 Mpg`d~h n` em |sjrmojnmnEm `kpsjnmn n` eh nm~h n` omsío~`s |`shdme n` eh ojpnmnmdh `d em gùe~j|e`
~smdmoojhd` }p` amo`d ph n` `eeh ` h~sh n` eh m|`o~h s`bhsymnh |hs em
m|ejomojÿd n` ~êodjom cjhgê~sjom$
―Eh }p` gí ` rm ehsm ` em |sjrmojnmn n`e jdnjrjnph‗
@ em ohd`op`dojm n` em dh~mce` njbjope~mn }p` p|hd` em bmejbjomojÿd n` smkh
cjhgê~sjoh ohd `e hci`~jrh n` moo`n`s m em jdbhsgmojÿd |`shdme n` pd ppmsjh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 54/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
0$3$2 Bmgjejmsjymojÿd ohd ~`odhehkçm mrmdymnm
@e ph n` ~`odhehkçm cjhgê~sjom mo`som `d gpoam homjhd` ~`odhehkçm |pd~`sm
m|ejomnm `d `dhs` n` ùe~jgm k`d`smojÿd m em ojpnmnmdçm$ \`` m em s`~jo`dojm }p`
|p`n`d gh~sms eh ppmsjh `d pd |sjg`s ghg`d~h amojm pdm ~`odhehkçm }p` dh
ohdho`d ~sm pdm |`}p`ým bm` n` mnm|~mojÿd p h|jdjÿd hcs` em gjgm p`e` g`ihsms
|hs dhsgm k`d`sme$ Ohgh ohd`op`dojm `e ph n` ~`odhehkçm `d `e nçm m nçm n`e
ojpnmnmdh ` ohdrj`s~` `d mekh gí `dojeeh z amcj~pme$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 55/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 00 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
2 P_H_ Z M\EJOMOJHD@_ N@ EM_ ^@ODHEHKÇM_
CJHGÊ^SJOM_
Em cjhg`~sçm ` `~í n`mssheemdnh ksmojm m pd os`ojgj`d~h ksmnpme `d em ohdoj`dojmojÿd
|ùcejom z n` em mo`|~mojÿd k`d`smejymnm$ Dh hc~md~` p ksmnh n` jg|emd~mojÿd ` gpz
n`jkpme `d~s` eh njb`s`d~` `o~hs` n`cjnh m em bjdmejnmn n` em gjgm z p oh~`$
―@qj~` pdm ksmd |s``dojm n` em cjhg`~sçm `d `e `o~hs |ùcejoh‗
Em Mngjdj~smojhd` \ùcejom hd `d em mo~pmejnmn em ksmdn` jg|pehsm n` em
~`odhehkçm cjhgê~sjom$ @ |hs `eeh }p` ` `d `e `o~hs |ùcejoh nhdn` ` |p`n`d
`dohd~sms em gmzhs` jdr`sjhd`$ Ksmd |ms~` n` `~h |shz`o~h `~íd n`~jdmnh m
N`b`dm z m _`kpsjnmn Dmojhdme |`sh p ph `~í `q~`dnjnh `d njb`s`d~` ígcj~h me
p~jejyms` `d gpoah omh |msm `e ohd~she n` |s``dojm j`dnh ê~` pd ph ~smdr`sme m
~hnh eh `o~hs`$
N`~momd j~`gm |msm em jn`d~jbjomojÿd n` ~`sshsj~m z osjgjdme` jdr`~jkmojÿd bhs`d`
nhopg`d~h dmojhdme` n` jn`d~jnmn ohd~she bshd~`sjyh ohd~she n` moo`h ohd~she n`
|s``dojm z k`~jÿd n` mzpnm |ùcejom$
Eh `q|`s~h ohjdojn`d `d }p` n`d~sh n`e `o~hs |sjrmnh ~mgcjêd ` n`mssheemd |shz`o~h
n` jg|hs~md~` omemnh$ @|`ojmeg`d~` `e `o~hs bjdmdoj`sh !ksmdn` cmdoh zm`kpsmnhsm* }p` am ee`rmnh m omch jg|emd~mojhd` |msm `e ohd~she n` moo`h m p
jd~memojhd` z `e ohd~she n`e bsmpn` mç ohgh |msm m`kpsms ~smdmoojhd` s`gh~m ~md~h
m ~smrê n` Jd~`sd`~ ohgh rçm ~`e`bÿdjom$
Em ohg|mýçm |`s~`d`oj`d~` me ís`m n` em ~`odhehkçm n` em jdbhsgmojÿd z n` em
ohgpdjomojÿd !^JO* n`d~sh n` em }p` ` `dop`d~smd bmcsjomd~` jd~`ksmnhs`
ohdpe~hs` z n`mssheemnhs` n` |shnpo~h cjhgê~sjoh ~mgcjêd m|p`~md |hs em
~`odhehkçm `d `e moo`h bçjoh m p jd~memojhd` mç ohgh `d `e moo`h eÿkjoh m p
j~`gm z `srjojh$@ `e omh ~mgcjêd n`e `o~hs ah~`e`sh nhdn` mo~pmeg`d~` ` `~í `~pnjmdnh em
jg|emd~mojÿd n` j~`gm n` s`ohdhojgj`d~h nmo~jems |msm `e ohd~she n` moo`h m em
amcj~mojhd` `ejgjdmdnh mç `e km~h n`sjrmnh n`e ph n` ohdpgjce` ohgh ~msi`~m n`
cmdnm gmkdê~jom h em cm~`sçm n` p nj|hj~jrh n` e`o~psm `d eh ah~`e`$
N` omsm me bp~psh ` |s`rê pdm jg|ejomojÿd gpoah gmzhs |hs |ms~` n`e `o~hs |sjrmnh m
g`njnm }p` `e g`somnh rmzm gmnpsmdnh$ G`njmd~` `e n`mssheeh n` em jdr`~jkmojÿd `
|p`n`d ohdos`~ms dp`rm m|ejomojhd` }p` hepojhd`d d`o`jnmn` n` em ohg|mýçm mç
ohgh mcmsm~ms` |sho`h }p` bmojej~`d jg|emd~mojhd` mo~pmeg`d~` jdrjmce` |hs p me~hoh~`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 56/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 02 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Ohgh ` hc`srm eh |sjg`sh `o~hs` `d mrmdyms `d em jg|emd~mojÿd n` ~`odhehkçm
cjhgê~sjom hd m}p`eeh opzm d`o`jnmn n` `e`rms em `kpsjnmn ` gmzhs$ M |`ms n`
`eeh ` ~sm~m n` pdm ~`odhehkçm eemgmnm m `q|mdnjs` m eh emskh n` gpz njr`sm
jdnp~sjm z `o~hs` |p`~h }p` em d`o`jnmn n` mpg`d~h `d em `kpsjnmn z s`npoojÿd
n` bsmpn` `d em mp~`d~jomojÿd n` ppmsjh ` pdm d`o`jnmn ~smdr`sme$
Pmnm ohgh bhsgm ùdjom n` mp~`d~jomojÿd h ohgcjdmnm ohd h~sm g`njnm em cjhg`~sçm
`~í n`~jdmnm `kùd eh `q|`s~h ohdpe~mnh m `q~`dn`s` `d gpoah m|`o~h n`
dp`~sm rjnm njmsjm$ N` a`oah `~h gjgh `q|`s~h gmdjbj`~md }p` em ~`odhehkçm
cjhgê~sjom ` `~íd ohdrjs~j`dnh zm `d em cm` n` pd dùg`sh ohdjn`smce` n` hepojhd`
n` jn`d~jbjomojÿd n` me~m `kpsjnmn z r`sjbjomojÿd |`shdme$ M g`njnm }p` ` n`opcs`d
cs`oam n` `kpsjnmn ` jdos`g`d~md em |hjcjejnmn` n` ~smdmoojhd` bsmpnpe`d~m em
d`o`jnmn n` pdm ~`odhehkçm }p` m~jbmkm njoam d`o`jnmn` ` amo` gí |m~`d~`$
@e ohd~`q~h `d `e }p` ` rmzm m m|ejoms !ohemchsm~jrh m nj~mdojm |s``dojme `~o$* z em
bjdmejnmn |`s`kpjnm !ohd~she n` moo`h ohd~she n` |s``dojm ohd~she n`
jn`d~jnmn(|`shdmejnmn epoam ohd~sm `e bsmpn` `~o$* `síd mekpdh n` eh `e`g`d~h }p`
n`~`sgjd`d }pê ~`odhehkçm ohdos`~m ` em gí m|sh|jmnm `d omnm omh$
2$= M\EJOMOJHD@_ MO^PME@_
@d em mo~pmejnmn em ~`odhehkçm cjhgê~sjom ` |p`n`d p~jejyms `d pd mg|ejh mcmdjoh n`
m|ejomojhd`$ Mnjojhdmeg`d~` `qj~`d eçd`m n` jdr`~jkmojÿd n` omsm m bp~psm`q~`djhd` gmjrm n` n`~`sgjdmnh ph }p` |ms`o`d `|`ojmeg`d~` |shg`~`nhsm$
M ohd~jdpmojÿd ` n`osjc`d eh |sjdoj|me` ph }p` ` nmd m em ~`odhehkçm cjhgê~sjom
m nçm n` ahz `kùd eh `q|`s~h ohdpe~mnh z `e mdíejj nhopg`d~me s`mejymnh$
2$=$= Ohd~she n` moo`h bçjoh z eÿkjoh
―Em bjdmejnmn `d em }p` gí `q~`dnjnh `~í `e ph n` em cjhg`~sçm ` `e ohd~she
n` moo`h% zm `m ê~` bçjoh !|hs `i`g|eh moo`h m `njbjojh h `|mojh
s`~sjdkjnh* h eÿkjoh !moo`h m j~`gm% |shksm gm h `}pj|h jdbhsgí~joh*‗
Eh `q|`s~h ohjdojn`d `d }p` em ap`eem nmo~jems ` em hepojÿd gí amcj~pme |msm `~` ph
`d @|mým n`cjnh m p me~h ksmnh n` gmnps`y }p` |`sgj~` `e `~mce`ojgj`d~h n` |s`ojh
ohg|`~j~jrh z m em pmcjejnmn }p` hbs`o`$
Dh hc~md~` z mpd}p` p |s``dojm `m g`dhs `e s`ohdhojgj`d~h n` jsj z `e
s`ohdhojgj`d~h bmojme ` |s``d~md ohgh me~`sdm~jrm m em ap`eem nmo~jems `d `~` ~j|h n`
m|ejomojhd`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 57/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Jep~smojÿd 19 Ohd~she n` moo`h
Eh `q|`s~h s`ohgj`dnmd }p` |msm `e ohd~she n` moo`h m yhdm n` me~m `kpsjnmn `amkm ph n` mp~`d~jomojÿd n` nhce` bmo~hs$ N` `~` ghnh em mp~hsjymojÿd |msm `e moo`h
n` pdm |`shdm ` cmmsçm `d pd s`ohdhojgj`d~h n` oÿgh ` ipd~h m eh }p` mc` h ~j`d`$
Jep~smojÿd :9 Ohd~she n` |s``dojm n` nhce` bmo~hs
N`e gjgh ghnh }p` ` amd jd~memnh `dhs` `d em `d~smnm n` `njbjojh z mem n`
moo`h s`~sjdkjnh omnm r`y gí eh |shr``nhs` n` `~` ~j|h n` ~`odhehkçm s`ojc`d
|`~jojhd` |msm em jd~`ksmojÿd n` `dhs` cjhgê~sjoh `d eh hsn`dmnhs` ohs|hsm~jrh
n` omsm m k`~jhdms em mp~`d~jomojÿd `d j~`gm z m|ejomojhd`$
2$=$3 Ohd~she n` |s``dojm
Eh gê~hnh p~jejymnh ~smnjojhdmeg`d~` |msm s`kj~sms njmsjmg`d~` eh ahsmsjh `d eh }p`
eh `g|e`mnh moo`n`d z mcmdnhdmd p s`|`o~jrh |p`~h n` ~smcmih p`e`d `~ms
cmmnh `d `e ph n` pd \JD h ~msi`~m |`shdme$
Pdh n` eh |sjdoj|me` jdohdr`dj`d~` }p` amd gmdjb`~mnh eh s`|hdmce` n`
`d~jnmn` }p` op`d~md ohd j~`gm n` ohd~she ahsmsjh cmmnh `d ~`odhehkçm~smnjojhdme` ` em bmojejnmn ohd em }p` ` |p`n`d ohg`~`s jss`kpemsjnmn` |hs `i`g|eh
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 58/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 01 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
ohg|ms~j`dnh ohd pd ohg|mý`sh n` ~smcmih `e \JD h em ~msi`~m |`shdme zm }p` dh `
s`}pj`s` djdkpdm r`sjbjomojÿd mnjojhdme$
―@e ph n` opme}pj`s ~êodjom cjhgê~sjom p|hd` pdm bhsgm `bjomy n` gj~jkms`~` sj`kh |hs em jg|hjcjejnmn n` ohg|ms~js eh smkh cjhgê~sjoh `d~s`
`g|e`mnh‗
_`kùd amd ~smdgj~jnh eh |shb`jhdme` jdrheposmnh `d `e |s``d~` `~pnjh |msm `~`
~j|h n` m|ejomojhd` ` p~jejym amcj~pmeg`d~` em ap`eem nmo~jems mpd}p` ~mgcjêd ~êodjom
g`dh `q~`dnjnm `d `e g`somnh ohgh em k`hg`~sçm n` em gmdh }p` `~í j`dnh pmnm
!`d ohgcjdmojÿd ohd `e \JD* |hs n`~`sgjdmnm Mngjdj~smojhd` \ùcejom$
2$=$? Ohd~she n` bshd~`sm
Em cjhg`~sçm |p`n` `s p~jejymnm |msm r`sjbjoms jn`d~jnmn` |hs |ms~` n` mk`d~`
bshd~`sjyh g`njmd~` `e ph n` nj|hj~jrh n` e`o~psm cjhgê~sjom z ohd~sm~mdnh `~m
jdbhsgmojÿd ohd p cm` n` nm~h$
Eh smkh m mdmejyms dhsgmeg`d~` hd em ~h|hksmbçm bmojme z em ap`eem nmo~jems`$
Mo~pmeg`d~` pd ksmd dùg`sh n` mngjdj~smojhd` |ùcejom n` ~hnh `e gpdnh `~í
jg|emd~mdnh em cjhg`~sçm `d mnpmdm z m`sh|p`s~h |msm mpg`d~ms em `kpsjnmn z mkjejnmn
n` eh gjgh$
―Opmdnh ee`rmgh m omch |shz`o~h opzm bjdmejnmn ` `e ohd~she n` bshd~`sm%dh n`c`gh herjnmsdh n` }p` eh ppmsjh dh |p`n`d `s bhsgmnh
|s`rjmg`d~`% eh }p` p|hd` pd `dhsg` s`~h n` omsm m ohd`kpjs pdm
pmcjejnmn eh g`dh jd~spjrm |hjce`‗
2$=$> Epoam ohd~sm `e bsmpn`
@e ph n` `~m ~`odhehkçm |msm s`mejyms ~smdmoojhd` cmdomsjm ` `dop`d~sm cm~md~`
`q~`dnjnh zm }p` ` ohdjn`smd gí mn`opmnm }p` `e ph n` eh gê~hnh ~smnjojhdme`
m|hs~mdnh gmzhs` djr`e` n` `kpsjnmn$
_jd `gcmskh p ph |msm em |s`r`dojÿd n` bsmpn` dh ` ejgj~m m `d~jnmn` |sjrmnm$ Em
mngjdj~smojhd` |ùcejom `~íd ohg`dymdnh m jg|emd~ms j~`gm cjhgê~sjoh |msm
|s`r`djs `~` n`ej~h ohd `e hci`~jrh n` `rj~ms `e km~h n` bhdnh |ùcejoh n` bhsgm
jss`kpems$
―Em |s`r`dojÿd n`e bsmpn` z em g`ihsm n` em rjkjemdojm hd nh ksmdn`
c`d`bjojh n` em m|ejomojÿd n` ~`odhehkçm cjhgê~sjom‗
Pd `i`g|eh ohdos`~h }p` amd `ýmemnh njr`sh `q|`s~h npsmd~` `e n`mssheeh n` em
`d~s`rj~m ` em p~jejymojÿd `d em k`~jÿd n` eh `srjojh mdj~msjh kpc`sdmg`d~me`hbs`ojnh m nhgjojejh `d @~mnh Pdjnh$ @d `~` omh ` r`sjbjom cjhgê~sjomg`d~` }p` `e
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 59/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 0: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
|`shdme mdj~msjh ` am |s``d~mnh `d em rjrj`dnm mn`opmnm z amd hbs`ojnh eh
`srjojh }p` |h~`sjhsg`d~` `síd bmo~psmnh$
2$=$0 Jdr`~jkmojÿd n` n`ej~hEm ap`eem s`ohkjnm n` em `o`dm n` pd n`ej~h hd |h~`sjhsg`d~` oh~`imnm m ~smrê
n`e |shksmgm MBJ_ !Mp~hgm~`n Bjdk`s|sjd~ Jn`d~jbjom~jhd _z~`g * h mekùd h~sh n`sjrmnh
n`e gjgh$
Ohdos`~mg`d~` `d @|mým ` p~jejym `e j~`gm _MJN !_j~`gm Mp~hgí~joh n`
Jn`d~jbjomojÿd Nmo~jems* `d `e }p` ` gmd~j`d` pd s`kj~sh n` em ap`eem n` jdnjrjnph ohd
md~`o`n`d~`$
Dh hc~md~` `~m cm` n` nm~h ` ~h~meg`d~` jdn`|`dnj`d~` n` em }p` megmo`dm emap`eem nmo~jems` hc~`djnm `d `e |sho`h n` hc~`dojÿd n`e Nhopg`d~h Dmojhdme n`
Jn`d~jnmn |hs eh }p` em Bp`sym n` _`kpsjnmn hemg`d~` |p`n`d p~jejyms `d `~h omh
em ap`eem ~hgmnm `d `o`dmsjh n` mekùd osjg`d h n` |`shdm ohd md~`o`n`d~`$
―@ gpz jg|hs~md~` nj~jdkpjs em cm` n` nm~h n` ap`eem nmo~jems` n`e
Nhopg`d~h Dmojhdme n` Jn`d~jnmn n` em cm` n` nm~h p~jejymnm |hs em
|hejoçm ohd bjdmejnmn` s`emojhdmnm ohd em jdr`~jkmojÿd n` n ej~h‗
Em ap`eem nmo~jems` ` s`gj~`d ipd~h ohd eh nm~h n`ghksíbjoh |msm jn`d~jbjoms h
r`sjbjoms em jn`d~jnmn n` em |`shdm$ Em cù}p`nm |p`n`d ~msnms gjdp~h ahsm h nçmn`|`dnj`dnh n` em omejnmn n` em jdbhsgmojÿd |s``d~mnm z `e ~mgmýh n` em cm` n` nm~h
`d em }p` ` cpom$
@~` j~`gm |sho`m pdm h rmsjm ap`eem nmo~jems` n`ohdhojnm cpomdnh
ohjdojn`dojm mp~hgí~jomg`d~` `d pdm cm` n` nm~h nhdn` |s`rjmg`d~` ` amd
megmo`dmnh ~hnm em ap`eem h|`oahm$
2$=$2 Moo`h m `srjojh z mzpnm kpc`sdmg`d~me`
@e ph n` em cjhg`~sçm `d `e moo`h m `srjojh hojme` z m bhdnh n` mzpnm `d omh n``g`sk`dojm |p`n` `s n` p~jejnmn `d `e ohd~she n`e s`|ms~h n` `~m mzpnm$ @~h p|hd`
pd |mh mn`emd~` `d em s`npoojÿd n` em ohssp|ojÿd z m|sh|jmojÿd jdn`cjnm n` eh s`opsh
kpc`sdmg`d~me`$ Eh oh~` n` mngjdj~smojÿd s`emojhdmnh ohd em nj~sjcpojÿd z s`kj~sh
n` njoah c`d`bjojh ~mgcjêd |p`n`d njgjdpjs$ Mnjojhdmeg`d~` `~h p|hd` pdm
s`npoojÿd n` ~j`g|h n` `|`sm |msm eh ppmsjh hejoj~md~` eh }p` jg|ejom pd mpg`d~h
n` em ohghnjnmn n` eh ojpnmnmdh$
Pd `i`g|eh n` `~m m|ejomojÿd ohgh ` r`sí `d eh omh n` êqj~h mdmejymnh ` em
k`~jÿd n` mzpnm |hs |ms~` n`e Khcj`sdh n` \hehdjm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 60/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
2$3 M\EJOMOJHD@_ @D BM_@ N@ N@_MSSHEEH
Mnjojhdmeg`d~` m em m|ejomojhd` `qj~`d~` z njbpdnjnm mo~pmeg`d~` `d `e g`somnh
`qj~`d eçd`m n` n`mssheeh `d gpoah omh zm `d gmsoam n` omsm m em `q~`djÿd n`ph gí dhr`nhh }p` `d cm` m em h|jdjhd` n` eh `q|`s~h ohdpe~mnh `síd n`
ksmd p~jejnmn$
2$3$= O`d~sh n` m~`dojÿd n` eemgmnm
Em ~`odhehkçm cjhgê~sjom ` |`sbjemd ohgh em gí jnÿd`m `d `e ígcj~h n` em
|h~`dojme` ~`odhehkçm m m|ejoms `d eh o`d~sh n` m~`dojÿd n` eemgmnm$ @d ohdos`~h `e
s`ohdhojgj`d~h n` rhy hbs`o` |hjcjejnmn` `d rmsjm ís`m$
―Em |sjdoj|me r`d~mim }p` hbs`o` `e s`ohdhojgj`d~h n` rhy ` em dh d`o`jnmn
n` |s``dojm bçjom n`e ppmsjh |msm mp~`d~joms`‗
‣ Cmdom ~`e`bÿdjom9 _`kùd eh `q|`s~h ohdpe~mnh `d eh ùe~jgh mýh `~` ~j|h
n` `srjojh `~í os`oj`dnh `d `e g`somnh$ Ohdjn`smdnh }p` |msm s`mejyms
opme}pj`s h|`smojÿd |s`rjmg`d~` ` n`c` r`sjbjoms em jn`d~jnmn n` omnm oej`d~` `d
omnm eemgmnm `e ph n`e s`ohdhojgj`d~h |hs rhy s`pe~m `d pd mpg`d~h n` em
`kpsjnmn z em s`d~mcjejnmn me gjgh ~j`g|h$
‣ S`op|`smojÿd n` ohd~sm`ým9 @d homjhd` eh `srjojh n` m~`dojÿd me
oej`d~` n` em `d~jnmn` ~j`d`d njbjope~mn` |msm jn`d~jbjoms rçm ~`e`bÿdjom m ehppmsjh }p` d`o`j~md s`~mpsms p ohd~sm`ým$ @d `~` `d~jnh zm ` `~íd
`g|e`mdnh `d mekpdm ohg|mýçm j~`gm n` s`ohdhojgj`d~h n` rhy }p`
kmsmd~jymd }p` em |`shdm }p` `~í eemgmdnh ` }pj`d njo` `s n` gmd`sm }p` em
s`k`d`smojÿd n` em ohd~sm`ým n` eh ppmsjh ohs|hsm~jrh ` ohdrj`s~` `d pd
|sho`h gí s`j~`d~` me bsmpn`$
2$3$3 G`njh n` |mkh
@e ph n` em cjhg`~sçm `d ~`sgjdme` n` |pd~h n` r`d~m !^\R* s`npo` `e ~j`g|h `g|e`mnh
`d ~smdmoojhd` z njgjdpz` em |hjcjejnmn` n` `sshs` h ohdbpjhd`$ Ohgh `i`g|ehamz ohe`kjh }p` zm p~jejymd em ap`eem nmo~jems |msm `e |mkh n`e g`dù `d `e ohg`nhs
`ejgjdmdnh |shce`gm s`emojhdmnh ohd em |êsnjnm n` ~msi`~m herjnh n` dùg`sh n`
jn`d~jbjomojÿd ~smdmoojhd` gmdpme` z omskh m op`d~m `ssÿd`m$
2$3$? Ohd~she |ms`d~me
Ahz `d nçm ` |p`n`d pms ohd~she` |m~`sdh g`njmd~` ap`eem nmo~jems m|ejomnh me
moo`h m s`n` hojme` z m n`~`sgjdmnh j~jh {`c jdoepz`dnh em s`~sjoojhd` }p` eh
|mns` amzmd n`~`sgjdmnh |hs `i`g|eh `e bje~smnh n` ohd~`djnh em cù}p`nm n` |íkjdm
h `e ph n` oj`s~h `srjojh h m |ms~js n` oj`s~m ahsm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 61/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
2$3$> Rjkjemdojm
Em ~êodjom cjhgê~sjom hd p~jejymnm ohgh g`njnm n` rjkjemdojm |msm jn`d~jbjoms
osjgjdme` z h|`oahh `d~s` gpe~j~pn`$ Mohsn` m eh nhopg`d~h mdmejymnh `~`
omh n` ph s`}pj`s` n` smkh cjhgê~sjoh }p` |p`nmd `s mn}pjsjnh m pdm nj~mdojm
g`njm$ Em ~`odhehkçm gí p~jejymnm mo~pmeg`d~` ` `e s`ohdhojgj`d~h bmojme |`sh `d `e
`o~hs n` em cjhg`~sçm zm ` ohdho` }p` ` `~íd `g|`ymdnh m n`mssheems j~`gm }p`
p~jejymd em bhsgm n` mdnms ohgh smkh cjhgê~sjoh$
2$3$0 ^smdmoojhd` g`njmd~` ~`eêbhdh gÿrje`
@d em mo~pmejnmn em ~êodjom cjhgê~sjom ` `~íd ohg`dymdnh m n`mssheems `d
nj|hj~jrh gÿrje` ohd `e hci`~jrh n` |sh~`k`s `e moo`h m eh gjgh z m n`~`sgjdmnm
m|ejomojhd` s`mejyms |mkh h |msm em k`~jÿd n` ohd~sm`ým$
―Em cjhg`~sçm `d nj|hj~jrh gÿrje` ` pdm n` em bp~psm m|ejomojhd` gí
jd~ s`md~` z ohd gmzhs |shz`oojÿd‗
@d `~` `d~jnh omc` n`~moms em ~`odhehkçm DBO !D`ms Bj`en Ohggpdjom~jhd * jd~`ksmnm
`d em gmzhsçm n` eh ~`eêbhdh gÿrje` n` ùe~jgm k`d`smojÿd z p~jejymnm `d ohgcjdmojÿd
ohd cjhg`~sçm |msm em s`mejymojÿd n` |mkh$ _` |s`rê }p` `~m `sí pdm n` em |sjdoj|me`
eçd`m n` jdr`~jkmojÿd bp~psm n`cjnh m p ksmd |h~`dojme$
2$3$2 _mdjnmn
@e ph n` em cjhg`~sçm p|hd` pdm dp`rm |hjcjejnmn n`d~sh n`e `o~hs mdj~msjh m em ahsm
n` n`~`o~ms |shce`gm n` mepn$
―Em ~`odhehkçm cjhgê~sjom ~mgcjêd ` |p`n` m|ejoms m em mepn% ohd `e hci ~jrh
n` n`~`o~ms oj`s~m `db`sg`nmn` ` jdr`~jkms g`njomg`d~h‗
Mnjojhdmeg`d~` ~mgcjêd ` |hnsçm m|ejoms em cjhg`~sçm |msm jn`d~jbjoms m |moj`d~`
`|`ojmeg`d~` `d omh `d eh }p` `e jnjhgm ` pdm cmss`sm h `d eh }p` `qj~`d rmsjh
|moj`d~` ohd dhgcs` jgjems`$ N` `~` ghnh ` |p`n`d s`npojs |shce`gm s`em~jrh m
`sshs` gênjoh z bsmpn` me `kpsh gênjoh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 62/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 23 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
; OM_H_ N@ ÊQJ^H
@d `e |sho`h n` `d~s`rj~m ohd eh njb`s`d~` mo~hs` n`e `o~hs ` amd n`~momnhjg|hs~md~` jg|emd~mojhd` n` cjhg`~sçm m ksmd `omem `d `e gpdnh em opme` hd
ohdjn`smnm ohgh omh n` êqj~h n` em m|ejomojÿd n` em ~`odhehkçm cjhgê~sjom$
_` amd `e`oojhdmnh nh omh `|`oçbjoh n`cjnh |sjdoj|meg`d~` m p njr`sjnmn `d
opmd~h m bjdmejnmn z ~`odhehkçm `g|e`mnm9
‣ Moo`h sí|jnh m bshd~`sm m`sh|hs~pmsjm `d @|mým$
‣ K`~jÿd n` mzpnm |ùcejom `d \hehdjm$
M ohd~jdpmojÿd ` mdmejymd eh nh omh n`osjcj`dnh `e |shz`o~h z p hci`~jrh `e
dùg`sh n` ppmsjh |h~`dojme` em oemr` n` êqj~h eh |sjdoj|me` jdohdr`dj`d~` z
c`d`bjojh `dohd~smnh mç ohgh em `q|`sj`dojm `q~smçnm z em e`oojhd` m|s`dnjnm n` eh
gjgh$
\msm em `emchsmojÿd n` mgch omh n` êqj~h ` am ohd~mnh ohd em ohemchsmojÿd n`
|shb`jhdme` }p` |ms~joj|mshd `d `e n`mssheeh ` jg|emd~mojÿd n` mgch j~`gm eh
opme` ` |s`~mshd m em s`mejymojÿd n` pdm `d~s`rj~m `|`oçbjom z bmojej~mshd
nhopg`d~mojÿd mnjojhdme$
;$= MOO@_H SÍ\JNH M BSHD^@SM_ M@SH\HS^PMSJM_ !@_\MÝM*
;$=$= N`osj|ojÿd n`e |shz`o~h
\shz`o~h n` jg|emd~mojÿd n`e j~`gm Mp~hgm~jo Chsn`s Oshjdk !MCO* |msm `e moo`h
sí|jnh m bshd~`sm m`sh|hs~pmsjm |hs |ms~` n` Jdnsm _z~`g jg|pemnh |hs `e Gjdj~`sjh
n`e Jd~`sjhs n`e Khcj`sdh n` @|mým m ~smrê n` em _`os`~msçm n` @~mnh n` _`kpsjnmn ohd
n`~jdh em Ohgjmsçm K`d`sme n` @q~smdi`sçm z Bshd~`sm$
@e hci`~jrh n`e |shz`o~h ` em jg|emd~mojÿd n` pd j~`gm }p` mp~hgm~jo` `e |mhbshd~`sjyh `d em g`njnm n` eh |hjce` n` gmd`sm n`m~`dnjnm$ @~í n`~jdmnh m rjmi`sh
opzh hsjk`d h n`~jdh `~í bp`sm n`e ígcj~h `psh|`h$
@e j~`gm `~í bhsgmnh |hs pd ohdipd~h n` }pjhoh `d eh }p` ` jd~shnpo` pd |mmi`sh
}p` r`sjbjom p jn`d~jnmn |hs g`njh n`e s`ohdhojgj`d~h bmojme z n` ap`eem nmo~jems$
\h~`sjhsg`d~` z zm r`sjbjomnm p jn`d~jnmn moo`n` m ~smrê n` pdm |p`s~m
mp~hgí~jom$ Mnjojhdmeg`d~` eh mk`d~` bshd~`sjyh `~íd j~pmnh `d pdm omcjdm
|sÿqjgm n`n` em }p` ghdj~hsjymd ~hnh `e |sho`h ` jd~`srj`d`d `d omh n` }p` eh
ohdjn`s`d d`o`msjh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 63/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Jep~smojÿd =<9 Moo`h sí|jnh m bshd~`sm m`sh|hs~pmsjm
@e |sho`h ohgj`dym r`sjbjomdnh bçjomg`d~` `e |mm|hs~` g`njmd~` s`ohdhojgj`d~h n`
|m~shd` rjpme` z ohd~jdùm r`sjbjomdnh `e`o~sÿdjomg`d~` `e oaj| }p` ohd~j`d` `~`
nhopg`d~h$ \h~`sjhsg`d~` ee`rm m omch `e s`ohdhojgj`d~h nmo~jems z bmojme |msm momcms
ohd pdm ohdpe~m m cm` n` nm~h |hejojme` `d cpom n` md~`o`n`d~` h nhopg`d~h
shcmnh$
@qj~`d nh ~j|h n` jd~memojhd`9 n` |p`s~m jg|e` !}pjhoh nj~sjcpjnh |hs em mem n`
em ~`sgjdme z |p`s~m n` moo`h mp~hgí~jom* z n` `oepm !}pjhoh jd~`ksmnh `d em
|p`s~m mp~hgí~jom6 `d `~h j em r`sjbjomojÿd dh ~j`d` êqj~h `e |mmi`sh dh |p`n`
mrmdyms*$
@e j~`gm ` p~jejymnh |hs ?0< |mmi`sh njmsjmg`d~` ~`dj`dnh `d op`d~m }p` p ph dh
` hcejkm~hsjh$ @e `g|e`h n` `~` j~`gm `}pjrme` me ~smcmih n` hoah bpdojhdmsjh
|hejojme`$
@e |shz`o~h MCO _z~`g$ Ohd~she Mp~hgí~joh n` Bshd~`sm n`mssheemnh |hs `e Gjdj~`sjh
n`e Jd~`sjhs am jnh kmemsnhdmnh ohd dpg`shh |s`gjh `d~s` h~sh `e ―\s`gjh @DJ_@ 3
3<=< me g`ihs `srjojh h |shz`o~h ohd NDJ`‗$
3 @dop`d~sh Jd~`sdmojhdme n` _`kpsjnmn n` em Jdbhsgmojÿd hskmdjymnh |hs JD^@OH$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 64/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
;$=$3 @e`oojÿd n` cjhg`~sçm
_` amo` ph n` nh ~`odhehkçm cjhgê~sjom |msm hc~`d`s gmzhs kmsmd~çm `d em
r`sjbjomojÿd n` em jn`d~jnmn n` pdm |`shdm$
@d em `e`oojÿd n` em ~`odhehkçm m `g|e`ms ` h|~ÿ |hs `e s`ohdhojgj`d~h bmojme |hs p
bmojejnmn n` om|~psm z ~smcmih s`mejymnh |s`rjmg`d~` ohd `eem |hs |ms~` n` em `g|s`m
jg|emd~mnhsm$ \hs h~sh emnh em `e`oojÿd n` em ~`odhehkçm nmo~jems bp` gh~jrmnm |hs ~sm~ms`
n` pdm ~êodjom gmnpsm z m`}pjce` `ohdÿgjomg`d~` bs`d~` m h~sm }p` dh eh hd `d em
mo~pmejnmn$
;$=$? C`d`bjojh z oemr` n` êqj~h
Eh |sjdoj|me` c`d`bjojh hc~`djnh g`njmd~` em jg|emd~mojÿd hd9
‣ G`ihsm n` em sm~jh n` ohd~she` bshd~`sjyh }p` ` |p`n`d s`mejyms |hs pdjnmn n`
~j`g|h z |hs omnm mk`d~` n` |hejoçm$
‣ Jdos`g`d~h n` em `kpsjnmn$
‣ Gj~jkmojÿd n`e ~`ghs }p` ppmsjh z `d~jnmn` |p`nmd ~`d`s m em p~jejymojÿd n`
j~`gm cjhgê~sjoh$
Pdh n` eh |sjdoj|me` bmo~hs` }p` ee`rmshd me êqj~h n` `~m jg|emd~mojÿd bp` `e
ohg|shgjh n` ~hnh eh mo~hs` `d em s`mejymojÿd n`e |shz`o~h `d em b`oam mohsnmnm$
;$=$> Jdohdr`dj`d~`
_` amd jn`d~jbjomnh eh jkpj`d~` jdohdr`dj`d~`9
‣ N`ohdhojgj`d~h n` em ~`odhehkçm |hs |ms~` n` eh ppmsjh$
‣ @e`rmnh oh~` n` mn}pjjojÿd n`e j~`gm mpd}p` amz }p` `ýmems }p` ê~` `
mghs~jym n` bhsgm omj jdg`njm~m$
@d eh s`b`s`d~` m em jg|emd~mojÿd n`e j~`gm ` n`~momce` }p` ~`dj`dnh `d op`d~m pohg|e`ijnmn ` s`mejyÿ `d ~md ÿeh opm~sh g`` !n`n` em bmcsjomojÿd n` eh nj|hj~jrh
am~m em bjdmejymojÿd z bhsgmojÿd n` eh mk`d~`* eh }p` ` ohdjn`sÿ `e ksmd `oheeh n`e
|shz`o~h$
H~sh n` eh ohd~sm~j`g|h ` em a`~`shk`d`jnmn n` eh mo~hs` n` pd |shz`o~h }p` |ms~`
n` em _`os`~msçm n`e @~mnh |msm em _`kpsjnmn ~j`d` ohgh n`~jdm~msjh em Ohgjmsçm
K`d`sme n` @q~smdi`sçm z Bshd~`sm ` jg|ejom m pdm ohg|mýçm ohgh M`dm zm }p` em
jg|emd~mojÿd bp` s`mejymnm `d p jd~memojhd`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 65/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 20 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
;$=$0 S`ohg`dnmojhd`
@d cm` m `~m `q|`sj`dojm opmdnh ` amcem n` j~`gm n` s`ohdhojgj`d~h cjhgê~sjoh
` am n` s`omeoms em jg|hs~mdojm n` }p` em om|~psm n` gp`~sm |msm `e s`kj~sh ` amkm
ohd pdm gçdjgm omejnmn }p` kmsmd~jo` `e êqj~h n`e |sho`h n` mp~`d~jomojÿd$ \hs eh ~md~h
` n`c` jdr`s~js `|`ojmeg`d~` `d j~`gm z nj|hj~jrh }p` kmsmd~jo`d njoam omejnmn
|`sh ~mgcjêd `d em bhsgmojÿd n` eh ~smcmimnhs` }p` `~êd jg|ejomnh `d `e |sho`h n`
s`kj~sh me gjgh ~j`g|h }p` n` eh ppmsjh
\hs h~sm |ms~` ` ``dojme bhg`d~ms }p` em hskmdjymojhd` z eh ppmsjh |j`snmd `e
gj`nh m pms `~` ~j|h n` ~`odhehkçm |msm em jn`d~jbjomojÿd$ _` ~sm~m n` ~`odhehkçm gpz
gmnpsm z m|hs~md gpoah c`d`bjojh$
;$=$2 Eçd`m n` n`mssheeh bp~psh@e |shz`o~h am jnh ohdjn`smnh pd êqj~h$ @ |hs `eeh }p` `qj~`d |emd` n` `q|mdjÿd m
h~sh |p`~h bshd~`sjyh !gí m`sh|p`s~h ` jdoeph |p`s~h gmsç~jgh* `g|e`mdnh pd
gmzhs dùg`sh n` `e`g`d~h n` r`sjbjomojÿd `d omnm pdm n` `eem$
@d n`bjdj~jrm ` am ohdoepjnh }p` eh j~`gm cjhgê~sjoh hd ríejnh |msm `e ohd~she n`
bshd~`sm$
;$3 K@_^JßD N@ MZPNM_ \ÙCEJOM_ !\HEHDJM*
;$3$= N`osj|ojÿd n`e |shz`o~h
_` ~sm~m n` pd |shz`o~h n` k`~jÿd n` mzpnm |ùcejom h~hskmnm |hs `e Khcj`sdh n`
\hehdjm m ~smrê n` omi`sh mp~hgí~joh mp~`d~jomdnh m eh ojpnmnmdh g`njmd~` `e
s`ohdhojgj`d~h n` em `~spo~psm n` em r`dm n` eh n`nh z pd \JD$
G`dpmeg`d~` pd ~h~me n` 3$<<< |`shdm amo`d ph n` em ~`odhehkçm `d omnm pdm n` em
20 popsme` `d em }p` `~í jd~memnm$
@e hci`~jrh ` em k`~jÿd n` em mzpnm kpc`sdmg`d~me` n` bhsgm `kpsm oÿghnm z
mp~hgm~jymnm$ @d pd |sjdoj|jh hemg`d~` ` ohdjn`sÿ em k`~jÿd n` em |s`~mojhd` |hsn``g|e`h |`sh mo~pmeg`d~` p ph ` am mg|ejmnh m h~sm mzpnm$
Ohd `e ph n` `~m ~`odhehkçm ` |s`~`dn` g`ihsms em `bjoj`dojm n` em k`~jÿd n` em
mzpnm kpc`sdmg`d~me`$ Ahz `d nçm j dh ` pm `e j~`gm cjhgê~sjoh em |`shdm
`d~s`km pd nhopg`d~h n` jn`d~jbjomojÿd `e opme ` ohg|sp`cm z ` s`ee`dmd pdm `sj` n`
bhsgpemsjh$ @~` |sho`h ` n`ghsm ohdjn`smce`g`d~` `d `e ~j`g|h$ @~h p`e`
ohdee`rms em os`mojÿd n` emskm ohem n` `|`sm |msm |hn`s moo`n`s m em mzpnm
|shrhomdnh `e n`ohd~`d~h n` eh ojpnmnmdh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 66/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 22 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Jep~smojÿd ==9 M|ejomojÿd |msm k`~jÿd n` mzpnm |ùcejom m ~smrê n` omi`sh mp~hgí~joh
_jd `gcmskh p~jejymdnh `e j~`gm jg|emd~mnh `e ppmsjh |p`n` mopnjs m pd omi`sh
mp~hgí~joh m em ahsm }p` e` s`pe~` gí ohdr`dj`d~` |msm hc~`d`s em mzpnm$ @~m
ohghnjnmn ` c`d`bjojhm ~md~h |msm `e cmdoh mejrjmdnh p hbjojdm n` oej`d~` |pnj`dnh
hbs`o`s pd g`ihs `srjojh ohgh |msm `e ppmsjh }p` dh d`o`j~m mopnjs `d ahsmsjh n`m|`s~psm n` hbjojdm$
;$3$3 Ph n` cjhg`~sçm
_` h|~ÿ |hs em ~`odhehkçm cjhgê~sjom ~sm |shcms pd j~`gm }p` ohgcjdm `e ph n` pd \JD
z pdm ~msi`~m }p` jdohs|hsmcm pd oaj| `e`o~sÿdjoh$ @e s`pe~mnh n` `~m |sp`cm bp` gpz
d`km~jrh zm }p` eh ppmsjh herjnmcmd ohd bs`op`dojm `e oÿnjkh \JD em ~msi`~m `
n`~`sjhsmcm z `d homjhd` `e \JD `sm mdh~mnh |msm `rj~ms p herjnh j`dnh `dohd~smnh z
p~jejymnh |hs ~`so`sm |`shdm ipd~h ohd em ~msi`~m |msm moo`n`s bsmpnpe`d~mg`d~` m em
mzpnm$
_j`dnh em |sjhsjnmn` n`e khcj`sdh |hemoh em epoam ohd~sm `e bsmpn` z `e mpg`d~h n` em
`kpsjnmn ` h|~ÿ |hs pd j~`gm cjhgê~sjoh$
;$3$? C`d`bjojh z oemr` n` êqj~h
Em |sjdoj|me` r`d~mim jn`d~jbjomnm hd9
‣ Mpg`d~h n` em `bjoj`dojm me n`njoms` g`dh ~j`g|h m em ohg|shcmojÿd n`
nhopg`d~h n` jn`d~jbjomojÿd |hs |ms~` n`e cmdoh$
‣ G`ihsm n`e `srjojh hbs`ojnh me ojpnmnmdh me s`npojs em `|`sm `qj~`d~`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 67/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ G`ihsm n` em `kpsjnmn jdohs|hsmdnh `e bmo~hs ―eh }p` `s`‗ `d `e ghn`eh n`
mp~`d~jomojÿd z rj~mdnh mç |hjce` bsmpn`$
Mnjojhdmeg`d~` ohdee`rm ksmdn` r`d~mim `d ~êsgjdh n` mahssh z `bjoj`dojm |msm `ekhcj`sdh zm }p` `e |mç k`~jhdm ksmdn` omd~jnmn` n` njd`sh `d |sho`h n` |mkh
hojme ohgh |`djhd` pcjnjh |msm `e n``g|e`h `~o$
Pdm n` em oemr` n`e êqj~h bp` }p` em |hcemojÿd |pnh |`sojcjs sí|jnmg`d~` eh c`d`bjojh
}p` ` hc~j`d`d n` p ph$
Dh hc~md~` `e bmo~hs gí osç~joh |msm `e êqj~h ` em `kpsjnmn z em |sjrmojnmn zm }p` `
~sm~m n` pd j~`gm `d `e }p` eh nm~h n`e ppmsjh }p` ` megmo`dmd `d `e cmdoh
!Aj~moaj em `g|s`m jg|emd~mnhsm dh megmo`dm dmnm* hd `e dùg`sh |`shdme n`
jn`d~jbjomojÿd `e dhgcs` `e nhgjojejh `e dùg`sh n` op`d~m cmdomsjm z em mzpnm
kpc`sdmg`d~me ohss`|hdnj`d~`$ Ohgh g`njnm n` `kpsjnmn dh ` megmo`dm p
jdbhsgmojÿd cjhgê~sjom ohg|e`~m jdh }p` ` kpmsnm pdm gp`~sm `dosj|~mnm$
;$3$> Jdohdr`dj`d~`
@e |sjdoj|me |shce`gm `dohd~smnh am jnh em d`o`jnmn n` bhsgms m em |`shdm |msm `e
ph n`e j~`gm |p`~h }p` eh ppmsjh dh j`g|s` ~j`d`d eh ohdhojgj`d~h pbjoj`d~`
|msm p~jejymseh mn`opmnmg`d~`$
\msm `rj~ms `sshs` `e |`shdme n` em hbjojdm cmdomsjm am ~`djnh }p` jdr`s~js ~j`g|h `d`d`ýms m eh ppmsjh m p~jejymseh$ @~` jdohdr`dj`d~` ` hepojhdm ohd `e ~smdopsh n`e
~j`g|h m g`njnm }p` eh ojpnmnmdh ` moh~pgcsmd m em p~jejymojÿd n`e j~`gm$
;$3$0 S`ohg`dnmojhd`
Pdm |`so`|ojÿd n` jd`kpsjnmn |hs |ms~` n` eh ppmsjh amojm `e j~`gm |p`n` jg|ejoms
p d`km~jrm m pmseh$ @ |hs `eeh }p` ` ``dojme ~smdgj~js ohdbjmdym m eh ojpnmnmdh
amojêdnhe` ohdoj`d~` n` }p` `e shch n` p nm~h ` gpz |hoh |shcmce` z }p` `e
j~`gm ` `kpsh |msm p mepn$
;$3$2 Eçd`m n` n`mssheeh bp~psh
@qj~`d rmsjh omh n` n`mssheeh `d `~pnjh$ @d em cmdom ohg`sojme |p`n` `s pmnh
|msm rmejnms opme}pj`s |sho`h }p` `e ppmsjh n``msm s`mejyms ohd `e cmdoh$ @d epkms n`
}p` em |`shdm amkmd ph n` pd nhopg`d~h n` jn`d~jbjomojÿd ` s`kj~smd p smkh
cjhgê~sjoh }p` ` pmsçmd |msm mp~`d~joms ~smdmoojhd` ohd~sm~h mop`snh ~o$
_` `~í ~smcmimdnh `d }p` opme}pj`s ~smdmoojÿd }p` mo~pmeg`d~` ` rmejn` ohd em bjsgm
`e`o~sÿdjom h gmdposj~m n` pdm |`shdm ` amkm g`njmd~` `e ph n` bjsgm cjhgê~sjom$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 68/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 21 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
1 GMSOH S@KPEM^HSJH
Pd m|`o~h n` `|`ojme s`e`rmdojm `d s`emojÿd m em jg|emd~mojÿd n` j~`gm cjhgê~sjoh` em s`kpemojÿd dhsgm~jrm }p` n`bjd` eh s`}pjj~h z hcejkmojhd` m opg|ejs$ @~h `
n`c` `|`ojmeg`d~` m }p` eh nm~h cjhgê~sjoh hd ohdjn`smnh n` omsío~`s |`shdme
|hs eh }p` p ~sm~mgj`d~h `~í s`kpemnh n` omsm m |s``srms em |sjrmojnmn n` eh ppmsjh$
1$= DHSGM^JRM E@KME
M ohd~jdpmojÿd ` s`pg` em |sjdoj|me dhsgm~jrm z ipsj|spn`dojm mo~pmeg`d~` m|ejomce` me
ph n` j~`gm n` ~sm~mgj`d~h n` nm~h cjhgê~sjoh$
―@qj~`d dhsgm~jrm k`d`sme` pbjoj`d~` s`emojhdmnm ohd em |sh~`oojÿd n`
nm~h |`shdme`% mpd}p` dh ` s`bj`smd |`oçbjomg`d~` m em cjhg ~sçm‗
Em Mk`dojm @|mýhem n` \sh~`oojÿd n` Nm~h !M@\N* n`bjd` eh nm~h cjhgê~sjoh ohgh9
―m}p`eeh m|`o~h bçjoh }p`% g`njmd~` pd mdíejj ~êodjoh% |`sgj~`d
nj~jdkpjs em jdkpemsjnmn` }p` ohdopss`d s`|`o~h n` njoah m|`o~h z
}p`% s`pe~mdnh }p` ` jg|hjce` em ohjdojn`dojm n` ~me` m|`o~h `d nh
jdnjrjnph% pdm r`y |sho`mnh% |`sgj~`d `srjs |msm jn`d~jbjoms me jdnjrjnph `d
op`~jÿd‗ ?
M eh j~`gm jdbhsgí~joh g`njmd~` eh opme` ` ~sm~`d nm~h cjhgê~sjoh n` |`shdm
bçjom jn`d~jbjomnm h jn`d~jbjomce` ` e` n`c`d m|ejoms em
$
g`njnm n` `kpsjnmn n`
omsío~`s bçjoh ~êodjoh z(p hskmdjym~jrh omejbjomnm ohgh n` djr`e cíjoh |hs `e ^ç~peh RJJJ
n`e S`kemg`d~h n` N`mssheeh n` em EH\N>$ @d `e omh n` }p` eh nm~h cjhgê~sjoh
hci`~h n` ~sm~mgj`d~h `d `e j~`gm |pnj``d mn`gí `dohd~sms` `r`d~pmeg`d~`
mhojmnh h rjdopemnh m em mepn n` eh mb`o~mnh ohgh |hs `i`g|eh `d `e p|p`~h n`
njom|mojnmn` bçjom s`pe~msçm ~mgcjêd d`o`msjm em jg|emd~mojÿd n` em g`njnm n`
`kpsjnmn n` djr`e g`njh z me~h0
M ohd~jdpmojÿd ` n`~meem em dhsgm~jrm n` m|ejomojÿd me ph n` j~`gm njsjkjnh me~sm~mgj`d~h n` `~` ~j|h n` nm~h cjhgê~sjoh mç ohgh em |sjdoj|me ipsj|spn`dojm
mhojmnm$
$
? Jdbhsg` Ipsçnjoh dùg`sh <?21(3<<2 n` em Mk`dojm @|mýhem n` \sh~`oojÿd n` Nm~h hcs` ap`eem nmo~jems$> Em g`njnm n` djr`e cíjoh jdoepz`d em jkpj`d~` op`~jhd`9 n`bjdjojÿd n` eh n`c`s` z em bpdojhd` n`e |`shdme ohdmoo`h m eh nm~h cjhgê~sjoh6 s`kj~sh n` jdojn`dojm s`emojhdmnm ohd `~h bjoa`sh6 ohd~she n` moo`h m `eeh6 k`~jÿdn` h|hs~` z nhopg`d~h }p` eh ohd~`dkmd6 jn`d~jbjomojÿd z mp~`d~jomojÿd n` ppmsjh me moo`n`s m `~h nm~h6 z`~mce`ojgj`d~h n` |sho`njgj`d~h |msm em s`mejymojÿd n` oh|jm n` s`|menh z s`op|`smojÿd s`|`o~h m ~h bjoa`sh$0 Em g`njnm n` djr`e me~h mn`gí n` em n` djr`e cíjoh !r`s dh~m m |j` n` |íkjdm md~`sjhs* jdoepz`d em n` djr`e g`njh$Em g`njnm n` djr`e g`njh ohg|s`dn`d9 dhgcsmgj`d~h n` pd s`|hdmce` n` `kpsjnmn6 s`mejymojÿd n` mpnj~hsçm cj`dme6
k`~jÿd n` h|hs~` z nhopg`d~h6 jn`d~jbjomojÿd z mp~`d~jomojÿd6 ohd~she n` moo`h bçjoh6 s`kj~sh n` jdojn`dojm$ Emg`njnm n` djr`e me~h jdoepz`d em k`~jÿd z nj~sjcpojÿd n` h|hs~`6 oh|jm n` s`|menh z s`op|`smojÿd6 s`kj~sh n` moo`h6z `opsjymojÿd n` em ~smdgjjÿd n` nm~h m ~smrê n` s`n` n` ~`e`ohgpdjomojhd`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 69/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 2: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
1$=$= Dhsgm~jrm n` em Pdjÿd @psh|`m
N`n` em Pdjÿd @psh|`m ` amd |emd~`mnh pdm `sj` n` op`~jhd` `d s`emojÿd m em
|sjrmojnmn n` eh ojpnmnmdh }p` amd ee`rmnh m em n`bjdjojÿd n` mekpdm njs`o~sjo` z
s`kemg`d~mojhd` }p` hsj`d~md z `d mekpdh omh hcejkmd m eh `~mnh gj`gcsh m em
ahsm n` e`kjems hcs` `~h m|`o~h$
@d mekpdh omh ` ~sm~m n` bhsgm k`dêsjom eh nm~h n` omsío~`s |`shdme gj`d~sm }p`
`d h~sh ` mchsnm `|`oçbjomg`d~` `e ~sm~mgj`d~h n` eh nm~h cjhgê~sjoh$
J$ Njs`o~jrm s`em~jrm m em |sh~`oojÿd n` em |`shdm bçjom `d eh }p` s`|`o~m me~sm~mgj`d~h n` nm~h |`shdme` z m em ejcs` ojsopemojÿd n` `~h nm~h2
_p hci`~jrh bpdnmg`d~me ` }p` ~hnh eh @~mnh gj`gcsh n` em Pdjÿd @psh|`m
kmsmd~jo`d em mn`opmnm |sh~`oojÿd n`e n`s`oah m em jd~jgjnmn `d eh }p` s`|`o~m me~sm~mgj`d~h n` nm~h |`shdme $
_p ms~çopeh 3 m* n`bjd` eh nm~h |`shdme` ohgh
―~hnm jdbhsgmojÿd hcs` pdm |`shdm bçjom jn`d~jbjomnm h jn`d~jbjomce` !`e
‖ jd~`s`mnh‚*6 ` ohdjn`smsí jn`d~jbjomce` ~hnm |`shdm opzm jn`d~jnmn |p`nm
n`~`sgjdms`% njs`o~m h jdnjs`o~mg`d~`% `d |ms~jopems g`njmd~` pd dùg`sh n`
jn`d~jbjomojÿd h pdh h rmsjh `e`g`d~h `|`oçbjoh% omsmo~`sç~joh n` p
jn`d~jnmn bçjom% bjjheÿkjom% |ç}pjom% `ohdÿgjom% ope~psme h hojme ‗$
N` `eeh ` n`sjrm }p` eh nm~h cjhgê~sjoh ` |p`n`d ohdjn`sms ohgh nm~h
|`shdme` m eh }p` ` m|ejomsçm em e`kjemojÿd |`s~jd`d~`$
_` ~sm~m n` pdm Njs`o~jrm n` gçdjgh jg|e`g`d~mnm `d @|mým m ~smrê n` em E`z
Hskídjom =0(=::: n` =? n` njoj`gcs` n` \sh~`oojÿd n` Nm~h n` Omsío~`s
\`shdme z |hs eh ~md~h dh ~j`d` m|ejomojÿd njs`o~m$ @e djr`e n` |sh~`oojÿd hbs`ojnh
|hs em oj~mnm E`z Hskídjom ` `dop`d~sm mejd`mnh ohd `e n` em Njs`o~jrm$
@d gm~`sjm n` cjhg`~sçm `e Ksp|h n` ^smcmih os`mnh |hs `e ms~çopeh 3: n` emNjs`o~jrm;
2 Njs`o~jrm :0(>2(O@ n`e \msemg`d~h @psh|`h z n`e Ohd`ih n` 3> n` ho~pcs`$ N$H$P$@$ `sj` E dùg$ 31= n` 3? n`dhrj`gcs` n` =::0$
am `emchsmnh pd Nhopg`d~h n` ^smcmih hcs` Cjhg`~sçm n` b`oam = n`
mkh~h n` 3<<?$ _p |sh|ÿj~h ` ohd~sjcpjs m em m|ejomojÿd `bjomy z msghdjhm n` em
nj|hjojhd` dmojhdme` hcs` |sh~`oojÿd n` nm~h mnh|~mnm n` mop`snh ohd em
Njs`o~jrm m eh j~`gm cjhgê~sjoh$ _` o`d~sm |sjdoj|meg`d~` `d em m|ejomojhd`
cjhgê~sjom |msm bjd` n` mp~`d~jomojÿd z ohg|shcmojÿd$ N` `~m gmd`sm `e Ksp|h
n` ^smcmih n`e ms~çopeh 3: |s`~`dn` |sh|hsojhdms pdm hsj`d~mojhd` `psh|`m
; Ksp|h os`mnh `d rjs~pn n`e ms~çopeh 3: n` em Njs`o~jrm :0(>2(O@ ohd~j~pjnh ohgh `e ÿskmdh m`hs ohgpdj~msjhjdn`|`dnj`d~` hcs` |sh~`oojÿd n` nm~h z n` em rjnm |sjrmnm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 70/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
pdjbhsg` `|`ojmeg`d~` |msm `e `o~hs n` eh j~`gm cjhgê~sjoh z |msm eh
ppmsjh n` ~m ~`odhehkçm$
JJ$ S`kemg`d~h hcs` Dhsgm |msm em g`njnm n` `kpsjnmn z nm~h cjhgê~sjoh`d eh |mm|hs~` z nhopg`d~h n` rjmi` `q|`njnh |hs eh @~mnhgj`gcsh1
^j`d` |hs hci`~h em msghdjymojÿd n` em g`njnm n` `kpsjnmn `d~s` em }p` `
`dop`d~smd eh jn`d~jbjomnhs` cjhgê~sjoh z |msm `eeh s`ohk` n`~`sgjdmnm
`|`ojbjomojhd` n` omsío~`s ~êodjoh$
1$=$3 Dhsgm~jrm |mýhem
^hgmdnh ohgh s`b`s`dojm em jdnjomojhd` |shr`dj`d~` n` em Pdjÿd @psh|`m em
e`kjemojÿd `|mýhem am n`mssheemnh pdm `sj` n` dhsgm~jrm `d s`emojÿd me ~sm~mgj`d~hn` nm~h n` omsío~`s |`shdme jdoepzêdnh` `d `eeh eh nm~h cjhgê~sjoh$
@~m dhsgm~jrm `~í cmmnm `d em E`z Hskídjom n` \sh~`oojÿd n` Nm~h p S`kemg`d~h
n` N`mssheeh z em Jd~spoojhd` z S`hepojhd` n` em Mk`dojm @|mýhem n` \sh~`oojÿd
n` Nm~h !M@\N*$
J$ E`z Hskídjom =0(=:::% n` =? n` njoj`gcs`% n` \sh~`oojÿd n` Nm~h n` Omsío~`s\`shdme z S`me N`os`~h =;3<(3<<;% n` 3= n` njoj`gcs`% |hs `e }p` ` m|sp`cm`e S`kemg`d~h n` N`mssheeh n` em EH\N:
_` ~sm~m n` em dhsgm~jrm |sjghsnjme` `d opmd~h m |sh~`oojÿd n` nm~h |`shdme` `d
@|mým z n`bjd`d eh nm~h n` omsío~`s |`shdme ohgh ―opme}pj`s jdbhsgmojÿd
ohdo`sdj`d~` m |`shdm bçjom jn`d~jbjomnm h jn`d~jbjomce` ‗$ \msm p |sh~`oojÿd
`~mce`o`d pdm `sj` n` hcejkmojhd` z |sjdoj|jh n` hcejkmnh opg|ejgj`d~h |msm ~hnm
m}p`eem `d~jnmn` h `g|s`m ~md~h n`e `o~hs |ùcejoh ohgh |sjrmnh }p` ~sm~`d nm~h
n` omsío~`s |`shdme |msm `e n`mssheeh n` p mo~jrjnmn9
‣ N`c`s n` jdosj|ojÿd n` bjoa`sh `d `e S`kj~sh K`d`sme n` em M@\N6
‣ N`c`s n` jdbhsgmojÿd m eh mb`o~mnh6
‣ N`c`s n` hc~`dojÿd n`e ohd`d~jgj`d~h n`e jd~`s`mnh6
‣ \sjdoj|jh n` omejnmn n` eh nm~h ~sm~mnh6
‣ S`|p`~m me `i`sojojh n` eh n`s`oah n` moo`h s`o~jbjomojÿd omdo`emojÿd z
h|hjojÿd |hs |ms~` n` eh jd~`s`mnh !ohdhojnh ohgh n`s`oah MSOH*$
1S`kemg`d~h !O@* 3<<>(3303(O@ n` =? n` njoj`gcs` n`e Ohd`ih$ Ghnjbjomnh |msojmeg`d~` |hs `e S`kemg`d~h !O@* D¹>>>(3<<: n`e \msemg`d~h @psh|`h z n`e Ohd`ih n` 31 n` gmzh n` 3<<:$: C$H$@$ dùg$ 3:1 n` => n` njoj`gcs` n` =::: z C$H$@$ dùg$ =; n` =: n` `d`sh n` 3<<; s`|`o~jrmg`d~`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 71/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ Hcejkmojÿd n` jg|emd~mojÿd n` g`njnm n` `kpsjnmn `d~s` h~sm$
_`kùd eh `q|`s~h ohdpe~mnh `d `e ígcj~h n` em cjhg`~sçm ` `|`ojmeg`d~` s``ýmce`
`e ms~çopeh 2$= n` em EH\N `e opme `~mce`o` ohd omsío~`s k`d`sme em d`o`jnmn n` emhc~`dojÿd n`e ohd`d~jgj`d~h n`e mb`o~mnh |msm `e ~sm~mgj`d~h n` p nm~h n` omsío~`s
|`shdme$
Dh hc~md~` n` ohdbhsgjnmn ohd `e ms~çopeh 2$3 n` em EH\N dh `sí d`o`msjh `e
ohd`d~jgj`d~h `d~s` h~sh p|p`~h opmdnh eh nm~h ―` s`bj`smd m em |ms~` n` pd
ohd~sm~h h |s`ohd~sm~h n` pdm s`emojÿd d`khojme% emchsme h mngjdj~sm~jrm z `md
d`o`msjh |msm p gmd~`djgj`d~h h opg|ejgj`d~h ‗$ @d em |sío~jom |hs `i`g|eh dh `sí
d`o`msjh `e ohd`d~jgj`d~h |msm ~sm~ms eh nm~h |`shdme` n` pd ~smcmimnhs opmdnh
njoah ~sm~mgj`d~h `~ê s`emojhdmnh ohd `e gmd~`djgj`d~h z opg|ejgj`d~h n` em s`emojÿdemchsme !|mkh n` dÿgjdm ohd~she ahsmsjh `~o$*$
@ `d `e ^ç~peh RJJJ S`kemg`d~h n` N`mssheeh nhdn` ` n`~meemd em g`njnm n` `kpsjnmn
n` omsío~`s bçjoh ~êodjoh z hskmdjym~jrh n` djr`e cíjoh ( g`njh ( me~h }p` n`c`síd `s
jg|emd~mnm hcs` eh j~`gm cjhgê~sjoh z(p h~sh h|hs~` |hs |ms~` n` m}p`eem
`d~jnmn` h `g|s`m }p` ~sm~`d nm~h cjhgê~sjoh n` eh mb`o~mnh$
JJ$ Jd~spoojÿd =(=::2% n` = n` gmsyh% n` em M@\N% hcs` bjoa`sh `~mce`ojnhohd em bjdmejnmn n` ohd~shems `e moo`h m eh `njbjojh=<
@~m Jd~spoojÿd s`kpem n` gmd`sm `|`oçbjom eh nm~h n` omsío~`s |`shdme ~sm~mnh n`
bhsgm mp~hgm~jymnm }p` hd s`omcmnh |hs eh `srjojh n` `kpsjnmn ohd em bjdmejnmn n`
ohd~shems `e moo`h m eh `njbjojh |ùcejoh z |sjrmnh mç ohgh m `~mce`ojgj`d~h
`|`o~íopeh o`s~íg`d` z ohdr`dojhd`$
$
Em Jd~spoojÿd r`sm hcs` em e`kj~jgmojÿd n`e ~sm~mgj`d~h n` eh nm~h s`oh|jemnh `d
opg|ejgj`d~h n` em bpdojhd` n` rjkjemdojm em g`njnm n` `kpsjnmn }p` e` hd n`
m|ejomojÿd `e |`sjhnh `d }p` eh gjgh n`cmd `s ohd`srmnh z p |h~`sjhs
omdo`emojÿd |hs amc`s n`imnh n` `s d`o`msjh h |`s~jd`d~` |msm eh bjd` |msm eh }p`
bp`shd s`omcmnh$ @e ph n` j~`gm cjhgê~sjoh |msm `e ohd~she n` moo`h bçjohn`c`sí ~`d`s `d op`d~m `~m Jd~spoojÿd$
JJJ$ S`me N`os`~h =00?(3<<0% n` 3? n` njoj`gcs`% }p` S`kpem em `q|`njojÿd n`eNhopg`d~h Dmojhdme n` Jn`d~jnmn z p o`s~jbjomnh n` bjsgm `e`o~sÿdjom
@d s`emojÿd m eh nm~h cjhgê~sjoh ohd~`djnh `d `e Nhopg`d~h Dmojhdme n` Jn`d~jnmn
!N$D$J$* `~` S`me N`os`~h `~mce`o` dhsgm `d s`emojÿd ohd p `q|`njojÿd$
=< C$H$@$ dùg$ 23 n` =3 n` gmsyh n` =::2$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 72/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;3 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
_`kùd `~mce`o` p ms~çopeh 0 |msm |hn`s hejoj~ms em `q|`njojÿd n`e N$D$J$ `
jg|s`ojdnjce` em |s``dojm bçjom n` em |`shdm nmnh }p` `d `e ghg`d~h n` em hejoj~pn
me jd~`s`mnh ` e` s`ohk`síd em jg|s`jhd` nmo~jems` n` eh n`nh çdnjo` n` mgcm
gmdh$
Mjgjgh `kùd `ýmem `e ms~çopeh == `e oaj| jdohs|hsmnh m em ~msi`~m h|hs~` n`e N$D$J$
ohd~`dnsí `d~s` h~sm op`~jhd` em |emd~jeem n` em jg|s`jÿd nmo~jems n`e n`nh çdnjo` n` em
gmdh n`s`oam h `d p omh n`e n`nh }p` ohss`|hdnm `kùd eh jdnjomnh `d `e ms~çopeh
0$? n`e S`me N`os`~h$
JR$ Dhsgm~jrm mp~hdÿgjom
Nmnm em `qj~`dojm n` mekpdm mk`dojm n` |sh~`oojÿd n` nm~h m djr`e mp~hdÿgjoh `
d`o`msjh `ýmems }p` `qj~`d s`kpemojhd` `~mce`ojnm |hs ê~m n`d~sh n` p ígcj~hn` moojÿd$
‣ Ohgpdjnmn n` Gmnsjn9 E`z 1(3<<=% n` =? n` ipejh% n` \sh~`oojÿd n` Nm~h n`
Omsío~`s \`shdme `d em Ohgpdjnmn n` Gmnsjn ==
‣ \mç Rmoh9 E`z 3(3<<>% n` 30 n` b`cs`sh% n` Bjoa`sh n` Nm~h n` Omsío~`s
\`shdme n` ^j~pemsjnmn \ùcejom z n` Os`mojÿd n` em Mk`dojm Rmom n` \sh~`oojÿd
n` Nm~h
$
=3
‣ Om~mepým9 E`z ?3(3<=<% n` = n` ho~pcs`% n` em Mp~hsjnmn Om~memdm n` \sh~`oojÿd
n` Nm~h
$
=?
1$3 JDBHSG@_ IPSÇNJOH_ Z IPSJ_\SPN@DOJM
$
1$3$= Jdbhsg` ipsçnjoh z h~sh nhopg`d~h jd~`s|s`~m~jrh
\hs h~sh emnh `qj~`d njb`s`d~` Jdbhsg` ipsçnjoh ~md~h m djr`e `psh|`h ohgh dmojhdme
}p` nmd s`|p`~m m em |hjce` npnm hcs` `e `d~jnh s`me n` em dhsgm~jrm `d oj`s~h
m|`o~h$ @~h jdbhsg` `d gpoah omh s`|hdn`d m em ohdpe~m |emd~`mnm md~`
omh |sío~joh |hs eh }p` `i`g|ejbjomd `d ksmd g`njnm em |shce`gí~jom }p` ` n`c`d~`d`s `d op`d~m `d em jg|emd~mojÿd n` `~h j~`gm$
== Che`~çd Hbjojme n` em Ohgpdjnmn n` Gmnsjn n` 30 n` ipejh n` 3<<=$
=3 Che`~çd Hbjojme n`e \mç Rmoh dùg$ >> n` > n` gmsyh 3<<>$=? Njmsj Hbjojme n` em K`d`smej~m~ n` Om~mepdzm d¹$ 0;?= 1 n` ho~pcs` n` 3<=<$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 73/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
J$ Jdbhsg` n` j~pmojÿd s`em~jrh m em m|ejomojÿd n` eh |sjdoj|jh n` emOhdr`dojÿd =<1 m em s`ohkjnm z me |sho`h n` eh nm~h cjhgê~sjoh `gj~jnh`d @~smcpskh% `d b`cs`sh n` 3<<0% |hs `e Ohgj~ê Ohdpe~jrh n` em Ohgjjÿd
|msm em \sh~`oojÿd n` em \`shdm s`|`o~h me |sho`h mp~hgm~jymnh n` ehnm~h n` omsío~`s |`shdme
S`pe~mnh n` eh ~smcmih jdjojmnh `d `e mýh 3<<? |hs `e Ksp|h n` \shz`o~h hcs` em
\sh~`oojÿd n` Nm~h cmih em ~p~`em n`e Ohgj~ê @psh|`h n` Ohh|`smojÿd Ipsçnjom `
n`njom `|`oçbjomg`d~` me ~sm~mgj`d~h n` nm~h cjhgê~sjoh$
@d~s` em |sjdoj|me` ohdoepjhd` n`~mom }p` m ipjojh n`e Ksp|h md~` n` s`opssjs` m em
cjhg`~sçm `e s`|hdmce` n`e |sho`h n`c`sçm `rmepms |hs pdm |ms~` em r`d~mim `
jdohdr`dj`d~` |hjce` |msm em rjnm |sjrmnm n` em |`shdm mb`o~mnm z |hs h~sm em
bjdmejnmn` |s`rj~m mç ohgh ~`d`s `d op`d~m |hjce` hepojhd` me~`sdm~jrm }p`p|hdkmd pd g`dhs m~`d~mnh ohd~sm em rjnm |sjrmnm$ @d ohd`op`dojm eh nm~h
cjhgê~sjoh ~sm~mnh n`c`sçmd `s mn`opmnh |`s~jd`d~` z dh `qo`jrh `d ohg|msmojÿd
ohd em bjdmejnmn n`e |sho`h$
\hs h~sh emnh ` |hd` n` gmdjbj`~h }p` em |`shdm mb`o~mnm n`c`sçm `s jdbhsgmnm n` em
bjdmejnmn n`e j~`gm z n` em jn`d~jnmn n`e s`|hdmce` n` |sho`h mç ohgh n` eh nm~h
|sho`mnh z n` em om~`khsçm n` |`shdm m em }p` ` ohgpdjomsíd `h nm~h$
JJ$ Jdbhsg` Ipsçnjoh d¹ <?3>(3<<: hcs` `e ―Moo`h me nm~h ap`eem nmo~jems n``g|e`mnh n` pdm `g|s`m |hs h~sm$ @domskmnh n`e ~sm~mgj`d~h‗
S`|hdn` m pdm ohdpe~m |emd~`mnm m em M@\N `d s`emojÿd m em |hjcjejnmn n` jg|emd~ms
pd j~`gm |msm `e ohd~she ahsmsjh n` eh ~smcmimnhs` cmmnh `d em e`o~psm n` em ap`eem
njkj~me z p ohdbhsgjnmn ohd eh nj|p`~h `d em EH\N z `d `e SNEH\N$
@d ohdos`~h em M@\N mdmejym `e p|p`~h `d }p` `e s`|hdmce` n` njoah j~`gm pdm
n` em ohgpdjnmn` }p` ohg|hd`d pdm gmdohgpdjnmn `dohg`dnm` m em oj~mnm
gmdohgpdjnmn `e ~sm~mgj`d~h n`e nm~h n` em ap`eem nmo~jems n` p ~smcmimnhs` ohd em
bjdmejnmn `|`oçbjom n` ohd~she ahsmsjh n` ~smcmih$ Md~` `~` omh em M@\N ohdjn`sm
d`o`msjh posjcjs `e ohd~sm~h n` `domskmnh n`e ~sm~mgj`d~h |s`rj~h `d ms~çopeh =3 n` em
EH\N z `d `e Om|ç~peh JJJ n`e ^ç~peh JJ n`e SNEH\N$
N` `~` ghnh em M@\N |hd` n` gmdjbj`~h }p` `d omh n` n`e`kms `e ~sm~mgj`d~h n` eh
nm~h cjhgê~sjoh m pd ~`so`sh ` `~msçm |shnpoj`dnh pd moo`h m nm~h |hs op`d~m n`
~`so`sh }p` amcsçm n` s`kpems` ohdbhsg` me ms~çopeh =3 n` em EH\N$
JJJ$ Jdbhsg` Ipsçnjoh d¹ <<13(3<=< hcs` em ―Os`mojÿd n` pdm cm` n` nm~h m~smrê n` em ap`eem nmo~jems }p`nm hg`~jnh m em EH\N‗
_j cj`d `~` jdbhsg` ` `gj~` ohd `e bjd n` nms s`|p`~m m em ohdpe~m hcs` j em os`mojÿd
n` pdm cm` n` nm~h ohd ap`eem nmo~jems n` eh oej`d~` me }p` ` h~hskm pd oÿnjkh
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 74/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
mebmdpgêsjoh n`c` s`kj~sms` `d em M@\N n` ohdbhsgjnmn ohd em EH\N `e oj~mnh
Hskmdjgh mchsnm em |sh|hsojhdmejnmn n` em mnh|ojÿd n` em s`b`sjnm g`njnm9
―V•W s`pe~m n`|sh|hsojhdmnh% em d`o`jnmn n` s`omcms em ap`eem nmo~jems |msm |s`~ms pd `srjojh ohg`sojme m eh oej`d~`% opmdnh njoah `srjojh |p`n`
|s`~ms` ohd h~sh g`njh g`dh jd~spjrh `d eh n`s`oah z ejc`s~mn` n`
eh oej`d~`% ~me` ohgh `e ph n` em ~msi`~m n` bjn`ejymojÿd ‗$
N` `~` ghnh em M@\N gp`~sm pdm njb`s`dojmojÿd `d~s` `e osj~`sjh `kpjnh `d eh
omh n` ohd~she n` |s``dojm n` `g|e`mnh z `e gmdjb`~mnh `d `e omh n`
s`emojhd` ohg`sojme`$
@~h |hd` n` gmdjbj`~h em jg|hs~mdojm z em njb`s`dojm e`kme` }p` ` |p`n`d
|emd~`ms `kùd eh ohd~`q~h `d }p` ` |s`~`dnmd m|ejoms em ~`odhehkçm
cjhgê~sjom$ H~sh `i`g|eh n` `eeh ` |p`n` hc`srms `d pd jdbhsg` `d `e }p` `
ohdjn`sm n`|sh|hsojhdmnh `e ph n` em ap`eem nmo~jems `d `e ohd~she n` mj~`dojm
n` eh mepgdh `d pd ohe`kjh=>
1$3$3 S`hepojhd` z _`d~`dojm gí s`e`rmd~`
$
\hs ùe~jgh ` s``ýmsí em jd~`s|s`~mojÿd bjdme }p` ~md~h em M@\N ohgh njb`s`d~`
~sjcpdme` n` ip~jojm `|mýhe` amd s`mejymnh md~` omh |ms~jopems` `d eh }p` `
`dop`d~sm jg|ejomnh `e ph n` j~`gm cjhgê~sjoh$
J$ S`hepojÿd n` msoajrh n` mo~pmojhd` n` em M@\N% n` 3= n` gmsyh n` 3<<2%ohss`|hdnj`d~` me @q|`nj`d~` D¹9 @(<<<0;(3<<0
Ejkmnm m pdm n`dpdojm |s``d~mnm ohd~sm pd Mzpd~mgj`d~h }p` n`ojnjÿ jd~mems pd
j~`gm n` ohd~she n` |s``dojm n` p |`shdme cmmnh `d em ap`eem nmo~jems$ @e
n`dpdojmd~` `q|hd` }p` dh ` am jdbhsgmnh ohdr`dj`d~`g`d~` m eh ~smcmimnhs` m em
rj~m n` eh `qjkjnh |hs `e ms~çopeh 0 n` em EH\N `d eh }p` s`|`o~m m em jg|emd~mojÿd n`
njoah j~`gm$ Mjgjgh ` n`dpdojm }p` ~mg|hoh ` am hejoj~mnh `e ohd`d~jgj`d~h
|msm `e ~sm~mgj`d~h n` eh nm~h }p` amd jnh s`}p`sjnh m eh ~smcmimnhs`$
\hs p |ms~` em M@\N ohdoepz` }p` ~`dj`dnh `d op`d~m em `qo`|ojÿd me n`c`s n`
hc~`dojÿd n`e ohd`d~jgj`d~h |s`rj~m `d `e ms~çopeh 2$3 n` em EH\N s`b`s`d~` m s`emojhd`
ohd~smo~pme`
―@d `e omh }p` ` `qmgjdm |ms`o` n`npojs` }p` `e ~sm~mgj`d~h me }p` `
amo` s`b`s`dojm ~sm` p hsjk`d% |s`ojmg`d~`% n` em d`o`jnmn n` m`kpsms `e
n`cjnh opg|ejgj`d~h n` em hcejkmojhd` n`sjrmnm n` em s`emojÿd
mngjdj~sm~jrm h emchsme }p` rjdopem me bpdojhdmsjh h |`shdme emchsme ohd em
=> Jdbhsg` Ipsçnjoh d¹ <?21(3<<2 n` em M@\N hcs` em ―\sh|hsojhdmejnmn n`e ~sm~mgj`d~h n` em ap`eem nmo~jems n` mepgdhn` pd ohe`kjh‗
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 75/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
`g|s`m% eh }p` pdjnh m eh am~m mahsm `ýmemnh |`sgj~` jg|e`g`d~ms njoah
~sm~mgj`d~h n` nm~h$
Dh hc~md~` eh `q|p`~h% n`c`sí nms` opg|ejgj`d~h m eh nj|p`~h `d `e ms~çopeh 0 n` em EH\N% nmnh }p`% j cj`d dh `sí |s`ojh `e ohd`d~jgj`d~h n`e
jd~`s`mnh% ç n`c`sí mnr`s~js` me gjgh n` eh `q~s`gh ohd~`djnh `d ``
|s`o`|~h V•W ‗$
Mç |p` em jd~`s|s`~mojÿd n` em dhsgm hcejkm `d `e omh n` ohd~she` n` |s``dojm
n` ~smcmimnhs` m jdbhsgms mn`opmnmg`d~` m eh ppmsjh dh mç s`|`o~h m em
d`o`jnmn n` s`omcms `e ohd`d~jgj`d~h `q|s`h j cj`d j`g|s` ` s`ohg`dnmce`
~me z ohgh amd `ýmemnh eh `q|`s~h ohdpe~mnh$
―Dh jdbhsgms mn`opmnmg`d~` n e ph }p` ` rm m nms m eh nm~h mn}pjsjnh z
p p~jejymojÿd jdnjosjgjdmnm hd |shce`gm jg|hs~md~` z m ~`d s d op`d~m‗
JJ$ S`hepojÿd n` msoajrh n` mo~pmojhd` n` em M@\N% n` 0 n` b`cs`sh n` 3<<:%ohss`|hdnj`d~` me @q|`nj`d~` D¹9 @(<<<=2(3<<;
\hd` n` gmdjbj`~h }p` em M@\N `d~j`dn` }p` ―em p~jejymojÿd n`e nm~h ohss`|hdnj`d~` m em
ap`eem nmo~jems z p |h~`sjhs ohdr`sjÿd `d pd |m~sÿd n` nm~h dh p|hd` pdm rped`smojÿd
n`e |sjdoj|jh n` omejnmn n` nm~h V•W ‗$
JJJ$ _`d~`dojm n` em Mpnj`dojm Dmojhdme !_mem n` eh Ohd~`dojhh'Mngjdj~sm~jrh%_`oojÿd =©*% n` > n` gmsyh n` 3<=<
^sm~m hcs` em |p`~m `d bpdojhdmgj`d~h n` pd dp`rh j~`gm n` ohd~she n` |s``dojm
ohdj~`d~` `d }p` `e ~smcmimnhs jd~shnpyom eh n`nh çdnjo` z ohsmyÿd n` p gmdh `d pd
~`sgjdme n` gmsomi`$ _`kùd `ýmem em Mpnj`dojm Dmojhdme ―` jdbhsgm hcs` em s`ohkjnm z
~sm~mgj`d~h n` nm~h |`shdme`% n` p bjdmejnmn z n`~jdh V•W z n`e s`|hdmce` n`e
~sm~mgj`d~h `d op`~jÿd V•W‗ $ Dh hc~md~` m em rj~m n` eh `qjkjnh |hs `e ms~çopeh 3< n` em
EH\N s`op`snm em Mpnj`dojm Dmojhdme }p` `sm ohdr`dj`d~` mo~pmejyms em n`oemsmojhd`
n` bjoa`sh n` ~j~pemsjnmn |ùcejom md~` em M@\N m bjd n` s`ohk`s `q|s`mg`d~` `d~s` pbjdmejnmn` em s`em~jrm me ohd~she ahsmsjh g`njmd~` nm~h cjhgê~sjoh$
JR$ _`d~`dojm n e ^sjcpdme n` Ip~jojm n` Mdnmepoçm% Ksmdmnm !_mem n` ehOhd~`dojhh'Mngjdj~sm~jrh% _`oojÿd =©*% dùg$ 1;>(3<<;% n` ? n` njoj`gcs`
\hd` n` gmdjbj`~h }p`
―em s`ohkjnm n` eh nm~h cjhgê~sjoh |hs j~`gm jdbhsgí~joh% ap`eem nmo~jems
njkj~mejymnm z `e msoajrh n` p nm~h `d pdm ~msi`~m% dh rped`smd p n`s`oah
bpdnmg`d~me V`d s`emojÿd me n`dpdojmd~`W |p`~h }p` dj j}pj`sm ` ~sm~m n`
hg`~`s me pi`~h m h|`smojhd` }p` e` mb`o~`d bçjomg`d~`% bp`sm n`e
ghg`d~h n` s`o`|ojÿd n` em ap`eem% |p`~h }p` ` ~sm~m n` pdm ~msi`~m ohd
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 76/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
`h nm~h `dosj|~mnh z dh n`e j~`gm ÿ|~joh n` `oíd`s n` em gmdh% |hs
~md~h `d~j`dn` `e ipykmnhs% }p` ` amd opg|ejnh ~hnh eh ohd~she` z em
kmsmd~çm |s`ojm |msm mermkpmsnms `e n`s`oah bpdnmg`d~me m em jd~jgjnmn z
m em |sjrmojnmn V•W ‗$
@d s`pg`d z `d cm` m ~hnh eh md~`sjhs em M@\N z eh ~sjcpdme` ohg|`~`d~` `d p
Jdbhsg` Ipsçnjoh S`hepojhd` z _`d~`dojm hcs` em gm~`sjm `d~j`dn`d }p` eh
jkpj`d~` s`}pjj~h amcsçmd n` ~`d`s` `d op`d~m m em ahsm n` `b`o~pms ~sm~mgj`d~h n`
nm~h cjhgê~sjoh9
‣ @e ~sm~mgj`d~h n` nm~h am n` `s e`kç~jgh$
‣
@d ê~` `d~jnh ` ohdjn`sm e`kç~jgh
`e ~sm~mgj`d~h n` em ap`eem nmo~jems n` ~smcmimnhs` m eh `b`o~h n` ee`rms m omch
mo~jrjnmn` n` ohd~she ahsmsjh$ \hs `e ohd~smsjh dh ` ohdjn`sm |`s~jd`d~` `e~sm~mgj`d~h n` em ap`eem nmo~jems n` oej`d~` |msm em |s`~mojÿd n` `srjojh
ohg`sojme` h n` mepgdh ohd rj~m m ohd~shems p mj~`dojm m pd o`d~sh
`ohems$
D`o`jnmn n` jdbhsgms me jd~`s`mnh
‣
mo`som n`e ~sm~mgj`d~h n` nm~h pczmo`d~`
ohdbhsg` me ms~çopeh 0 n` em EH\N$
@ d`o`msjh `e ohd`d~jgj`d~h n`e ppmsjh merh `d oj`s~h omh$
‣
Dh `sí
d`o`msjh `e ohd`d~jgj`d~h n` jd~`s`mnh |msm `e ~sm~mgj`d~h n` p nm~h
cjhgê~sjoh j`g|s` z opmdnh ohd njoah ~sm~mgj`d~h ` |s`~`dnm nmsopg|ejgj`d~h m em hcejkmojhd` n`sjrmnm n` em s`emojÿd ohd~smo~pme pczmo`d~`$
D`o`jnmn n` jdosj|ojÿd n` pd bjoa`sh md~` em M@\N
‣
}p` opcsm njoah ~sm~mgj`d~h
h `r`d~pmeg`d~` ghnjbjomojÿd n` pd bjoa`sh `qj~`d~` |msm nms s`be`ih m em
bjdmejnmn` z om~`khsçm n` nm~h ~sm~mnm$
N`e`kmojÿd n` ~sm~mgj`d~h$
1$? @_^ÍDNMS@_ JD^@SDMOJHDME@_
_j pd ~`so`sh ~j`d` moo`h m eh nm~h m eh `b`o~h n`
|s`~ms `e `srjojh n` s`ohkjnm n` eh gjgh `sí ohdjn`smnh pd `domskmnh n`
~sm~mgj`d~h z amcsí n` opg|ejs` ohd eh nj|p`~h cmih `e ms~çopeh =3 n` em EH\N$
Mn`gí n` em e`kjemojÿd rjk`d~` `qj~`d h~sm s`kpemojhd` ê~m dh rjdopemd~` dj n`
hcejkmnh opg|ejgj`d~h }p` ` mohd`imce` `kpjs$ _` ~sm~m n` eh `~ídnms` ~êodjoh
}p` ` |emd~`md |msm omnm pdm n` em ~`odhehkçm z ~êodjom cjhgê~sjom$
Eh `~ídnms` cjhgê~sjoh `|`ojbjomd em ohdnjojhd` d`o`msjm |msm }p` em
~`odhehkçm cjhgê~sjom |p`nmd `s `bjomo` ` jd~`sh| smce`$ Mnjojhdmeg`d~` n`osjc`d
gê~hnh |msm p jd~`ksmojÿd ohd eh j~`gm n` jn`d~jbjomojÿd z mp~`d~jomojÿd z |msm `ejd~`somgcjh n` jdbhsgmojÿd `d~s` j~`gm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 77/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Em `~mdnmsjymojÿd `d `e ís`m n` em cjhg`~sçm ` g`dh mrmdymnm }p` `d em ~msi`~m
jd~`ejk`d~` !gms~omsn * |`sh n`cjnh m em d`o`jnmn jdgjd`d~` ` `~í mo`e`smdnh `e
|sho`h$ @~` |sho`h `~í jg|pemnh |hs `e `o~hs |sjrmnh |hs hskmdjymojhd` n`
`~ídnms` jd~`sdmojhdme` mç ohgh |hs mk`dojm kpc`sdmg`d~me` n` |heç~jom z
`~ídnms`$ Em |sjdoj|me` hd9
‣ MD_J(JDOJ^_$ Mg`sjomd Dm~jhdme _~mdnmsn Jd~j~p~` ( Jd~`sdm~jhdme Ohggj~~`` bhs
Jdbhsgm~jhd ^`oadhehkz _~mdnmsn !MD_J(JDOJ^_* ^`oadjome Ohggj~~`` G=%
Cjhg`~sjo }p` ~mgcjêd mo~ùm ohgh `e MD_J‚ ^`oadjome Mnrjhsz Kshp| |msm `e
J_H(J@O Ihjd~ ^`oadjome Ohggj~~`` $
‣ J_H(J@O$ Jd~`sdm~jhdme _~mdnmsn Hskmdjym~jhd ( Jd~`sdm~jhdme @e`o~sh~`oadjome
Ohggjjhd !J_H(J@O* I^O =(_O ?; hd Cjhg`~sjo $
‣ D^_O$ P_ Dm~jhdme _oj`do` " ^`oadhehkz Ohpdoje !D_^O* _pcohgj~ê n`
Cjhg`~sçm z K`~jÿd n` Jn`d~jnmn`$ _` am `~mce`ojnh }p` em jdjojm~jrm
cjhgê~sjom n`e khcj`sdh n` @~mnh Pdjnh ` cmmsíd `d eh `~ídnms`
cjhgê~sjoh n`e MD_J(JDOJ^_ z n`e J_H(J@O$
‣ PF Csj~ja _~mdnmsn Jd~j~p~` !C_J*$ Mk`dojm dmojhdme n` `~ídnms` n` S`jdh
Pdjnh$ Ohemchsm ohd `e PF‚ ^`oadjome Mnrjhsz Kshp| |msm `e J_H(J@O Ihjd~
^`oadjome Ohggj~~`` $
‣ JOMH$ Pdj~`n Dm~jhd Jd~`sdm~jhdme Ojrje Mrjm~jhd Hskmdjym~jhd !JOMH* `~mce`o`
eh `~ídnms` n` jd~`ksmojÿd n` em cjhg`~sçm `d eh |mm|hs~` `e`o~sÿdjoh n`
mop`snh ohd `e JDOJ^_ z `e J_H(J@O$
‣ DJ_^$ ^a` P_ Dm~jhdme _~mdnmsn Jd~j~p~` $ Mk`dojm @~mnhpdjn`d` }p`
n`mssheem eh `~ídnms` ~êodjoh n`e khcj`sdh jdoepz`dnh m}p`eeh }p` mb`o~md
m ~`odhehkçm cjhgê~sjom$ Eh `~ídnms` n`e DJ_^ ` `~mce`o`d n` mop`snh m
eh n`e JDOJ^_ z n`e J_H(J@O$
@qj~`d `rmepmojhd` n` ~`so`sh hcs` gpoam n` em ~`odhehkçm cjhgê~sjom |`sh em
|pcejomojÿd n` `~ídnms` |msm em `rmepmojÿd }p` bmojej~`d pdm ohg|msmojÿd bjmce` `d~s`
nj~jd~h j~`gm cm~md~` s`oj`d~`$
Eh |sjdoj|me` `~ídnms` `qj~`d~` |msm em njb`s`d~` ~`odhehkçm ` s`be`imd `d em
jkpj`d~` ~mcem9
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 78/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
^mcem ;9 \sjdoj|me` `~ídnms` `qj~`d~`
M|`o~h @~ídnms`
Jgmk`d n` em ap`eem
nmo~jems
‣ J_H(J@O =:;:>'> Bhsgm~h n` jd~`somgcjh n` nm~h cjhgê~sjoh$ \ms~` >9Jdbhsgmojÿd n` jgmk`d bmojme$
‣ M_DJ JDOJ^_ ?1='3<<> Bhsgm~h n` jd~`somgcjh n` jdbhsgmojÿd n`e n`nh$
Gjdpojm n` em ap`eem
nmo~jems
‣ J_H(J@O =:;:>'3 Bhsgm~h n` jd~`somgcjh n` nm~h cjhgê~sjoh$ \ms~` 39Jdbhsgmojÿd n` em gjdpojm n` em ap`eem nmo~jems$
‣ MD_J JDOJ^_ ?;1'3<<> Bhsgm~h n` em gjdpojm n`e n`nh |msm jd~`somgcjh n`nm~h$
‣ MD_J JDOJ^_ ?;;'3<<> Bhsgm~h n` jd~`somgcjh n` em jdbhsgmojÿd cíjomn`e |m~sÿd n`nh$
S`ohdhojgj`d~h
bmojme
‣ MD_J JDOJ^_ ?10'3<<> Bhsgm~h n` s`ohdhojgj`d~h bmojme |msm jd~`somgcjhn` nm~h$
‣ J_H(J@O =:;:>'0 Bhsgm~h n` jd~`somgcjh n` nm~h cjhgê~sjoh' \ms~` 09Jdbhsgmojÿd n` em jgmk`d bmojme$ S`ohdhojgj`d~h n`
jsj
‣ H_\(J@O =:;:>'2 Bhsgm~h n` jd~`somgcjh n` nm~h cjhgê~sjoh'\ms~` 29Jdbhsgmojÿd n` em jgmk`d n`e jsj$ Mýmnjs pdm kpçm n` jg|e`g`d~mojÿd |msm`|`ojbjoms `e ph n` s`|s``d~mojÿd oms~`jmdm$
H~sm ~`odhehkçm
‣ MD_J(DJ_^ J^E ='3<<< Bhsgm~h n` em jdbhsgmojÿd |msm `e jd~`somgcjh n`ap`eem nmo~jems bmojme ojom~sjo` z ~m~pmi` !_G^*$
‣ JD_J(DJ_^ J^E ='3<<; Bhsgm~h n` em jdbhsgmojÿd |msm `e jd~`somgcjh n`ap`eem nmo~jems bmojme z h~sh ~j|h n` nm~h cjhgê~sjoh'\ms~` =$
‣ MD_J JDOJ^_ ?:2'3<<0 Bhsgm~h |msm `e jd~`somgcjh n` nm~h n` emk`hg`~sçm n` em gmdh$
‣ MD_J JDOJ^_ ?:0'3<<0 Bhsgm~h |msm `e jd~`somgcjh n` nm~h cjhgê~sjoh'Nm~h n` em bjsgm$
Jd~`sbmo` ~êodjoh
‣ J_H(J@O =:;1>'= CJHM\J' Jd~`sbmy n` |shksmgmojÿd n` em m|ejomojÿdcjhgê~sjom ‟ \ms~` =9 @|`ojbjomojÿd CjhM\J$‣ J_H(J@O =:;1>'3 Jd~`sbmy n` |shksmgmojÿd n` em m|ejomojÿd cjhgê~sjom
!CjhM\J* ‟ \ms~` 39 Jd~`sbmy n`e |shr``nhs n`e msoajrh cjhgê~sjoh$‣ J_H(J@O =:;10'=93<<29 Gmsoh ohgùd n` jd~`somgcjh n` bhsgm~h
cjhgê~sjoh' \ms~` =9 @|`ojbjomojÿd n` eh `e`g`d~h n` em jdbhsgmojÿd$‣ J_H(J@O =:;10'39 3<<29 Gmsoh ohgùd n` jd~`somgcjh n` bhsgm~h
cjhgê~sjoh' \ms~` 39 \sho`njgj`d~h |msm em mp~hsjymojÿd n` s`kj~shcjhgê~sjoh$
‣ MD_J JDOJ^_ ?01'3<<3 @|`ojbjomojÿd CjhM\H !R`sjhd =$=*$‣ MD_J JDOJ^_ ?:1'3<<0 VDJ_^JS 203:'MW$ Gmsoh ohgùd n` jd~`somgcjh n`
bhsgm~h cjhgê~sjoh$ !OC@BB*
S`dnjgj`d~h
‣ MD_J JDOJ^_ ><:$='3<<0 S`|hs~` z ~`~`h n`e s`dnjgj`d~h cjhgê~sjoh'\ms~`=9 \sjdoj|jh z gmsoh$
‣ MD_J JDOJ^_ ><:$3'3<<0 S`|hs~` z ~`~`h n`e s`dnjgj`d~h cjhgê~sjoh$ \ms~`39 S`|hs~` z ~`~`h n` em ~`odhehkçm$
‣ MD_J JDOJ^_ ><:$?'3<<0 S`|hs~` z ~`~`h n`e s`dnjgj`d~h cjhgê~sjoh$ \ms~`?9 S`|hs~` z ~`~`h n`e `o`dmsjh$
‣ MD_J JDOJ^_ ><:$> S`|hs~` z ~`~`h n`e s`dnjgj`d~h cjhgê~sjoh$ \ms~` >9G`~hnhehkçm n` em h|`sm~jrm n` ~`~`h$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 79/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm ;: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
: K@_^JßD N@ SJ@_KH_
:$= MG@DMYM_ Z RPED@SMCJEJNMN@_ @D EH_ \SHO@_H_Em jg|emd~mojÿd z `e `g|e`h n` ~`odhehkçm cjhgê~sjom `~íd `q|p`~h m pdm `sj` n`
sj`kh mekpdh `|`oçbjoh z h~sh ohg|ms~jnh ohd em n`gí ~`odhehkçm z ~êodjom n`
jn`d~jbjomojÿd$ M ohd~jdpmojÿd ` jn`d~jbjomd em mg`dmym z rped`smcjejnmn`
`|`ojmeg`d~` n`~momce` `kùd eh `q|`s~h `d em gm~`sjm }p` |p`n`d ohg|shg`~`s em
`kpsjnmn h em ohdbjmdym `d eh j~`gm cjhgê~sjoh$
Mn`gí mekpdh j~`gm cjhgê~sjoh mo~pme` op`d~md ohd oj`s~m ejgj~mojhd` ~me`
ohgh dh `s om|mo` n` m~jbmo`s em omnm r`y gmzhs` n`gmdnm n` omskm n` ~smcmih
h ohd~ms ohd njbjope~mn` n` jd~`sh|`smcjejnmn `d~s` j~`gm ~me z ohgh mbjsgmd mekpdh`d~s`rj~mnh$ @~m oms`dojm n`gp`~smd em d`o`jnmn n` pd gmzhs n`mssheeh z em
m|ejomojÿd n` g`njnm n` `kpsjnmn `|`oçbjom$
:$=$= Mg`dmym
Em ~`odhehkçm cjhgê~sjom ohgh `e s`~h n` ~`odhehkçm `~íd `q|p`~m m pdm `sj`
n` mg`dmym$ @~m |p`n`d `s `qoepjrm h ohg|ms~jnm ohd h~sm ~`odhehkçm n`
mp~`d~jomojÿd$ Em gí n`~momnm ` n`mssheemd m ohd~jdpmojÿd$
\êsnjnm h shch n` jdbhsgmojÿd cjhgê~sjom
@e shch n` jdbhsgmojÿd ` `|`ojmeg`d~` `djce `d `e omh n` em cjhg`~sçm me ~sm~ms` n`
jdbhsgmojÿd `qoepjrm z `q~s`gmnmg`d~` ejkmnm me jdnjrjnph |hs eh }p` `e shch n` em
gjgm p|hd` pd jdojn`d~` n` `kpsjnmn ksmr`$ M njb`s`dojm n` em ohd~sm`ým h em
~msi`~m |`shdme` eh smkh cjhgê~sjoh hd jdrmsjmce` !ohgh s`kem k`d`sme* |hs eh
}p` p dùg`sh ` ejgj~mnh m eh emskh n`e ~j`g|h jd |hjcjejnmn n` s`dhrmojÿd z `d
ohd`op`dojm p ohdbjn`dojmejnmn ` ``dojme$
_p|emd~mojÿd n` jn`d~jnmn
_` ~sm~m n`e ph n` jdbhsgmojÿd cjhgê~sjom shcmnm h bmejbjomnm ohd `e |sh|ÿj~h n`
moo`n`s m `|mojh h m|ejomojhd` s`~sjdkjnm bmejbjoms `e ohd~she n` |s``dojm
`dgmomsms h p|emd~ms pdm |`shdmejnmn `~o$ @ n` `|`ojme ksmr`nmn opmdnh ` p~jejym
|msm ohg`~`s pd osjg`d zm }p` p s`|pnjh s`pe~m ohg|ejomnh$
_mch~mi`
\p`n`d nms` m~m}p` me `dhs n` bhsgm ohdoj`d~` |msm ~sm~ms n` jg|`njs p
bpdojhdmgj`d~h$ Bs`op`d~`g`d~` em ompm n` `~h m~m}p` ` pdm `q|s`jÿd n`e
n`mop`snh h n`ohd~`d~h ohd em jg|emd~mojÿd n` cjhg`~sçm |s`ojmg`d~` n`cjnh m em me~mbjmcjejnmn }p` hbs`o` `e j~`gm m em ahsm `rj~ms ohdnpo~m bsmpnpe`d~m z moo`h dh
mp~hsjymnh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 80/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Jdopg|ejgj`d~h n` s`}p`sjgj`d~h e`kme`
Eh smkh cjhgê~sjoh ` ohdjn`smd nm~h n` omsío~`s |`shdme |hs eh }p` p
~sm~mgj`d~h ` `dop`d~sm s`kpemnh |hs em E`z Hskídjom n` \sh~`oojÿd n` Nm~h !EH\N* zp S`kemg`d~h n` N`mssheeh !SNEH\N*$ @d ohd`op`dojm n` pd ~sm~mgj`d~h
jdmn`opmnh |p`n` n`sjrms `d pd jdopg|ejgj`d~h dhsgm~jrh ohd em ohd`op`d~`
`q|hjojÿd m mdojhd` z `e n`~`sjhsh n` em jgmk`d n` em `d~jnmn$
M |`ms n` }p` `~h nm~h ` amd ohdjn`smnh ohd omsío~`s k`d`sme ohgh ―n`
|sh~`oojÿd cíjom‗ n` ohdbhsgjnmn ohd `e SNEH\N j`dnh `}pj|msmce` m pdm jg|e`
njs`oojÿd h pd dùg`sh n` ~`eêbhdh j`g|s` ` mohd`imce` ~sm~ms `~h nm~h ohd em
gíqjgm omp~`em z |sh~`oojÿd |hjce`$
\`so`|ojÿd n` bme~m n` |sjrmojnmn |hs |ms~` n` eh ppmsjh
\p`n` ~sm~ms` n` pdm n` em |sjdoj|me` mg`dmym zm }p` j eh ppmsjh dh ohdbçmd `d
`~m ~`odhehkçm ` njbjope~msçm `d cp`dm g`njnm p jg|emd~mojÿd$ @d gpoah omh `e
ppmsjh bjdme h~hskm m `~h nm~h pdm me~m `djcjejnmn |hs `~ms `q~s`gmnmg`d~` ejkmnh
m p |`shdm$ \hs `eeh ` n`c` `ohk`s `e ghnh gí mn`opmnh |msm p jg|emd~mojÿd `d
rjs~pn m njb`s`d~` omsmo~`sç~jom$
@d em jkpj`d~` ~mcem ` ohg|msm `e jg|mo~h n` em mp~`d~jomojÿd cjhgê~sjom `d em
|sjrmojnmn d bpdojÿd n` njb`s`d~` bmo~hs`9
^mcem 19 Jg|mo~h `d em |sjrmojnmn
Jg|mo~h `d em|sjrmojnmn
\sho`h ^j|h n` ~`odhehkçm Gp`~sm^j|h n` cm` n`
nm~h
Me~h Jn`d~jbjomojÿd BjjheÿkjomJgmk`d
cjhgê~sjom
Cm` n` nm~hksmdn`(
o`d~smejymnm
Cmih R`sjbjomojÿd N` ohg|hs~mgj`d~h Gp`~smojbsmnm
Cm` n` nm~h|`}p`ým( ehome`
Bp`d~`9 JD^@OH
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 81/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1= n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Jnhd`jnmn n` em jg|emd~mojÿd
_`kùd eh `q|`s~h ohdpe~mnh ` ohgpdg`d~` os`jnh n` gmd`sm `ssÿd`m }p` pd
j~`gm cjhgê~sjoh kmsmd~jym em `kpsjnmn ~h~me z }p` ` em hepojÿd m opme}pj`s |shce`gmn` `kpsjnmn$ Em jg|emd~mojÿd n` ~`odhehkçm cjhgê~sjom p|hd` pd ohdjn`smce` oh~`
`ohdÿgjoh z pdm jg|ejomojÿd n` |`shdme `|`oçbjomg`d~` n`njomnh m `eeh npsmd~` em bm`
jdjojme$ \hs `eeh ` d`o`msjh s`mejyms pd mdíejj |msm `rmepms em r`snmn`sm d`o`jnmn
`o`dmsjh mn`opmnh n` jg|emd~mojÿd z `e c`d`bjojh ehksmnh bs`d~` me oh~` jdopssjnh zm
}p` ` |hjce` }p` ê~m dh `m em hepojÿd gí mn`opmnm |msm ~hnh eh omh$
Omejnmn n` em ~`odhehkçm
_j em omejnmn n` em ~`odhehkçm jg|emd~mnm dh meomdym eh djr`e` s`ohg`dnmce` |hnsçm
momss`ms ksmr` cs`oam n` `kpsjnmn mç ohgh pd n`~`sjhsh dh~mce` n` em |`so`|ojÿd n`
em ~`odhehkçm n`cjnh m p gme bpdojhdmgj`d~h$ Eh `e`g`d~h }p` ` n`c`d ~`d`s `d
op`d~m me s`|`o~h hd9 em omejnmn n`e `dhs em `bjoj`dojm n`e mekhsj~gh n` ohg|msmojÿd
em `dosj|~mojÿd n`e megmo`dmgj`d~h n` gp`~sm hc~`djnm z em jd~`sh|`smcjejnmn ohd
h~sh j~`gm$
―@d gpoam homjhd`% ~hnh `e `o~hs pbs` n`cjnh m em `q|`sj`dojm
d`km~jrm `d n`~`sgjdmnh |shz`o~h }p` amd jnh ee`rmnh m omch jd
ohdjn`sms em d`o`jnmn n` em p~jejymojÿd n` pdm ~`odhehkçm n` omejnmn$ Em
dh~hsj`nmn |ùcejom }p` amcj~pmeg`d~` mohg|mým m eh |shz`o~h cjhgê~sjoh
` pd msgm n` nhce` bjeh‗
Jdojn`dojm ohd `e j~`gm
Omçnm n` em eçd`m n` ohgpdjomojÿd n`e |sh|jh j~`gm h n` eh j~`gm n` h|hs~`
!|hs `i`g|eh epy h j~`gm n` ohgpdjomojhd`* m~m}p` jdbhsgí~joh `~o$ @~h
|shce`gm mb`o~md n` bhsgm jgjems }p` me s`~h n` ~`odhehkçm$
Jdnj|hdjcjejnmn n` `dhs
_j `e moo`h h em mp~`d~jomojÿd ` s`mejymd `qoepjrmg`d~` g`njmd~` cjhg`~sçm ` n`ojs
dh `qj~` pd gê~hnh me~`sdm~jrh ohgh |p`n` `s `e ph n` ohd~sm`ým h ~msi`~m
|`shdme` `e bmeeh h mp`dojm n`e nj|hj~jrh n` mn}pjjojÿd n` gp`~sm p|hd` em
jg|hjcjejnmn n` mp~`d~jomojÿd h moo`h$ Pd `i`g|eh n` `~m j~pmojÿd ` pd ppmsjh }p`
~`dkm }p` moo`n`s n` bhsgm psk`d~` me ohss`h `e`o~sÿdjoh n`n` bp`sm n` em hbjojdm
g`njmd~` ap`eem nmo~jems |`sh dh nj|hdkm n` `dhs `d p hsn`dmnhs$
―Dpdom pd j~`gm n` mp~`d~jomojÿd n`c` `~ms cmmnh ùdjomg`d~` `d pd
smkh cjhgê~sjoh$ N`c`d `~mce`o`s` |sho`njgj`d~h n` psk`dojm }p`mec`skp`d em |hjcjejnmn n` jdnj|hdjcjejnmn n` eh `dhs`% h me a`oah n` }p`
em ~êodjom cjhgê~sjom `g|e`mnm dh ~`dkm pdm me~m pdjr`smejnmn‗
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 82/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 13 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Me~`smojÿd ohd ídjgh bsmpnpe`d~h n` eh smkh cjhgê~sjoh
Me~`smojhd` `d em ap`eem nmo~jems` `d `e r`eeh bmojme `d em op`snm rhome` `~o$ ohd
`e hci`~jrh n` `rj~ms `s s`ohdhojnh |hs pd j~`gm cjhgê~sjoh$ @ pdm |sío~jom bs`op`d~``d eh jd~`d~h n` `d~smnm je`kme `d pd |mç ~sm~mdnh n` `epnjs em jn`d~jbjomojÿd n` pd
jdnjrjnph s`jdojn`d~`$
―@d mekpdm bshd~`sm ohdbejo~jrm% em |`shdm ee`kmd m mcsmms p ap`eem
nmo~jems` ohd `e hci`~jrh n` dh `s s`ohdhojnh |hs em mp~hsjnmn` z dh `s
`domso`emnh‗
Rmsjmojÿd jdrhepd~msjm `d eh smkh cjhgê~sjoh
Eh omgcjh `d eh smkh cjhgê~sjoh ohgh rmsjmojhd` n` em rhy r`eeh bmojme h `e|`jdmnh ~mgcjêd po`n`d n` bhsgm dm~psme$ @d `~h omh `e ppmsjh dh ~j`d` jd~`dojÿd
n` `dkmýms me j~`gm$ Dh hc~md~` `~h omgcjh |p`n`d njbjope~ms `e |sho`h n`
jn`d~jbjomojÿd z k`d`sms jdoeph pdm |`so`|ojÿd d`km~jrm |msm `e ppmsjh$
―@ d`o`msjh ohdjn`sms em rmsjmce` ~j`g|h `d `e nj`ýh n` pd j~`gm n`
mp~`d~jomojÿd cjhgê~sjoh‗
@q|`sj`dojm n` ph d`km~jrm !pmcjejnmn*
Pd gme ph jdrhepd~msjh n`e `dhs s`mejymnh |hs pdm |`shdm jd eh ohdhojgj`d~hmn`opmnh |p`n` ~`d`s ohgh ohd`op`dojm em n`ohdbjmdym n`e ppmsjh `d em ~`odhehkçm
z `e mpg`d~h n` em ~mm n` `sshs n` em gjgm$
―@ d`o msjm bhsgmojÿd n` omsm m }p` eh `g|e mnh amkmd pd ph ÿ|~jgh n`
eh `dhs`‗
Bme~m n` mo`|~mojÿd ope~psme
@~m mg`dmym m|ms`o` `d n`~`sgjdmnh ksp|h n`ghksíbjoh opzm dhsgm hojme` h
s`ejkjhm dh bmrhs`o`d em ~hgm n` gp`~sm `d n`~`sgjdmnm ~êodjom$ \hs `i`g|eh `d
mekpdm ope~psm `e s`ohdhojgj`d~h bmojme dh ` ríejnh zm }p` dh ~hnh eh ojpnmnmdh
ee`rmd `e sh~sh me n`opcj`s~h6 `d h~sm em e`o~psm n` em ap`eem nmo~jems ` ohdjn`sm pdm
|sío~jom md~jajkjêdjom ~o$
―Dh a`gh `dohd~smnh ohd r`snmn`sh |shce`gm }p` n`~`sgjdmd `e êqj~h h
bsmomh n` dp`~sh |shz`o~h |hs dh amc`s `~pnjmnh em njb`s`d~`
ohdjn`smojhd` ope~psme`$ @~` bmo~hs ` `|`ojmeg`d~` osç~joh `d j~`gm
opzh ígcj~h gpdnjme‗
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 83/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
:$=$3 Rped`smcjejnmn`
M ohd~jdpmojÿd ` ej~md mekpdm rped`smcjejnmn` }p` mb`o~md d`km~jrmg`d~` ~md~h m em
jg|emd~mojÿd n` j~`gm n` s`ohdhojgj`d~h cjhgê~sjoh ohgh m p |sh|jh s`dnjgj`d~h$
@~m rped`smcjejnmn` ` njrjn`d `kùd `md ohgpd` m ~hnm em ~êodjom cjhgê~sjom h
`|`oçbjom n` mekpdm n` `eem$
^mcem :9 Rped`smcjejnmn`
^`odhehkçmcjhgê~sjom
Rped`smcjejnmn`
Rped`smcjejnmn`ohgpd` m ~hnmem ~`odhehkçmcjhgê~sjom
‣ Omejnmn cmim n` eh nj|hj~jrh n` om|~psm$‣ Pcjomojÿd jdmn`opmnm n`e nj|hj~jrh n` om|~psm$‣
N`ohdhojgj`d~h `d em omejnmn h n`e mcmdjoh n` |shnpo~h zp~jejnmn` nj|hdjce`$‣ Bme~m n` ohdhojgj`d~h ~êodjoh n`e |`shdme$‣ Bme~m n` s`opsh !~md~h n` |`shdme ohgh `ohdÿgjoh*$‣ @omm ohdoj`dojmojÿd `d gm~`sjm n` `kpsjnmn$‣ \`so`|ojÿd n` mp`dojm n` |sjrmojnmn |hs |ms~` n` eh ppmsjh$
Ap`eem nmo~jems
‣ Ohdnjojÿd n`e n`nh `d `e ghg`d~h n` ~hgms em gp`~sm9 ghimnh`oh gmdoamnh `~o$
‣ Ohdnjojhd` oejgm~heÿkjom }p` mb`o~md me e`o~hs9 apg`nmn~`g|`sm~psm `~o$
‣ Ohdnjojhd` n` em ap`eem9 ohs~` a`sjnm h jdbemgmojhd`$‣ Mo~jrjnmn emchsme9 ~smcmih }p` |p`nmd mb`o~ms m em ap`eem |hs `i`g|eh
`e ph amcj~pme n` |shnpo~h }pçgjoh }p` |p`nmd n`~`sjhsmsem$
S`ohdhojgj`d~hn` rhy
‣ @db`sg`nmn` n` em rhy9 cshd}pj~j bmsjdkj~j ksj|` emsjdkj~j mbhdçm`~o$
‣ Rmsjmojÿd `d~s` `e nj|hj~jrh n` s`kj~sh z `e pmnh `d em om|~psm n`gp`~sm$
‣ Rmsjmojÿd `d~s` `d~hsdh n` s`kj~sh z om|~psm n` gp`~sm !|hs`i`g|eh9 jd~`sjhs z `q~`sjhs*$
‣ Rhepg`d n`e amcem$
S`ohdhojgj`d~hbmojme
‣ Rmsjmojÿd `d `e m|`o~h bmojme9 |`jdmnh r`eeh kmbm hgcs`sh `~o$‣ Ohdnjojhd` n` epgjdhjnmn$‣ Rmsjmojÿd `d `e |`h$‣
Ph n` r`~jg`d~m }p` |p`n` njbjope~ms em ehomejymojÿd h rjjÿd n` emomsm !|mýp`eh cpbmdnm `~o$*$
@oíd`s n` jsj zs`~jdm
‣ @qo`jrh ghrjgj`d~h hopems h n` em omc`ym$‣ @db`sg`nmn` hopems`$‣ Ph n` kmbm$‣ \shce`gm n`cjnh me ph n` e`d~` n` ohd~mo~h !jsj*$
K`hg`~sçm n` emgmdh
‣ Ph n` ihz`sçm cjp~`sçm h mcmehsjh$‣ Ph n` r`dnmi` h kpmd~`$‣ Ohdnjojhd` n` em gmdh9 jdbemgmojhd` `d em ms~jopemojhd` a`sjnm
`~o$
@oíd`s n` bjsgm
‣ R`ehojnmn n` em bjsgm9 `qo`jrmg`d~` sí|jnm h e`d~m$‣ Njb`s`d~` |h~psm n`e pi`~h npsmd~` em bjsgm$‣ Bjsgm dh ohdj~`d~`9 `e pi`~h rmsçm p bjsgm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 84/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
:$3 GÊ^HNH_ N@ _HEPOJßD Z \S@R@DOJßD
Em `kpsjnmn ` bpdnmg`d~me `d ~hnh eh `e`g`d~h n` pd j~`gm cjhgê~sjoh$ @ |hs
`eeh }p` n`n` }p` ` mn}pj`s` em gp`~sm ` n`c`d m|ejoms eh |sh~hoheh n` `kpsjnmn|`s~jd`d~` |msm kmsmd~jyms em |sjrmojnmn z `rj~ms moo`h dh mp~hsjymnh m em cm` n`
nm~h `d }p` ` kpmsnmd eh s`kj~sh cjhgê~sjoh$
Em k`~jÿd n` eh sj`kh md~`sjhsg`d~` `ýmemnh ` s`mejym g`njmd~` em m|ejomojÿd n`
cp`dm |sío~jom z ohd~she` gj~jkmd~` `d `e ph n` em ~`odhehkçm cjhgê~sjom$ N` `~`
ghnh eh `q|`s~h ohdpe~mnh `ýmemd pdm `sj` n` g`njnm m mnh|~ms ohd `e hci`~jrh
n` s`npojs eh sj`kh mhojmnh me `g|e`h n` cjhg`~sçm$
:$3$= N`~`oojÿd n` rjnm
Em n`~`oojÿd n` rjnm ohdj~` `d em om|mojnmn n` pd j~`gm cjhgê~sjoh n` n`~`o~ms j emgp`~sm mn}pjsjnm |shrj`d` n` pd `s apgmdh rjrh ohd `e bjd n` `rj~ms |hjce` jd~`d~h
n` bsmpn` ohgh |hs `i`g|eh `e ph n` |emd~jeem n` khgm }p` jd~`d~`d jgpems pdm ap`eem
nmo~jems$
―Mo~pmeg`d~` em eçd`m n` jdr`~jkmojÿd hcs` em }p` ` n`c` amo`s gmzhs
ajdom|jê ` em n`~`oojÿd n` rjnm‗
N` `~` ghnh `e nj|hj~jrh cjhgê~sjoh ohg|shcmsí pdh h gí n` eh jkpj`d~` bmo~hs`
n`|`dnj`dnh n` em ~`odhehkçm `g|e`mnm9
‣ \peh omsnçmoh$
‣ \s`jÿd mdkpçd`m$
‣ N`~`oojÿd n` |hsh$
‣ ^smd|jsmojÿd$
‣ \shbpdnjnmn n` em omsm$
‣ Ghrjgj`d~h n` em omc`ym$
‣ Omgcjh n` q|s`jÿd bmojme$
‣ Ghrjgj`d~h n`e hih$
‣ Njem~mojÿd n` em |p|jem$
‣ \jkg`d~mojÿd n`e jsj$
‣ _`e`oojÿd n` |memcsm m
|shdpdojms$
@~m ~êodjom ` pdh n` eh |sjdoj|me` gê~hnh n` eh }p` nj|hd` em cjhg`~sçm |msm
ohgcm~js `e bsmpn`$ Dh hc~md~` mùd ~j`d` cm~md~` gmsk`d n` g`ihsm n` omsm me bp~psh$
:$3$3 Megmo`dmgj`d~h n` gp`~sm
@d `e |sho`h n` s`kj~sh |s`rjh me ph n` ~`odhehkçm cjhgê~sjom amd n` megmo`dms`
em gp`~sm m|hs~mnm |hs eh ppmsjh$ Mç `qj~` em |hjcjejnmn n` megmo`dms pdm |ms~`
n` em gp`~sm h gpe~j~pn n` s`b`s`dojm `d epkms n` em gp`~sm çd~`ksm$ @~h ` amo` |msm
|s`r`djs p p~jejymojÿd bsmpnpe`d~m `d omh n` |êsnjnm h shch$ Pd `i`g|eh ` `e
megmo`dmgj`d~h n` gjdpojm n` ap`eem nmo~jems` `d epkms n` em ap`eem ohg|e`~m$ N`
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 85/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 10 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
`~m bhsgm s`pe~m jg|hjce` em s`os`mojÿd n` em ap`eem m |ms~js n` pdm gjdpojm `d omh n`
}p` `~m `m shcmnm$
―@ bpdnmg`d~me }p` dh ` |p`nm hc~`d`s em jdbhsgmojÿd cjhgê~sjom n`eppmsjh m |ms~js n` em gp`~sm megmo`dmnm$ Eh }p` gí ` rmehsm ` em
|sjrmojnmn n`e jdnjrjnph‗
:$3$? Mp~`d~jomojÿd n` nhce` bmo~hs
Ohd `e hci`~jrh n` `rj~ms `e bsmpn` ` s`ohgj`dnm `e ph n` nh bmo~hs` `d `e |sho`h n`
mp~`d~jomojÿd$ \msm `eeh ` |p`n` p~jejyms cjhg`~sçm cjghnme !nh ~êodjom cjhgê~sjom
njb`s`d~` |hs `i`g|eh ap`eem nmo~jems ` jsj* h ohgcjdms em cjhg`~sçm ohd `e ph n`
ohd~sm`ým z(h ~msi`~m n` jn`d~jbjomojÿd$
:$3$> S`mejyms pdm cp`dm mnm|~mojÿd
Dh ~hnm em `g|s`m hd jkpme` |hs `eeh em mnm|~mojÿd m em ojsopd~mdojm n` omnm
omh ` ``dojme |msm `rj~ms bp~psh |shce`gm$
\hs `i`g|eh j pdm `g|s`m rm m jdohs|hsms pd ohd~she n` moo`h `d cm` m em ap`eem
nmo~jems z op`d~m ohd `g|e`mnh }p` s`mejymd ~smcmih gmdpme` h p~jejymd |shnpo~h
mcsmjrh |p`n` `s mohd`imce` s`kj~sms em ap`eem n` em gmdh }p` g`dh p~jejo`d
!jy}pj`snm `d `e omh n` eh nj`~sh z n`s`oam `d `e omh n` eh ypsnh* z n` eh n`nh
}p` g`dh ` p~jejo`d !k`d`smeg`d~` mdpems z g`ýj}p`*$ Ohd `~m jg|e` mnm|~mojÿd `
|hnsíd `rj~ms `d cp`dm g`njnm bp~psh |shce`gm s`emojhdmnh ohd ohs~` h n`~`sjhsh `d
em ap`eem$
:$3$0 Mn}pjjojÿd n` ~`odhehkçm n` omejnmn
Eh `q|`s~h ohjdojn`d `d }p` em hc~`dojÿd n` gp`~sm n` omejnmn z em s`mejymojÿd n`
ohg|msm~jrm bjmce` ` jg|hs~md~` |msm `rj~ms bmeh |hj~jrh bmeh d`km~jrh z me~m
~mm n` `sshs z `~h n`|`dn` `d ksmd g`njnm n` em omejnmn z bjmcjejnmn n` eh j~`gm
p~jejymnh$ Pdm `e`oojÿd mn`opmnm |s`rj`d` `e bsmpn` z em s`~jo`dojm n` eh ppmsjh$
―Em om|~psm n` gp`~sm |msm `e s`kj~sh ` am n` s`mejyms ohd pdm gçdjgm
omejnmn }p` kmsmd~jo` e êqj~h n`e |sho`h‗
:$3$2 Cjhg`~sçm `d ghrjgj`d~h
Em om|~psm n` gp`~sm `d ghrjgj`d~h ` pdm bhsgm n` s`npojs em |hjce` |`so`|ojÿd n`
em ~êodjom n` mn}pjjojÿd n` jdbhsgmojÿd cjhgê~sjom ohgh jd~spjrm z em s`~jo`dojm m
p~jejymsem |hs `~` gh~jrh$ Eh `q|`s~h `ýmemd }p` `~` ohd~she dh ` ríejnh |msm ~hnm
em ~êodjom |`sh zm ` m|ejom `d `e s`ohdhojgj`d~h bmojme z n` jsj$
:$3$; Bhsgmojÿd n` eh ppmsjhPd bmo~hs oemr` `d `e êqj~h n` em ~`odhehkçm cjhgê~sjom ` }p` p ppmsjh em p~jejo`d
ohss`o~mg`d~`$ \msm em ohd`opojÿd n` `~` hci`~jrh ` |p`n` hbs`o`s pdm bm` jdjojme n`
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 86/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 12 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
bhsgmojÿd }p` |hs dhsgm k`d`sme dh `sí `qo`jrmg`d~` emskm z `d em }p` ` jdbhsg` n`
eh }p` hd em ~`odhehkçm cjhgê~sjom z ` m|hs~`d pdm cs`r` jd~spoojhd` z
s`ohg`dnmojhd` hcs` p ph$ @d `~` `d~jnh eh mop`snh ohd eh s`|s``d~md~` n`
eh ~smcmimnhs` |s`rjh m em jg|emd~mojÿd n` em ~`odhehkçm bmrhs`o`d `~` |sho`h$
:$3$1 Opg|ejgj`d~h dhsgm~jrh
M em ahsm n` jg|emd~ms `~` ~j|h n` ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn
s`pe~m n` rj~me jg|hs~mdojm `rmepms |s`rjmg`d~` em r`d~mim ` jdohdr`dj`d~` |hjce`
}p` n`n` `e |pd~h n` rj~m ipsçnjoh |p`n` p|hd`s em jdohs|hsmojÿd n` njoah j~`gm
s`|`o~h m em |sjrmojnmn n` em |`shdm mb`o~mnm mç ohgh ~`d`s `d op`d~m |hjce`
j~`gm h hepojhd` me~`sdm~jrm }p` |p`nmd p|hd`s pdm g`dhs jd~spjÿd ohd~sm eh
n`s`oah n` eh jd~`s`mnh$
M `~` s`|`o~h n`~moms }p` `d ~hnh omh eh nm~h cjhgê~sjoh }p` |pnj``d `s
hg`~jnh m ~sm~mgj`d~h m ~smrê n` njoah j~`gm n`c`sçmd `s j`g|s` mn`opmnh
|`s~jd`d~` z dh `qo`jrh `d ohg|msmojÿd ohd em bjdmejnmn n`e |sho`h !|hs `i`g|eh9
ohd~she ahsmsjh ohd~she n` moo`h ohd~she n` |s``dojm `~o$*$
N`e gjgh ghnh ` d`o`msjh s`ohsnms }p` em g`njnm n` `kpsjnmn `ýmemnm |hs em
EH\N z p s`kemg`d~h n` n`mssheeh dh heh ` ohdjn`smd `qjk`dojm |msm `e
opg|ejgj`d~h e`kme jdh ~mgcjêd cp`dm |sío~jom }p` gj~jkmd z `rj~md |hjce`
jdojn`dojm `d s`emojÿd m em |sjrmojnmn n` eh ppmsjh$ ^me ` `e omh n` em n`~`sgjdmojÿdn`e |`shdme ohd moo`h m eh nm~h cjhgê~sjoh n`e j~`gm z p bpdojhd` h em
mjkdmojÿd n` op`d~m n` ppmsjh |msm omnm ~smcmimnhs ipd~h m g`njnm n` ~smymcjejnmn
|msm amo`s ohd~ms }pjêd moo`n` m `~h nm~h h s`mejym ghnjbjomojhd` `d `eeh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 87/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
=< OHDOEP_JHD@_
=<$= OHDOEP_JHD@_ K@D@SME@_
=<$=$= ^`odhehkçm gmnpsm r$ G`somnh `d n`mssheeh
^sm em ohdpe~m m eh njb`s`d~` `q|`s~h n`e `o~hs n` em cjhg`~sçm z em `emchsmojÿd n` p
`~pnjh ` |p`n` ohdoepjs }p` n`n` `e |pd~h n` rj~m ~êodjoh em ~`odhehkçm
cjhgê~sjom ` `dop`d~smd `d pd ksmnh n` gmnps`y pbjoj`d~` |msm `s jg|emd~mnm ohd
êqj~h |`sh ` `e g`somnh `e }p` mo~pmeg`d~` dh am meomdymnh em gmnps`y d`o`msjm$
Ohdos`~mg`d~` `e g`somnh `~í oms`d~` mùd n` eh jkpj`d~` m|`o~h9
‣ Mp`dojm n` ohdhojgj`d~h |hs |ms~` n` eh |h~`dojme` ppmsjh
‣
`~h ` n` em
`d~jnmn` }p` |hnsçmd `~ms jd~`s`mnm `d em jg|emd~mojÿd n` j~`gmcjhgê~sjoh$ @d gpoam homjhd` em me~m njs`oojÿd dh ` ohdoj`d~` n` eh
c`d`bjojh `d gm~`sjm n` mahssh n` oh~` mpg`d~h n` `kpsjnmn z g`ihsm n` em
jgmk`d ohs|hsm~jrm }p` |hnsçm ~`d`s em p~jejymojÿd n` pd j~`gm ohd `~m
omsmo~`sç~jom dj n` em gpe~j~pn n` bjdmejnmn` |msm em opme` |hnsçm `s
jd~`s`md~` p ph$
Mp`dojm n` hb`s~m `d opmd~h m hepojhd` jd~`ksmnm n` `kpsjnmn
‣
|hs |ms~` n`
nj~sjcpjnhs` h bmcsjomd~` n` hepojhd` n` `kpsjnmn$ \hs `i`g|eh9
rjn`hrjkjemdojm ohd n`~`oojÿd cjhgê~sjom jd~`ksmojÿd n` cjhg`~sçm `d `e j~`gmn` k`~jÿd n` jn`d~jnmn` ohs|hsm~jrh `~o$
N`ohdhojgj`d~h z n`ohdbjmdym |hs |ms~` n` eh ojpnmnmdh
‣ Mo~pmeg`d~` `e `o~hs `g|s`msjme ` `dop`d~sm `d pd
em oj`dojm bjoojÿd
am njbpdnjnh mekpdh gj`nh z gj~h `d~s` em ojpnmnmdçm }p` n`c`d `s
p|`smnh |msm `rj~ms n` `~` ghnh em s`j~`dojm m em p~jejymojÿd n` ~êodjom
cjhgê~sjom$ ^mgcjêd |p`n`d p|hd`s pd jg|`njg`d~h n` ohdjn`smojÿd |msm em
mnh|ojÿd |hs |ms~` n` eh ojpnmnmdh em cmss`sm ope~psme` `qj~`d~` |hs
`i`g|eh `d n`~`sgjdmnh |mç` mjí~joh nhdn` dh ` |`sgj~` `e `~mce`ojgj`d~h
n` ohd~mo~h |hs gh~jrh ajkjêdjoh h em p~jejymojÿd n` sh|m }p` opcs` em omsm `dnjb`s`d~` ope~psm$
|`sjhnh n` njbjope~mn`
`ohdÿgjom
=<$=$3 D`o`jnmn n` `~mdnmsjymojÿd `d `e mdíejj
$ @ |hs `eeh }p` `d gpoam jd~j~pojhd` dh ` |sjhsjym em jdr`sjÿd
`d ~`odhehkçm jddhrmnhsm z ` ~j`dn` m gmd~`d`s eh j~`gm zm `qj~`d~`$
_j cj`d em ~êodjom cjhgê~sjom ` `dop`d~smd pbjoj`d~`g`d~` gmnpsm em mp`dojm n`
osj~`sjh ohgpd` }p` |`sgj~md em `rmepmojÿd n` pdm bhsgm hci`~jrm n` em njb`s`d~`
hepojhd` `qj~`d~` `d `e g`somnh njbjope~m `e mdíejj n` em gjgm z p|hd` pdm
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 88/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 11 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
bp`s~` cmss`sm n` omsm m em jg|emd~mojÿd n` eh j~`gm z m em |`so`|ojÿd hcs` p
rmejn`y$
=<$=$? \hjce` `qo`h n` ohdbjmdym@d homjhd` ` ~j`dn` m |`dms }p` em cjhg`~sçm ` em hepojÿd m ~hnh eh |shce`gm n`
`kpsjnmn$ @e `o~hs `g|s`msjme n`c` `s ohdoj`d~` n` }p` em jg|emd~mojÿd n` ~êodjom
cjhgê~sjom n`c` `s pdm n`ojjÿd cmmnm `d em s`mejymojÿd n` pd mdíejj oh~`(c`d`bjojh
mç ohgh n` }p` em `kpsjnmn mchep~m dh `qj~` `d djdkùd j~`gm n` `kpsjnmn$ Ohgh
|sp`cm n` `eeh ` `dop`d~sm `e ohdipd~h n` mg`dmym z rped`smcjejnmn` n`~momnh `d
`e |s``d~` ~pnjh$
=<$=$> Me~h c`d`bjojh |h~`dojme`
@d eçd`m n` em ohdoepjÿd |s`rjm eh j~`gm cjhgê~sjoh jg|emd~mnh ~sm pd |sho`hmn`opmnh n` mdíejj |s`rjh s`|hs~md ksmdn` c`d`bjojh ~md~h m `d~jnmn` ohgh m
ojpnmnmdh z `g|e`mnh$ M ghnh n` `i`g|eh |p`n`d hc`srms` eh omh n` êqj~h
mdmejymnh `d n`~mee` `d `e |s``d~` `~pnjh nhdn` ` amd hc~`djnh g`ihsm ~md~h `d em
ohghnjnmn n` eh ppmsjh `d `e mpg`d~h n` em `kpsjnmn z `d `e mahssh n` oh~`$
=<$3 BHS^ME@YM_ Z H\HS^PDJNMN@_
=<$3$= M|s`dnjymi` z |`sb`oojhdmgj`d~h
Mo~pmeg`d~` ` `~í jg|emd~mdnh eh }p` ` ohdjn`sm em `kpdnm k`d`smojÿd cjhgê~sjom$@e `~mce`ojgj`d~h n` eh j~`gm cjhgê~sjoh n` |sjg`sm k`d`smojÿd z em n`~`oojÿd n`
p ejgj~mojhd` n`~`sgjdmshd opíe` n`c`d `s eh |sjdoj|me` s`~h }p` `~m `kpdnm
k`d`smojÿd n`c` mbshd~ms z her`d~ms$ @~h s`~h ` oemjbjomd `d nh ksmdn` ~j|hehkçm9
S`~h ~êodjoh ohgh |s`ojjÿd r`ehojnmn `skhdhgçm z `kpsjnmn !|hs `i`g|eh `kpjs
mrmdymdnh `d em n`~`oojÿd n` rjnm z em s`j~`dojm me bsmpn`* z S`~h hojme`
`|`ojmeg`d~` `d eh s`b`s`d~` m |s`hop|mojhd` |hs em |sjrmojnmn z em mepn mç ohgh
|shce`gm ope~psme` h ê~joh$
=<$3$3 Jg|ejomojÿd n` em Mngjdj~smojhd` \ùcejom
@e jg|peh |hs |ms~` n` em mngjdj~smojhd` |ùcejom ` `~í |shnpoj`dnh z ` pd
m|`o~h bpdnmg`d~me |msm em dhsgmejymojÿd ` jg|emd~mojÿd n` em ~`odhehkçm z p
n`mssheeh$ G`njmd~` em mnh|ojÿd n` moojhd` njrpekm~jrm z em mnh|ojÿd n` j~`gm
cjhgê~sjoh `d p |sh|jm jd~memojhd` z `srjojh em Mngjdj~smojhd` \ùcejom `síd
|sjdoj|me` jg|pehs` n` `~m ~`odhehkçm$
=<$3$? Jg|peh n` em ksmdn` `g|s`m
_` ohdjn`sm pd ksmd bmo~hs }p` mcsjsí dp`rm h|hs~pdjnmn` `|`ojmeg`d~` em mnh|ojÿd
|hs |ms~` n` m}p`eem }p` s`}pj`smd n` gmzhs `kpsjnmn `d p ~smdmoojhd` ohgh em
bjdmdoj`sm z m`kpsmnhsm$ Ohd p jg|emd~mojÿd z n`mssheeh `~m `g|s`m
ohd`kpjsíd `e `~mce`ojgj`d~h n` `~ídnms` ohgpd` z j~`gm n` mp~`d~jomojÿd
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 89/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm 1: n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
ahghkêd`h n` omsm m hbs`o`s `srjojh jd~`ksmnh n` njb`s`d~` ~j|hehkçm$ @ n`ojs `e
`~mce`ojgj`d~h n` pdm mp~`d~jomojÿd cjhgê~sjom ùdjom |hs |ms~` n` ksmdn` mhojmojhd`
`g|s`msjme` ` pdm eçd`m n` n`mssheeh bp~psh }p` `d ohhsnjdmojÿd ohd em
mngjdj~smojhd` |ùcejom `sí jg|pemnh |hs em ksmdn` ohs|hsmojhd` |sjrmnm }p`
n```d m|hs~ms rmehs mnjojhdme m eh `srjojh }p` hbs`o`d m p oej`d~`$
=<$3$> @~mdnmsjymojÿd jd~`sh|`smcjejnmn
Eh `q|`s~h `d~s`rj~mnh ohdjn`smd em dhsgmejymojÿd n` eh nm~h megmo`dmnh h
~smdgj~jnh `d njr`sh `~ídnms` }p` |`sgj~md em jd~`sh|`smcjejnmn `d~s` |em~mbhsgm
z ~êodjom njb`s`d~` pd bmo~hs ohgh pd `e`g`d~h bpdnmg`d~me }p` bmrhs`o`sí `e
n`mssheeh n` em ~`odhehkçm cjhgê~sjom$
=<$? N@CJEJNMN@_ Z \H_JCE@_ SJ@_KH_
=<$?$= @q|hjojÿd |ùcejom
Pdh n` eh |sjdoj|me` sj`kh ohd eh }p` op`d~md em ~`odhehkçm cjhgê~sjom ` em ksmd
`q|hjojÿd }p` ~j`d`d `~h |shz`o~h m em h|jdjÿd |ùcejom$ @|`ojmeg`d~` m}p`eeh }p`
` mchsnmd m djr`e dmojhdme hd gpz |pcejoj~mnh z `d `e omh n` }p` em jg|emd~mojÿd
bjdme dh `m m~jbmo~hsjm amcj~pmeg`d~` ` amo` |`sipnjom m ~hnm em jdnp~sjm |p` em
|`so`|ojÿd n` eh ojpnmnmdh ` d`km~jrm n` gmd`sm k`dêsjom z dh hcs` `e |shz`o~h
`|`oçbjoh$
=<$?$3 ^`ghs` |hs |ms~` n` eh ojpnmnmdh
Mùd ahz jkp` `qj~j`dnh pd n`ohdhojgj`d~h k`d`smejymnh |hs |ms~` n` em ojpnmnmdçm m
|`ms n` eh `bp`syh zm s`mejymnh$ @e |sjdoj|me gj`nh ` em mp`dojm h |êsnjnm n`
|sjrmojnmn n` eh ojpnmnmdh }pj`d` jkp`d ohdjn`smdnh }p` em cjhg`~sçm ` pdm
~`odhehkçm jd~spjrm |msm `eeh$ @ |hs `~h }p` `g|s`dn`s moojhd` n` ohdoj`dojmojÿd n`
omsío~`s k`d`sme hsj`d~mnm amojm em ojpnmnmdçm ohcsm `|`ojme s`e`rmdojm n` omsm m `rj~ms
em bmem `dmojÿd n` njgjdpojÿd n` |sjrmojnmn$
=<$?$? D`o`jnmn n` dhsgm~jrm |`oçbjom
M |`ms n` }p` em mo~pme dhsgm~jrm |p`nm `s pbjoj`d~` em mp`dojm n` s`kpemojÿd
`|`oçbjom |msm j~`gm n` s`ohdhojgj`d~h cjhgê~sjoh |p`n` `s pd sj`kh }p` n`cm
her`d~ms` n` em g`ihs gmd`sm |hjce`$ \msm `eeh ` `~mce`o`d pd ohdipd~h n`
s`ohg`dnmojhd` `d `~` `d~jnh }p` bmojej~`d em emchs n` eh hskmdjgh s`kpemnhs`$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 90/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :< n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
== S@OHG@DNMOJHD@_
M ohd~jdpmojÿd ` am s`ohkjnh pd ohdipd~h n` ohd`ih z s`ohg`dnmojhd` |msm emjdr`~jkmojÿd jg|emd~mojÿd z ph n` em ~`odhehkçm cjhgê~sjom mç ohgh |msm p
s`kpemojÿd$
==$= S@OHG@DNMOJHD@_ NJSJKJNM_ M EM_ HSKMDJYMOJHD@_
Mekh `d eh }p` ohjdojn`d eh `q|`s~h ohdpe~mnh ` }p` ` ``dojme ohdjn`sms
njb`s`d~` m|`o~h m em ahsm n` rmehsms em |hjce` jg|emd~mojÿd n` pd j~`gm cjhgê~sjoh$
@d `~` `d~jnh hd n`~momce` eh jkpj`d~` bmo~hs`9
‣ Ehomejymojÿd9 @e epkms nhdn` ` rmzm m pcjoms bçjomg`d~` `e j~`gm n`
s`ohdhojgj`d~h cjhgê~sjoh ` pd bmo~hs oemr` |msm em `e`oojÿd n` em ~êodjom m
`g|e`ms$ @ |hs `eeh }p` ` n`c` ohd~`g|ems j ` `dohd~smsí pcjomnh `d yhdm
n` moo`h |ùcejoh h s`~sjdkjnh m em ahsm n` `e`oojhdms pdm ~êodjom n` gmzhs h
g`dhs s`j~`dojm me bsmpn` z `|`ojmeg`d~` m eh m~m}p` bçjoh$
‣ Bjdmejnmn |`s`kpjnm9 Mekpdh j~`gm n` s`ohdhojgj`d~h cjhgê~sjoh
|`sjkp`d r`sjbjoms em jn`d~jnmn n` eh ppmsjh !ohg|msmojÿd =9=* z h~sh jd
`gcmskh |`sjkp`d em jn`d~jbjomojÿd n` eh gjgh !ohg|msmojÿd =9d*$ @d `~`
`d~jnh em bjdmejnmn n`~`sgjdm `d gpoam homjhd` em om|mojnmn n` ohg|p~mojÿd
}p` s`}pj`s` `e j~`gm !gmzhs opmdnh em bjdmejnmn ` jn`d~jbjoms me ~`d`s }p`ohg|msms pdm gp`~sm ohd ~hnm em `qj~`d~` `d em cm` n` nm~h* z |hs ~md~h
em `e`oojÿd n` em ~êodjom m `g|e`ms$
‣ Dùg`sh n` ppmsjh9 _` n`c` ~`d`s `d op`d~m `e dùg`sh n` ppmsjh }p`
p~jejymsíd `e j~`gm cjhgê~sjoh$ @ |s`rjjce` }p` `d ksmdn` j~`gm n`
s`ohdhojgj`d~h ohd pdm `e`rmnm omskm n` s`ohdhojgj`d~h `m gí `dojeem em
m|ejomojÿd n` `ohdhgçm n` `omem s`npoj`dnh |hs ~md~h `e oh~` g`njh |hs
s`ohdhojgj`d~h$
‣ Ojsopd~mdojm n` eh ppmsjh9 Ohdho`s m eh ppmsjh bjdme` }p` rmd m
`g|e`ms `e j~`gm n` s`ohdhojgj`d~h |p`n` n`~`sgjdms |hs ohg|e`~h `e êqj~h h
bsmomh n` em jg|emd~mojÿd$ @d `~` `d~jnh ` n`c`sí ~`d`s `d op`d~m9
h Ohdhojgj`d~h |s`rjh9
h
@ d`o`msjh ohdjn`sms `e ohdhojgj`d~h md~`sjhs
ohd `e }p` op`d~md eh ppmsjh n` omsm m bmojej~mse` em p~jejymojÿd n`e
j~`gm n` cjhg`~sçm !~md~h m eh ppmsjh bjdme` ohgh m eh ppmsjh
mngjdj~smnhs` n`e gjgh* |pnj`dnh `~jgms mç em d`o`jnmn n`
bhsgmojÿd |s`rjm me emdymgj`d~h$
@d~hsdh9 @qj~`d njb`s`d~` `d~hsdh nhdn` em p~jejymojÿd n` pd j~`gm
cjhgê~sjoh ohdos`~h |p`n` p|hd`s pd jdohdr`dj`d~`$ M ghnh n` `i`g|eh
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 91/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm := n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
dh ` n`c` p~jejyms `e s`ohdhojgj`d~h n` ap`eem nmo~jems `d pcjomojhd`
nhdn` eh `g|e`mnh n`cmd p~jejyms kpmd~` |sh~`o~hs` h nhdn`
amcj~pmeg`d~` ~`dkmd em gmdh aùg`nm h ghimnm$ ^mg|hoh n`c`síd
`g|e`ms` j~`gm n` s`ohdhojgj`d~h bmojme `d ope~psm nhdn`
amcj~pmeg`d~` em |`shdm opcsmd p sh~sh$
h Ohdbjmdym `d eh jdnjrjnph9
‣ Jdbhsgmojÿd `qj~`d~`9 @d `e ghg`d~h n` rmehsms `ohdÿgjomg`d~` }pê j~`gm
cjhgê~sjoh n`c` `g|e`ms` ` d`o`msjh s`oh|jems `e ohdipd~h n` jdbhsgmojÿd n`
em }p` ` nj|hd` |s`rjmg`d~`$ N` `~` ghnh ` |hnsíd m|shr`oams jd`skjm hs`p~jejyms e ~smcmih s`mejymnh d |shz`o~h md~`sjhs`$
Em p~jejymojÿd h dh p~jejymojÿd n` cjhg`~sçm
|msm em mp~`d~jomojÿd n` ppmsjh `d gpoam homjhd` rj`d` n`~`sgjdmnm
|hs em ohdbjmdym h n`ohdbjmdym }p` ` ~`dkm hcs` eh ppmsjh bjdme`$
Pdm r`y ohd~`g|emnh ~hnh `~h m|`o~h n` gmd`sm |s`rjm m em jg|emd~mojÿd n`e
j~`gm cjhgê~sjoh ` |hnsí `~jgms pd oh~` m|shqjgmnh n` em |p`~m `d gmsoam z n`
p gmd~`djgj`d~h `d `e ~j`g|h$
^sm n`~`sgjdms em d`o`jnmn n` jg|emd~mojÿd n` pd j~`gm cjhgê~sjoh ` s`ohgj`dnm m
em hskmdjymojhd` ~hgms em jkpj`d~` g`njnm9
=* M|h~ms |hs em jg|emd~mojÿd n` ~`odhehkçm n` omejnmn
3*
`~h ` md~` em njb`s`d~`~`odhehkçm `qj~`d~` `d `e g`somnh |sjgms m}p`eem }p` hbs`yomd gmzhs
bjmcjejnmn z ohd`op`d~`g`d~` g`ihs` s`pe~mnh$
Jdbhsgms` mn`opmnmg`d~`
?*
n` omsm m amo`s pd ph ohss`o~h n` em ~êodjom
cjhgê~sjom m jg|emd~ms `d em hskmdjymojÿd$
Hbs`o`s ohemchsmojÿd m eh ppmsjh bjdme`
>* _`s ohdoj`d~` n` }p`
6 em ohh|`smojÿd ohd `eeh ` `e ksmd
bmo~hs `d `e êqj~h n` em jg|emd~mojhd` n` ~`odhehkçm cjhgê~sjom$
eh nm~h cjhgê~sjoh hd n` omsío~`s |`shdme
0*
9 ` |hs `eeh}p` `~íd s`kpemnh |hs em E`z Hskídjom n` \sh~`oojÿd n` Nm~h z ` n`c`d
|sh~`k`s ohgh ~me`$
_hejoj~ms j`g|s` `e ohd`d~jgj`d~h n` s`ohkjnm z ph n` nm~h cjhgê~sjoh$ Em
`g|s`m }p` }pj`sm s`oh|jems z `g|e`ms njoah nm~h am n` hc~`d`s `e
ohd`d~jgj`d~h n`e ppmsjh jdbhsgídnhe` |s`rjmg`d~` n` p bjdmejnmn z
~sm~mgj`d~h$ N` `~` ghnh dh ÿeh ` opg|ejsí ohd em e`kjemojÿd jdh }p` pdm
mo~pmojÿd ~smd|ms`d~` mzpnmsí m g`ihsms eh djr`e` n` mo`|~mojÿd |hs em
ojpnmnmdçm em pmcjejnmn z |hs ~md~h em `b`o~jrjnmn n` `~m ~`odhehkçm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 92/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :3 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
2* Bmojej~ms `e `i sojojh n` eh n`s`oah MSOH
==$3 S@OHG@DNMOJHD@_ NJSJKJNM_ M EM JDNP_^SJM
n` eh ppmsjh hcs` p nm~h
|`shdme` nídnhe` m ohdho`s em |hjcjejnmn n` hc~`d`s jdbhsgmojÿd ghnjbjoms
p|sjgjs z h|hd`s` m p ~sm~mgj`d~h n` njoah nm~h$
Ohgh ` am n`osj~h |s`rjmg`d~` |msm em `emchsmojÿd n`e |s``d~` `~pnjh ` am ohd~mnh
ohd em ohemchsmojÿd n` `q|`s~h `d j~`gm cjhgê~sjoh n` gpz njr`sm dm~psme`ym
n`n` |`sbje` e`kme` m gí ~êodjoh$ @d `~` `d~jnh ` e` hejoj~ÿ }p` bp`smd osç~joh
ohd p |sh|jm jdnp~sjm z `~` ` `e ohdipd~h n` s`ohg`dnmojhd` n`~momce` me
s`|`o~h$
==$3$= Bmcsjomd~` z |shr``nhs` n` `srjojh
=* M|h~ms |hs em jddhrmojÿd
3* Hbs`o`s
`d `e n`mssheeh ` jg|emd~mojÿd ohd `e hci`~jrh n`bhg`d~ms em ~`odhehkçm cjhgê~sjom$
j~`gm n` me~m omejnmn
?*
bhg`d~mdnh `e êqj~h bjdme }p` mzpnmsí m em
g`ihsm n` em jgmk`d n` em cjhg`~sçm `d k`d`sme$
_her`d~ms em npnm n` eh oej`d~`
>*
jdbhsgmdnh n` em jg|hs~mdojm z em cm`
~`odheÿkjom n`e j~`gm6 n` `~m bhsgm `e oej`d~` |hnsí ~hgms pdm n`ojjÿd
jdbhsgmnm hcs` em ~`odhehkçm m jg|emd~ms$
Mdmejyms me oej`d~`
0* \shghr`s pdm
|msm |hn`s m`hsmse` `d em ~`odhehkçm jnÿd`m `kùd p
d`o`jnmn` z |hn`s bhsgms m|sh|jmnmg`d~` m eh ppmsjh hcs` p p~jejymojÿd$
pdjbjomojÿd n` mekhsj~gh ojbsmnh z |sho`h n` `q~smoojÿd n`
gp`~sm
2*
eh }p` bmrhs`o`sí em jd~`sh|`smcjejnmn `d~s` eh j~`gm jg|emd~mnh$
Gh~sms em r`d~mim n` `~h |shnpo~h z `srjojh z dh `qmk`sms hcs` eh
n`b`o~h h jdohdr`dj`d~` n` h~sm ~êodjom
;*
n` em ohg|`~`dojm zm }p` ohgh
ohd`op`dojm n` `eeh ` n`|s`~jkjm m em cjhg`~sçm `d k`d`sme$
_hejoj~ms |`sgjh m eh ppmsjh |msm ~sm~ms p nm~h cjhgê~sjoh
1* Kmsmd~jyms `|`ojmeg`d~` em
j`dnh gpz
ohdos`~h z ~smd|ms`d~` hcs` `e ~sm~mgj`d~h z em bjdmejnmn n` p ph$
`kpsjnmn z ohdbjn`dojmejnmn
n` eh nm~h o`njnh
|msm k`d`sms ohdbjmdym `d eh ppmsjh n`e j~`gm$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 93/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :? n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
==$3$3 Jdr`~jkmnhs`
=* Mnm|~ms` m eh s`}p`sjgj`d~h n` eh ppmsjh bjdme` ohd `e hci`~jrh n`
n`mssheems eçd`m n` jdr`~jkmojÿd }p` |p`nmd m~jbmo`s em d`o`jnmn`
3* Ohdho`s em j~pmojÿd mo~pme n` em jdnp~sjm cjhgê~sjom z
`qj~`d~`$
`rj~ms em `emchsmojÿd n`
|sh~h~j|h n` njbçoje m|ejomojÿd
?* @q|ehsms njb`s`d~` h|ojhd` n`
`d `e ígcj~h ohg`sojme |hs p oh~` h p~jejnmn$
g`ihsm z mcmsm~mgj`d~h
>* S`mejyms
n` em ~`odhehkçm |msm
bmrhs`o`s p n`mssheeh z `q|mdjÿd$
emchs njrpekm~jrm
==$? S@OHG@DNMOJHD@_ NJSJKJNM_ M EM_ MNGJDJ_^SMOJHD@_ \ÙCEJOM_
n` omsm m bhg`d~ms }p` em ojpnmnmdçm ` bmgjejmsjo`
ohg|s`dnm z ohdbç` `d em cjhg`~sçm$
Ohgh `d gpoah h~sh m|`o~h jddhrmnhs` `|`ojmeg`d~` `d `e ígcj~h n` em
`kpsjnmn em Mngjdj~smojhd` \ùcejom hd pd bmo~hs oemr` `d `e n`mssheeh n` em
cjhg`~sçm$ @d `~` `d~jnh ~sm em `emchsmojÿd n`e |s``d~` `~pnjh omc` n`~moms em
jkpj`d~` s`ohg`dnmojhd` n` omsm m bhg`d~ms z bmojej~ms `e ohdhojgj`d~h z em p~jejymojÿd
n` ~`odhehkçm cjhgê~sjom$
=* Bmojej~ms moo`h m `srjojh |ùcejoh |hs |ms~` n` eh ojpnmnmdh `g|e`mdnh
j~`gm cjhgê~sjoh$
3* P~jejymojÿd n`
Em r`d~mim `rjn`d~` |msm eh ojpnmnmdh n` omsm m
s`mejyms ~hnh eh ~sígj~` ohd em mngjdj~smojhd` |ùcejom n` gmd`sm ~`e`gí~jom
z g`njmd~` p mp~`d~jomojÿd m nj~mdojm p|hdnsí pd |`so`|ojÿd gpz |hj~jrm |hs
|ms~` n` eh gjgh$
j~`gm cjhgê~sjoh |msm p |sh|jm jd~memojhd`
?* Em ohd~jdpjnmn `d em
$ Mn`gí n`
bhg`d~ms p ph z ohdhojgj`d~h em jg|emd~mojÿd n` j~`gm cjhgê~sjoh `d em
jd~memojhd` n` em mngjdj~smojhd` |p`n` p|hd`s pdm g`ihsm `d em `kpsjnmn z
em `bjoj`dojm n` eh ~smcmimnhs`$
jdr`sjÿd `d gm~`sjm n` n`b`dm z ohd~she n` bshd~`sm
>* Ohgh `d ~hnm ~`odhehkçm |pd~m em ohd~jdpmnm
p~jejymdnh j~`gm cjhgê~sjoh njgjdpz` em d`o`jnmn n` s`opsh apgmdh
|msm `~m ~ms`m z |`sgj~` `e `g|`ýh n` eh s`opsh n` em bp`sym z op`s|h n`
`kpsjnmn `d h~sm bpdojhd` nhdn` em jd~`sr`dojÿd apgmdm `m osç~jom$
jdr`sjÿd `d jdr`~jkmojÿd z
n`mssheeh
0* Ee`rms m omch moojhd` n`
` ~hsdm ``dojme n` omsm m hc~`d`s mùd g`ihs` j~`gm cjhgê~sjoh$
njrpekmojÿd n` eh c`d`bjojh n`e ph n` ~`odhehkçm
cjhgê~sjom n`gj~jbjomdnh p jdohdr`dj`d~` z `rjn`dojmdnh em g`ihsm }p`|p`n`d p|hd`s `d `e nçm m nçm n` eh ojpnmnmdh$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 94/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :> n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
==$> S@OHG@DNMOJHD@_ \MSM E@KJ_EMNHS@_ Z MK@D^@_ N@
@_^MDNMSJYMOJßD
Eh hskmdjgh `domskmnh n` s`kpems z dhsgmejyms eh njb`s`d~` m|`o~h n` emcjhg`~sçm ~md~h e`kme ohgh ~êodjomg`d~` |p`n`d bhg`d~ms p n`mssheeh jkpj`dnh pdm
`sj` n` s`ohg`dnmojhd`9
=* Kmsmd~jyms eh n`s`oah n` |sjrmojnmn n` eh ojpnmnmdh
3* _j cj`d em s`kpemojÿd mo~pme `d @|mým `d gm~`sjm n` |sh~`oojÿd n` nm~h `
pbjoj`d~` |msm s`kpems `e ígcj~h n` em cjhg`~sçm n` omsm m pdjbjoms osj~`sjh z
m~`dn`s m pdm `|`ojme `djcjejnmn n` em |hcemojÿd |hnsçm `s ohdr`dj`d~`n`mssheems pdm
|`sgj~j`dnh me gjgh
~j`g|h `e n`mssheeh n` em ~`odhehkçm }p` hbs`o`d pdm gmzhs `kpsjnmn ohgh
em cjhgê~sjom$
s`kpemojÿd `|`oçbjom |msm em cjhg`~sçm
?*
$
@rj~ms pdm dhsgm~jrm `qo`jrmg`d~` sçkjnm
>* N`mssheems pd
}p` jg|jnm h njbjope~` `e ph n` em
cjhg`~sçm h }p` dh ` |p`nm mnm|~ms bíojeg`d~` m eh bp~psh n`mssheeh$
mdíejj |shbpdnh n` eh sj`kh z c`d`bjojh
0* Mrmdyms `d em
n` em cjhg`~sçm md~`
n` s`nmo~ms z |shgpekms em dhsgm~jrm n` n`mssheeh$
s`kpemojÿd e`kjem~jrm s`em~jrm m em p|emd~mojÿd n` jn`d~jnmn
2* Bhg`d~ms em
pdm n`
em gmzhs` mg`dmym jn`d~jbjomnm$
os`mojÿd n` pd `~ídnms ùdjoh
|msm omnm ~`odhehkçm }p` bmojej~` em
jd~`sh|`smcjejnmn$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 95/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :0 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
MD@QH J9 CJCEJHKSMBÇM
‣ Mjs Pdjr`sj~z mdn J}sm Pdjr`sj~z !3<==*$ Cjhg`~sjo Moo` Ohd~she _z~`g Pjdk
Mp~hgm~`n Jsj S`ohkdj~jhd$ a~~|9((j}smpdjr`sj~z$`np$|f(MI@_^%3<Rhepg`%3<=%3<Jp`%3<=$|nb
‣ O`d~sme Jd~j~p~` hb ^`oadhehkz hb Fhfsmiams !3<=<*$ Jd~`sd`~ Cmdfjdk Sjf Mdmezj
mdn M||ejomcjej~z hb Cjhg`~sjo ^`oadhehkz bhs Mp~a`d~jom~jhd$
a~~|9((jih|mmm~$jd(zmahhXj~`Xmngjd(m`~(nho(Kpdmij~X\m| s'
2XS`rj`{X$=1=:310=$|nb
‣ O`d~s` bhs @psh|`md \hejoz _~pnj` !3<<2*$ Ohggpdjom~jdk !jd*_`opsj~z9 M Bmjeps` hb
\pcejo Nj|ehgmoz8 ‣ O`d~s` bhs @psh|`md \hejoz _~pnj` !3<=<*$ N`r`eh|jdk Cjhg`~sjo jd ~a` @P$
‣ O`d~s` bhs @psh|`md \hejoz _~pnj` !3<=<*$ ]pmd~pg _psr`jeemdo` mdn ‑_ams`n
_`os`~‚$ M cjhg`~sjo ~`| ~hh bms8
‣ Ohg|p~`s Em{ " _`opsj~z S`rj`{ !3<==*$ Chnz omdd`s r$ |sjrmoz mdn nm~m
|sh~`o~jhd$
a~~|9(({{{$pjh$dh(~pnj`s(`gd`s(ip(ip(IPS02?<(r==(pdn`srjdjdkgm~`sjme`(Gjshd`d
fhXms~joe`X=?<=3<==$|nb
‣ N`ehj~~` " Dm~jhdme \azjome Emchsm~hsz !3<<2*$ Em~`~ cjhg`~sjo ~`~ s`pe~9
|`sbhsgmdo`% }pmej~z mdn jd~`sh|`smcjej~z$
‣ N`ehj~~` !3<<>*$ Cjhg`~sjo `opsj~z$
‣ N`ehj~~` !3<<0*$ Cjhg`~sjo JN omsn n`cm~`$
‣ N`ehj~~` !3<<0*$ _pj~mcjej~z hb cjhg`~sjo m~ mjs|hs~ !Mjs|hs~ Jdnp~sz Ohdb`s`do` 3<<0%
Ghoh{*$
‣ Êohe` \hez~`oadj}p` Bênêsme` n` Empmdd` !3<=<*$ Cjhg`~sjo " _`opsj~z Ohgcjdjdk
Bjdk`s|sjd~% _gms~ Omsn mdn Osz|~hksm|az$
‣ @psh|`md Ohggj~`` bhs _~mdnmsjym~jhd !3<<:*$ S`|hs~ hd m cjhg`~sjo |shbje` |`ojbjo
~h osh'chsn`s jd~`sh|`smcjej~z hb cjhg`~sjo m||ejomce` ~h `'Jn`d~j~z$
a~~|9(({{{$o`d$`p(o`d(_`o~hs(_`o~hs(J___(Bhop(Nhopg`d~(S`|hs~Oshchsn`sJd~
`sh|`smcjej~zr=<m~~=$|nb
‣ @psh|`md Ohggj~~`` bhs _~mdnmsnjym~jhd !3<<>*$ ^h{msn md `e`o~shdjo JN bhs ~a` @psh|`md Oj~jy`d% m ~sm~`kjo rjjhd$
a~~|9(({{{$pgjo$|~(jgmk`(~hsj`(|pcejomoh`(^h{msn%3<`JN$|nb
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 96/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :2 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
‣ Bhss`~`s !3<<1*$ Cjhg`~sjo9 _~m~` Hb ^a` Ms~ Mdn Bp~ps` Jg|ejom~jhd$
‣ Bhss`~`s !3<=<*$ _gms~ Ohg|p~jdk Bp`e Cjhg`~sjo Ksh{~a$
‣ Bhss`~`s !3<==*$ Bhssjka~9 ^a` @rhep~jhd hb J^ _`opsj~z% 3<=< ^h 3<==$
‣ Kms~d`s !3<<1*$ Om` _~pnz ' A`me~a Gmdmk`g`d~ Ohg|mdz N`|ehz Rhjo`
Cjhg`~sjo bhs Omee`s R`sjbjom~jhd$
‣ Kms~d`s !3<=<*$ Az|` Ozoe` bhs Ohd~mo~ O`d~`s Jdbsm~spo~ps`$
‣ Kms~d`s !3<=<*$ Az|` Ozoe` bhs Jn`d~j~z mdn Moo` Gmdmk`g`d~ ^`oadhehkj`$
‣ Kms~d`s !3<=<*$ ]"M9 Cjhg`~sjo Mp~a`d~jom~jhd G`~ahn$
‣ Kms~d`s !3<=<*$ S`rjj~jdk ~a` Cpjd` Om` bhs Cjhg`~sjo mdn S`~mje ^jg`f``|jdk$
‣ Kms~d`s !3<==*$ Pjdk Rhjo` S`ohkdj~jhd ^`oadhehkz ~h Om|~ps` Osjgjdme$
‣ Jd~j~p~` hb @e`o~sjome mdn @e`o~shdjo @dkjd``s !3<==*$ Pdjr`sme cjhg`~sjo `rmepm~jhd
z~`g9 Bsmg`{hsf bhs ~`~jdk `rmepm~jhd mdn ohg|msjhd hb cjhg`~sjo g`~ahn$
‣ Gjoajkmd _~m~` Pdjr`sj~z !3<=<*$ Cjhg`~sjo hb D`q~ K`d`sm~jhd9 Md Hr`srj`{$
‣ _sj Imzmoamgmsmi`dnsm Ohee`k` hb @dkjd``sjdk !3<==*$ Bp~ps` \m~a [mz ~h Cjhg`~sjo$
‣ ^spc MK !3<<0*$ Cjhg`~sjo [aj~`|m|`s$
‣ Pdjr`sjnmn Omseh JJJ n` Gmnsjn !3<=<*$ \sjrmoz mdn E`kme S`}pjs`g`d~ bhs
N`r`eh|jdk Cjhg`~sjo Jn`d~jbjom~jhd _hb~{ms` jd Ohd~`q~'Cm`n M||ejom~jhd $
a~~|9(({{{$`so$hsk(ihpsdme(JIC_C^(rhe3Xdh=(3$|nb
‣ Pdjr`sjnmn n` N`p~h " Pdjr`sjnmn n`e \mç Rmoh !3<<; *$ Mdíejj `d ~hsdh m em
~`odhehkçm cjhgê~sjom |msm eh j~`gm `e`o~sÿdjoh n` jn`d~jbjomojÿd z mp~`d~jomojÿd $
a~~|9(({{{$s`n`{`c$ohg(X~q~(2?<(03$|nb
‣ Pdjr`sj~ì nj Chehkdm !3<<:*$ Cjhg`~sjo Bjdk`s|sjd~ S`ohkdj~jhd _z~`g $
a~~|9((mgnh~~hsm~h$ojc$pdjch$j~(=3?>(=(^`jBjdme`X'XGm~~`hXB`ssmsm$|nb
‣ Pdjr`sj~z hb F`cmdkmmd " Jd~j~p~` hb @e`o~sjome mdn @e`o~shdjo @dkjd``s !3<==*$
_~m~` hb ~a` ms~ jd hbbejd` jkdm~ps` r`sjbjom~jhd z~`g$
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 97/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :; n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
MD@QH JJ9 ÇDNJO@_ N@ ^MCEM_% KSÍBJOH_ @
JEP_^SMOJHD@_
ÇDNJO@ N@ ^MCEM_
^mcem =9 _`dhs` `kùd ~j|h n` ~`odhehkçm cjhgê~sjom $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$3?
^mcem 39 \msíg`~sh ohdjn`smnh `d omnm ~`odhehkçm cjhgê~sjom $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$3>
^mcem ?9 Omsmo~`sç~jom `q~smçnm `d omnm ~êodjom cjhgê~sjom $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$30
^mcem >9 Rmehsmojÿd ohg|msm~jrm n` em nj~jd~m ~êodjom cjhgê~sjom $$$$$$$$$$$$$$$$$$$$$$$$$$$$>=
^mcem 09 R`d~mim ` jdohdr`dj`d~` n` em nj~jd~m ~`odhehkçm $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>=
^mcem 29 Ohg|msm~jrm cjhg`~sçm r Ohd~sm`ým(~msi`~m $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>2
^mcem ;9 \sjdoj|me` ~ídnms` qj~`d~` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$;1
^mcem 19 Jg|mo~h `d em |sjrmojnmn $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1<
^mcem :9 Rped`smcjejnmn` $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$1?
ÇDNJO@ N@ KSÍBJOH_
Ksíbjoh =9 \sho`h n` jdosj|ojÿd `d `e s`kj~sh $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$30
Ksíbjoh 39 \sho`h n` jn`d~jbjomojÿd `d em mp~`d~jomojÿd $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$32
Ksíbjoh ?9 \sho`h n` r`sjbjomojÿd `d em mp~`d~jomojÿd $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$3;
Ksíbjoh >9 Ksmnh n` jg|emd~mojÿd `d `e g`somnh $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$>?
ÇDNJO@ N@ JEP_^SMOJHD@_
Jep~smojÿd =9 Gjdpojm n` pdm ap`eem nmo~jems $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?<
Jep~smojÿd 39 êodjom n` ohss`emojÿd $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?<
Jep~smojÿd ?9 S`ohdhojgj`d~h bmojme $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?=
Jep~smojÿd >9 S`ohdhojgj`d~h n` em k`hg`~sçm n` em gmdh
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?>
Jep~smojÿd 09 S`ohdhojgj`d~h n` s`~jdm $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?0
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 98/100
@~pnjh hcs` em ~`odhehkçm cjhgê~sjom m|ejomnm m em `kpsjnmn \íkjdm :1 n` =<<Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd
Jep~smojÿd 29 S`ohdhojgj`d~h n` r`dm n` em gmdh $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?2
Jep~smojÿd ;9 S`ohdhojgj`d~h n` em bhsgm n` mdnms $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$?:
Jep~smojÿd 19 Ohd~she n` moo`h $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$0;
Jep~smojÿd :9 Ohd~she n` |s``dojm n` nhce` bmo~hs $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$0;
Jep~smojÿd =<9 Moo`h sí|jnh m bshd~`sm m`sh|hs~pmsjm $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$2?
Jep~smojÿd ==9 M|ejomojÿd |msm k`~jÿd n` mzpnm |ùcejom m ~smrê n` omi`sh
mp~hgí~joh $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$22
8/3/2019 Estudio sobre las tecnologías biométricas aplicadas a la seguridad
http://slidepdf.com/reader/full/estudio-sobre-las-tecnologias-biometricas-aplicadas-a-la-seguridad 99/100
_çkp`dh m ~smrê n`9
[`c a~~|9((hc`srm~hsjh$jd~`oh$`
\`sbje Bmo`chhf Hc`srmJD^@OH
a~~|9(({{{$bmo`chhf$ohg(Hc`srmJD^@OH
\`sbje {j~~`s Hc`srmJD^@OH
a~~|9(({{{$~{j~~`s$ohg(Hc`srmJD^@OH\`sbje _osjcn Hc`srmJD^@OH
a~~|9(({{{$osjcn$ohg(Hc`srmJD^@OH
Omdme Zhp~pc` Hc`srmJD^@OH
a~~|9(({{{$zhp~pc`$ohg(Hc`srmJD^@OH
Cehk n`e Hc`srm~hsjh n` em _`kpsjnmn n` em Jdbhsgmojÿd9
a~~|9(({{{$jd~`oh$`(cehk(jd~`oh(_`kpsjnmn(Cehk_`kpsjnmn
@drçmdh ~p ohdpe~m z ohg`d~msjh m9
hc`srm~hsjhLjd~`oh$`