Security Input Devices

A look at a range of available security input devices

Security Input Devices

Assist in providing protection against unauthorised access to computing devices and associated resources. One of the most commonly implemented security input devices are biometric devices.

Biometrics are a method of recognising an individual based on certain physiological or behavioural characteristics. These characteristics are unique to the individual and include detection of things such as retina or voice patterns and fingerprints. Biometrics are fast becoming the foundation of secure personal verification solutions and secure identification. Some modern mobile phone technologies, such as the Sony Xperia range, are already including fingerprint biometrics into their operations.

Biometrics can also add an additional layer of physical security by verifying the identity of a person attempting to gain access to a system or device.

Due to their nature, biometric devices are more complicated to set up and will always require installation and configuration to the individual user before they are able to be used. The initial ‘object’ (e.g. fingerprint, retina scan voice print etc) that will be utilised by the system user will first have to be captured and stored. Once that has been completed, the user will then have to test the system in order to ensure that it accurately identifies and verifies them.

In the vast majority of cases, biometric devices are connected to a computer system through an available USB port.


Biometric Devices

There are a variety of different biometric security input devices available to support identification of an individual who wishes to use a computer system:

  • Fingerprint Scanner/Reader: These devices scan an individuals fingerprint(s) and match them to a database of stored prints in order to verify the person’s identity. Once verified, that person will be able to access whatever the scanner is protecting. If such a device is not already hardwired into a system (e.g. a building’s security system) then fingerprint scanners are typically connected to devices, such as personal computers, through a USB connection. Some laptops and mobile phones have fingerprint scanners built into them in order to improve the security of such devices.

    A Fingerprint Scanner
  • Retina Scanners: Work in a similar vein to fingerprint scanners by scanning an individuals retina pattern and comparing it to a stored database of scans to verify the user’s identity. As with fingerprint scanners, if the Retina Scanner is not hardwired into a system, it can be connected via a USB port. Very few personal devices currently have built in retina scanners.

    A Retinal Scanner
  • Voice Recognition: Make use of a spoken ‘pass phrase’ to compare against a stored database of voice prints in order to verify the identity of the person speaking the phrase. Similarly to both fingerprint and retina scanners, voice recognition devices can be connected to a computer system through a USB connection.
  • Signature Recognition: Makes use of a ‘signature pad’ on which an individual will physically ‘sign’ their name. This will then be compared to a database of stored signatures to verify the identity of the user. Other than the signature itself, signature readers also analyze other aspects of the signers behaviour, such as the strokes used and the amount of pressure applied to the pad whilst signing. As with all the other devices above, signature readers can be connected to a computer system through a USB connection if they are not already hard wired.

    A Signature Reader
  • Biometric Keyboards: Biomtetic Keyboards use a special program monitor the behavioural characteristics of a system user’s typing, such as key strokes, key press duration and pressure etc, in order to create a ‘baseline’ for the individual. Once this analysis is stored, the program will be able to challenge a user to verify their identity simply typing. The system will then compare this keystroke behaviour with that stored in the database for that particular user. Some biometric keyboards also have built in fingerprint scanners and the majority are connected to a system via a USB connection.

    Biometric Keyboard
  • Biometric Mice: A biometric mouse generally uses a form of biometric authentication before it will allow an individual to use a computer system. In most cases, this is typically a built in fingerprint reader which will then compare the offered fingerprint with those of that stored on a database.
  • Storage Devices: Biometric storage devices, ordinarily hard drives or flash drives, typically use a built in fingerprint reader to verify and allow an individual to access data stored on it. In most cases, these devices are connected to a computer system through a USB port.

    Biometric Flash Drive
  • Motion Sensors: Whilst motion sensors are not quite security input devices as we’ve looked at above, they do still classify as they are able to input a signal into a computer system when they detect changes in heat, normally caused by a human body. This is done through infrared sensors contained within the device. In most cases, motion sensors are hard wired into a security system and rarely connected through a peripheral connection such as USB.
  • Smart Card Readers: Smart card readers, unlike other devices looked at in this article, do not fall into the category of biometric devices. Smart card readers work through reading information stored within a microprocessor within a smart card. Ordinarily, this will provide a physical access token to provide access to a specific area for the user. Often, these smart cards take on the form of employee ID cards.

    Smart Card Reader

Multimedia & Optical Input Devices

Some of the more common multimedia and optical input devices

Multimedia Input Devices

Are devices which transfer sound, images, video or a combination therein to or from a computer system. Multimedia devices can be either input or output devices and common types of this device are digital cameras and sound devices.

Digital Cameras
Digital cameras capture and store photographic or video images through the use of electronic signals. The captured files are most often stored on removable memory cards, although they may sometimes be stored on embedded cards or optical discs.

It’s possible to transfer, print, save or otherwise work and edit with the information stored on the digital camera or removable memory by connecting the camera or storage media to a computer system.

If the camera has a removable storage media, it’s possible to transfer the data by connecting the card itself to the system through a media card reader.

The majority of digital cameras are connected to computer systems through USB or Firewire connections.

Camcorders & Video Recording Cameras
Video recording cameras work in very much the same way as other digital cameras. Often, data is stored on removable or optical media and the data is captured through analogue or digital electronic signals.

As with digital cameras, video recording cameras can often be connected to a computer system through a USB or Firewire port. However, some professional grade cameras may use tapes or disks that will need an alternate transfer method, sometimes additionally requiring digitisation.

Webcams
A webcam, or Web Camera, is used to send a continual video feed or periodic images to a website for display. In the majority of cases, webcams capture the data in the form of JPEGs (images) or MPEGS (video) before uploading them to a web server.

Webcams are also used a lot within instant messaging software (such as Skype) and by some video applications. In some cases, companies and corporations might use webcams as a security measure.

As with digital cameras and camcorders, webcams are very often connected to computer systems through USB or Firewire ports.

Microphones
A computer microphone allows audio data to be sent into a computer system. Normally this would be either for the data to be recorded or for use in ‘real time’, such as an audio feed that accompanies a webcam or video conference feed.

In the vast majority of cases, the microphone is connected to the computer system through a microphone jack or sound card. If the sound-card has colour coded ports, the microphone connection will be pink in colour. Otherwise, the ports will be marked with the word ‘mic’ or with a small microphone icon.

Most microphones have a 1/8-inch phono plug built into the cable to enable connection.

 


Optical Input Devices

Optical Input Devices offer a way for users to be able to transfer information from a paper, ‘hard-copy’ source into a digital format that the computer system is able to work with.

Scanners
Scanners are used to take a photo-identical copy (scan) of a physical copy of any document (known as ‘hard-copy’) and create a digital format copy which can be stored, transfered or edited on a computer system.

A scanner works in a similar fashion to a photocopier but, ordinarily, has a much smaller footprint. Scanners can be attached directly to a computer system to import the scanned copies of documents. With the correct software, imported documents can be edited, manipulated for transmitted.

Typically, a scanner is connected to a computer system through a USB or High-Speed USB connection. In todays world, scanners are very often incorporated into multi-function printers.

Barcode Readers
Barcodes are able to provide a simple and inexpensive method of encoding textual information that can be easily read by electronic readers.

A bardcode reader scans a light source across the barcode and converts the pattern of reflected light into an electronic signal that is then decoded back into it’s original data format.

There are currently four styles of barcode reader available:

  • Pen-type readers (also known as barcode wands)
  • Laser scanners
  • Charge Coupled Device (CCD) readers
  • Camera-based readers

As with the majority of peripheral input devices, barcode scanners are connected to computer systems through USB connections.

Pointing Devices

A look at some common computer pointing devices

Pointing devices enable us to be able to navigate around the graphical user interface of a computer system easily, without having to be aware of the various command line prompts that would otherwise be needed in order to open and utilise applications.

Similar to most computer system peripheral devices, pointing devices come in a variety of designs.  The most common of these is the computer mouse, of which most of us will be familiar.  Other pointing devices include game pads, touch pads, track balls, joysticks, and graphics tablets.


Mouse

The ‘mouse’ gets it’s name from it’s original appearance; that of a small rounded rectangle with a cable attached to one end. A mouse sends data to the graphical user interface (GUI) by having it’s movement tracked across the desk or mouse pad.

A typical wireless mouse with two buttons and a central ‘scroll wheel’

Most of today’s mice make use of optical technology to detect it’s movement through use of a laser. Unlike it’s ball-type predecessors, the lack of mechanical moving parts makes this mouse both more accurate and reliable.

Today’s wired mice are generally connected to a computer system through a USB port and, similarly, wireless mice connect to the system through a USB port transceiver. Alternatively, some mice make use of Bluetooth wireless technology to achieve the same goal.

The most common of today’s mice mice that come bundled with computer packages will typically have two main buttons and a central ‘scroll wheel’. However, there are a number of variations on this with some mice having up to 24 buttons available. This variation in buttons can be used for such things as moving forwards and backwards within browser windows or may be used to program functions for higher level PC gaming. Other mice, such as those that come with Mac computers have only a single button present.


Trackball Mouse

A Trackball Mouse is, to all intents and purposes, an upside-down version of a normal mouse. Instead of the later style of optical sensors, a trackball mouse has a ball just as the earlier versions of standard mouse had.

A Logitec Trackball Mouse

Signal are sent to a computer system from a trackball mouse by rolling it’s ball by movement of our fingers, thumbs or the palm of our hands. Similarly to a normal mouse, a trackball mouse will have at least one button to send signals to the computer system.


Touch Pad and Trackpoint

As the name might suggest a ‘touch pad’ is a small, touch-sensitive pad that is operated by the user running their finger across it’s surface. This is then converted into an electrical signal which is translated and transmitted to the system unit.

A Touchpad pointing device

Most touch pads have buttons just like their mouse or trackball counterparts. However there are also a high number of them which can be configured to detect the user tapping it’s surface with their finger, thereby processing that information in the same way it would as a click of the associated button.

Similar to Touch Pads are Trackpoints.  Trackpoints are normally found on laptops and are located either in the center or at the bottom of the system’s keyboard.  Ordinarily, Trackpoints are a small joystick style button that respond to directional force from the user in order to move the mouse pointer around the screen.

A Trackpoint device (above the letter ‘B’) with selection buttons underneath the spacebar

other Pointing Devices

In addition to the more traditional pointing devices above, there are other devices that have another primary function, but can also be used effectively as pointing devices.

Gamepad
Gamepads are primarily designed to be used within gaming applications. They are typically held and manipulated with two hands and feature a number of buttons that control different actions within the game or program.

The latest versions of many game pads also have sensors or pointing devices that can sense rotation, as well as direction of movement. A combination of these two are used to control actions within the game or application.

A Sony PS4, with it’s associated gamepad to the left

Most typically, gamepads connect to a computer system through a USB port although the most recent consoles and PC gaming pads use various forms of wireless technology to connect to the system unit.

Joystick
A joystick is a stick or lever which pivots around a base and is used to control movement on a device. The majority of current joysticks also include a number of additional controls, buttons, toggles or switches to control other associated actions that the input is controlling. The joystick itself inputs the angle and direction of any desired movement.

A Microsoft joystick

At one time, joysticks were the most common input device to be used with gaming programs and applications. However, with the introduction and improvements with gamepads, they are generally used more within flight or space simulators. In addition, joysticks are also often used to control machinery such as cranes and unmanned vehicles (drones).

Once upon a time, legacy joysticks were connected to computer systems via a ‘game port’, a device port that was designed specifically for connecting this style of input device. However, most modern joysticks employ a wired USB connection to connect to the computer system.

The Basics – What Makes Up A Computer

The four main categories of computer hardware and how they link to complete a computer system.

This first post covers the four main categories of PC hardware components and how they link together to complete a computer system.  Every computer system is made up of the first three categories below, with practically every system containing at least one item in the last category (Peripheral Devices). Continue reading “The Basics – What Makes Up A Computer”