October 24, 2014

"Biometric" come from the Greek words "bio" (life) and "metric" (to measure). Biometrics are technologies used for measuring and analyzing a person's unique characteristics. There are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification while physical biometrics can be used for either identification or verification.

October 23, 2014

Biometrics. Biometrics is a general term used alternatively to describe a characteristic or a process. s a characteristic: A measurable biological (anatomical and physiological) and behavioral characteristic that can be used for automated recognition. 

As a process: Automated methods of recognizing an individual based on measurable biological (anatomical and physiological) and behavioral characteristics. 

Reliable user authentication is essential. The consequences of insecure authentication in a banking or corporate environment can be catastrophic, with loss of confidential information, money, and compromised data integrity. Many applications in everyday life also require user authentication, including physical access control to offices or buildings, e-commerce, healthcare, immigration and border control, etc.

Please reload

Discerning The Times Online  Biometrics 101

 

 

Basics:

 Facial recognition analyzes the characteristics of a person's face images input through a digital video camera. It measures the overall facial structure, including distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used as a comparison when a user stands before the camera. This biometric has ben widely, and perhaps wildly, touted as a fantastic system for recognizing potential threats (whether terrorist, scam artist, or known criminal) but so far has been unproven in high-level usage. It is currently used in verification only systems with a good deal of success.  

 

October 24, 2014

Reliable user authentication is essential. The consequences of insecure authentication in a banking or corporate environment can be catastrophic, with loss of confidential information, money, and compromised data integrity.Many applications in everyday life also require user authentication, including physical access control to offices or buildings, e-commerce, healthcare, immigration and border control, etc.

 

October 26, 2014

How it Works:

 The most common form of vascular pattern readers are hand-based, requiring the user to place their hand on a curved reader that takes an infrared scan. This scan creates a picture that can then be compared to a database to verify the user's stated identity. 

April 22, 2013

The uniqueness of eyes, even between the left and right eye of the same person, makes iris scanning very powerful for identification purposes. The likelihood of a false positive is extremely low and its relative speed and ease of use make it a great potential biometric. The only drawbacks are the potential difficulty in getting someone to hold their head in the right spot for the scan if they are not doing the scan willingly. It also takes up a bit more memory for the data to be stored, but with the advances in technology, this is unlikely to cause any major difficulty.  

Please reload