Biometric Identification Technology, Authentication & Security

Biometrics are unique physical or behavioral characteristics that can be used to identify individuals. Biometrics are often used for security purposes, such as to authenticate users of a computer system or to grant access to a physical location. They can also be used for identification purposes, such as to track individuals who are under surveillance or to match missing persons to their DNA records. There are two main types of biometrics: physiological and behavioral. These articles relate to Biometric technology, Biometric security, Biometric authentication and security.

RSS

BIOMETRICS gains UK approval - 76% now welcome its use says TSSI

1 BIOMETRICS gains UK approval - 76% now welcome its use says TSSI

The UK public is now overwhelmingly in favour of wider biometrics use.

Rapid expansion of Fujitsus PalmSecure biometric authentication technology

2

With more than 15,000 PalmSecure sensor installations in the marketplace, Fujitsu is a major provider of advanced biometric authentication devices.

LogicaCMG teams up with Dartagnan and WCC to support businesses throughout the world with complete biometric security solutions for passenger and employee processing

3

LogicaCMG, a leading IT services company, today announces its partnership with biometrics and passenger processing specialist Dartagnan, and with multi-modal and fusion experts WCC.

Low-cost biometric time and attendance now a reality for the small retailer

4 Low-cost biometric time and attendance now a reality for the small retailer

Small retailers and other SMEs now have an affordable time and attendance system at their disposal which uses cutting-edge biometric technology.

A4Vision Revolutionizes Checkpoint Processing, Applying 3D to 2D Facial Identification Database Searching

5

New 3D Capability Accommodates Varying Angles to Achieve Greater Precision and Robustness in 2D Image Searches. Civil ID Applications Immediately Benefit for Verification and Identification against 2D Databases at Checkpoints, while Providing 3D Databases for Wider Application

Resellers Equipped with 3D Facial Biometric Recognition Find New Opportunities

6

Innovative Model of Biometric Physical Access Control for Enterprises, Airports, Mass Transit and Large Venues Opens New Markets

World's smallest fingerprint template wins IEE Innovation in Engineering Security Award for TSSI

7

TSSI's NHS smartcard system also a finalist

Goodbye Passwords, Goodbye Smart Cards, Hello Security with Kerry Secure

8

Kerry Secure distributes a number of fingerprint authentication systems, most notably from DigitalPersona, Inc. and SecuGen Corporation in the USA. For several years, fingerprint authentication technologies have provided a viable and credible alternative to passwords and other security devices.

Biometrics: how do they work and what should we be asking

9

Two important issues globally affecting commerce today are identification and authentication of an individual. Identification says who you are and authentication specifies what you can do with that identity.

Growing security fears around card fraud lead to demand for biometric identification

10

Growing customer fears over the security of banking services and the increase of phishing attacks, card cloning and PIN number theft are leading to a demand for biometric identification security, according to research commissioned by Fujitsu Services, one of Europes leading IT management services companies.

Biometric Identification Technology

Biometrics are unique physical or behavioral characteristics that can be used to identify individuals. The most common types of biometrics include:

  • Fingerprints: The pattern of ridges and valleys on a person's fingertips.
  • Facial recognition: The unique features of a person's face, such as the shape of their eyes, nose, and mouth.
  • Voice recognition: The unique sound of a person's voice.
  • Iris recognition: The unique pattern of the blood vessels in a person's iris.
  • Vein recognition: The unique pattern of veins in a person's hand.
  • DNA: The genetic makeup of a person.

Biometrics are often used for security purposes, such as to authenticate users of a computer system or to grant access to a physical location. They can also be used for identification purposes, such as to track individuals who are under surveillance or to match missing persons to their DNA records.

There are two main types of biometrics: physiological and behavioral. Physiological biometrics are based on physical characteristics, such as fingerprints or facial features. Behavioral biometrics are based on how a person behaves, such as their signature or their voice.

Biometrics have several advantages over traditional security methods, such as passwords and PINs. They are more difficult to forge or steal, and they can be used to identify people even if they are wearing a mask or have changed their appearance. However, biometrics also have some disadvantages. They can be expensive to implement, and they can raise privacy concerns.

Overall, biometrics are a powerful tool that can be used to improve security and identification. However, it is important to weigh the benefits and risks of using biometrics before implementing them.

Here are some additional examples of biometrics:

  • Hand geometry: The size, shape, and other features of a person's hand.
  • Retina scanning: The pattern of blood vessels in a person's retina.
  • Keystroke dynamics: The way a person types on a keyboard.
  • Gait analysis: The way a person walks.
  • Ear shape: The unique shape of a person's ear.

Biometric identification technology offers a number of advantages over traditional methods of identification, such as passwords and PINs. Biometric identifiers are unique to each individual, so they are more difficult to forge or steal. They are also more convenient than passwords and PINs, as they do not require users to remember anything.

However, biometric identification technology also has some disadvantages. One disadvantage is that biometric identifiers can be spoofed or bypassed. For example, fingerprints can be lifted from objects that a person has touched, and facial recognition can be fooled by masks or makeup. Another disadvantage is that biometric identifiers raise privacy concerns. Some people are concerned about the government or companies collecting and storing their biometric data.

Overall, biometric identification technology is a promising technology with the potential to improve security and convenience. However, it is important to be aware of the potential risks and limitations of this technology before using it.

Here are some of the use cases of biometric identification technology:

  • Access control: Biometric identification technology can be used to control access to secure areas, such as buildings, computers, and networks.
  • Payment: Biometric identification technology can be used to make payments without the need for cash or cards.
  • Authentication: Biometric identification technology can be used to authenticate users for online services and applications.
  • Surveillance: Biometric identification technology can be used to track and identify people in surveillance footage.

Biometric identification technology is a rapidly evolving field, and new applications for this technology are being developed all the time.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter