Biometric Identification Technology, Authentication & Security

Biometrics are unique physical or behavioral characteristics that can be used to identify individuals. Biometrics are often used for security purposes, such as to authenticate users of a computer system or to grant access to a physical location. They can also be used for identification purposes, such as to track individuals who are under surveillance or to match missing persons to their DNA records. There are two main types of biometrics: physiological and behavioral. These articles relate to Biometric technology, Biometric security, Biometric authentication and security.

RSS

Business owners need to beware working with their head in the clouds

1 Business owners need to beware working with their head in the clouds

Is Cloud Computing the one-size-fits-all solution for business IT? Gary David Smith co-founder of Prism Total IT Solutions clears up some of the haziness surrounding the Cloud and says that key is to pick the right elements for the right business.

SecurEnvoy secures patents, protecting its IP

2 SecurEnvoy secures patents, protecting its IP

SecurEnvoy is delighted today to confirm that it has successfully patented its 'preload' technology for SecurAccess and SecurMail.

Nexsan Assureon secure online archive recognised as 'first-class solution'

3 Nexsan Assureon secure online archive recognised as 'first-class solution'

Nexsan has announced results from a TechValidate user survey which reveal a high product satisfaction rate for Nexsan Assureon in applications that require long-term data archiving, storage optimisation and secure, compliant storage.

Lexmark launches business solutions dealer programme

4 Lexmark launches business solutions dealer programme

Lexmark International, Inc., the printing and imaging solutions provider, is launching a new EMEA channel programme.

Juniper Networks Global Research shows mobile malware accelerating

5

Juniper Networks has released findings from its 2011 Mobile Threats Report, showing that mobile malware has reached a new stage of maturation. The report, conducted by the Juniper Networks Mobile Threat Centre a centre devoted exclusively to mobile security research is claimed to be one of the largest first-hand quantitative research studies of its kind.

Avnet Technology Solutions UK introduces new NetApp and Microsoft entry-level solution

6 Avnet Technology Solutions UK introduces new NetApp and Microsoft entry-level solution

Avnet Technology Solutions has introduced a new entry level solution to the UK market which integrates NetApp's advanced virtualisation feature set and Microsoft's private cloud solution.

Water authorities tighten up on security with tokenless 2 factor

7 Water authorities tighten up on security with tokenless 2 factor

Northumbrian Water Limited (NWL) is using a fresh approach to the age-old problem of providing secure access to corporate systems without the need for tokens or smartcards.

Lumidigm provides fingerprint biometrics to IdentyTech's multimodal Wallmount terminal

8 Lumidigm provides fingerprint biometrics to IdentyTech's multimodal Wallmount terminal

Lumidigm has announced that IdentyTech's new IDT Wallmount terminal, a full identification center based on a secured solution, features Lumidigm's multispectral imaging fingerprint sensors.

The Health Store invests in Accord with wall-to-wall Voice

9

Supply chain software specialist BCP continues to grow its client portfolio with the addition of new customer, The Health Store, which is making a 300,000 investment in BCP's Accord software suite, including wall-to-wall Voice Directed WMS, for its head office in Nottingham.

AeroScout and NHS Trust, John Radcliffe Hospital, deploy asset tracking and temperature monitoring solutions

10 AeroScout and NHS Trust, John Radcliffe Hospital, deploy asset tracking and temperature monitoring solutions

AeroScout has announced that the John Radcliffe Hospital, part of the Oxford Radcliffe Hospitals NHS Trust in the UK, has implemented AeroScout's Asset Tracking & Management and Temperature Monitoring solutions.

Biometric Identification Technology

Biometrics are unique physical or behavioral characteristics that can be used to identify individuals. The most common types of biometrics include:

  • Fingerprints: The pattern of ridges and valleys on a person's fingertips.
  • Facial recognition: The unique features of a person's face, such as the shape of their eyes, nose, and mouth.
  • Voice recognition: The unique sound of a person's voice.
  • Iris recognition: The unique pattern of the blood vessels in a person's iris.
  • Vein recognition: The unique pattern of veins in a person's hand.
  • DNA: The genetic makeup of a person.

Biometrics are often used for security purposes, such as to authenticate users of a computer system or to grant access to a physical location. They can also be used for identification purposes, such as to track individuals who are under surveillance or to match missing persons to their DNA records.

There are two main types of biometrics: physiological and behavioral. Physiological biometrics are based on physical characteristics, such as fingerprints or facial features. Behavioral biometrics are based on how a person behaves, such as their signature or their voice.

Biometrics have several advantages over traditional security methods, such as passwords and PINs. They are more difficult to forge or steal, and they can be used to identify people even if they are wearing a mask or have changed their appearance. However, biometrics also have some disadvantages. They can be expensive to implement, and they can raise privacy concerns.

Overall, biometrics are a powerful tool that can be used to improve security and identification. However, it is important to weigh the benefits and risks of using biometrics before implementing them.

Here are some additional examples of biometrics:

  • Hand geometry: The size, shape, and other features of a person's hand.
  • Retina scanning: The pattern of blood vessels in a person's retina.
  • Keystroke dynamics: The way a person types on a keyboard.
  • Gait analysis: The way a person walks.
  • Ear shape: The unique shape of a person's ear.

Biometric identification technology offers a number of advantages over traditional methods of identification, such as passwords and PINs. Biometric identifiers are unique to each individual, so they are more difficult to forge or steal. They are also more convenient than passwords and PINs, as they do not require users to remember anything.

However, biometric identification technology also has some disadvantages. One disadvantage is that biometric identifiers can be spoofed or bypassed. For example, fingerprints can be lifted from objects that a person has touched, and facial recognition can be fooled by masks or makeup. Another disadvantage is that biometric identifiers raise privacy concerns. Some people are concerned about the government or companies collecting and storing their biometric data.

Overall, biometric identification technology is a promising technology with the potential to improve security and convenience. However, it is important to be aware of the potential risks and limitations of this technology before using it.

Here are some of the use cases of biometric identification technology:

  • Access control: Biometric identification technology can be used to control access to secure areas, such as buildings, computers, and networks.
  • Payment: Biometric identification technology can be used to make payments without the need for cash or cards.
  • Authentication: Biometric identification technology can be used to authenticate users for online services and applications.
  • Surveillance: Biometric identification technology can be used to track and identify people in surveillance footage.

Biometric identification technology is a rapidly evolving field, and new applications for this technology are being developed all the time.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter