Biometrics Explained

    Date24 Dec 2000
    3083
    Posted ByAnthony Pell
    Biometrics is the methodology for recognizing or identifying persons based on physiological or behavioral characteristics. Essentially all security features are based on a combination of three key concepts. Security can be based on something you have, something you know or something . . . Biometrics is the methodology for recognizing or identifying persons based on physiological or behavioral characteristics. Essentially all security features are based on a combination of three key concepts. Security can be based on something you have, something you know or something you are. While tokens or passwords can copied or stolen, biometric identifiers are much more difficult to reproduce.

    Currenty physical traits which can be used as identifiers include facial shape, fingerprints, iris patterns, retina patterns, hand geometry, speech, handwriting / keystroke order and finally even wrist vein patterns. For these identifiers to be physically compromised it would involve a very gory operation...

    It is the task of biometric products to apply a mathematical algorithm to the identifier (retina, or fingerprint for example) to determine if a user is a who they are pretending to be. In devices where a finger print is the means of identification, a small device will scan the fingerprint of the user and momentarily record the fine details. Where fingerprints are concern this may include features such as the finger prints' hills and valleys, the direction and branching points, line endings and dozens of other minutiae.

    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    17
    radio
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":100,"resources":[]},{"id":"67","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.