Biometric Authentication
Essay by varaqo • August 18, 2019 • Coursework • 665 Words (3 Pages) • 792 Views
Biometric Authentication is a security practice that uses a distinct behavioral and physiological characteristic of a person to validate the person. The system compares a biometric data which is stored in the database and the data is authenticated before storing to the database authentic data, it then uses the input data to compare the existing and can be authorized. Biometric Authentication has many uses, these systems can be installed in physical environments access points such as doors and gates. Since biometrics can give a reasonable level of assurance in people authorizations as it is complex to mimic the biometric characteristics of a person to achieve unlawful access, because of this it has drastically improved its uses in today’s world along with that the user interference is also less compared to other forms of authentications. Although biometric authentication provides a superior form of authentication it is still expensive to implement as it is very complicated to install use and program and due to technological advances this is being feasible for a range of many implementations. Biometrics are currently used in many different domains, ranging from state security ease of the individuals.
Biometric Authentication systems are divided into two types based on intrinsic characteristics, physical and behavioral. Physical Identifiers are the most used type of Biometric Authentications and these are mostly immutable and are device-independent. There are different types of physical identifiers such as Fingerprints, Retina and Iris scans, Facial recognition, Voice matches, Digital Signatures, DNA sequential scanning, etc. Behavioral Identifiers are a new method of authentications and are being used along with other different types of authentications which have lower consistency. Compared to the physical identifiers behavioral are not limited to a set of characteristics. Behavioral Identifiers are mostly used in distinguishing between humans and robots and as technology advances the possibility of uses are endless on where the behavioral identifiers can be used. Different types of behavioral identifiers such as Typing Patterns, Navigation Patterns, Engagement Patterns, Physical Movements, etc.
Designing a Biometric Authentication security system is a complex process. Firstly, we need to evaluate the existing security system and need to analyze if any security holes would be created by the integration of the existing and the new security system and following the current security policies. Once the analysis on the analysis is completed selecting the software and the right equipment is important and solely depends upon the type of biometric system being incorporated such as installing a USB-attached fingerprint device to grant access to a laptop. The more advanced devices can also measure behavioral factors rather than
...
...