Biometric Authentication

What is Biometric Authentication? Biometric Authentication is a way someone can personally access devices, personal information in their company, or even a way to gain access to a building. Biometric Authentication is one of the most recent ways to securing almost anything. Originally known as realistic authentication, in computer science it is a form of identification or access control. Biometric authentication is a security process that relies on the unique biological characteristics of an individual to verify that they are who they claim to be. Flawless you would think right? Nobody can copy certain biological features on someone else right? Wrong!
There are a many different types of Biometric Authentication systems:
• Retina Scan – produce an image of the blood vessel pattern in the light-sensitive surface of someone eye
• Iris Recognition – Used to identify people from the unique patterns of their pupil of the eye
• Fingerprint scanning – the digital version of fingerprint processing. Takes the pattern of a particular finger
• Finger vein ID is based on the unique vascular pattern in an individual’s finger.
• Facial recognition- systems work with numeric codes called face prints, which identify 80 nodal points on a human face.
• Voice Identification – System relies on characteristics created by the shape of a person’s mouth, lips, and throat
• Walk Pattern Recognition – Not widely used, however this biometric system determines how a person walks. So in case someone has the credentials to impersonate someone, by walking through a walk pattern recognition, the system will determine if he is who that person says they are or not
Biometric is a great way to keep information, buildings, and people secure. However, there are ways to get around these secure authentications. It isn’t as simple as changing your face or something simple as changing your walk, no, things are much more difficult than that. Facial Recognition for instance is a great security measure; no two people are born with the exact same facial features, not even twins. (If you would like detail about facial recognition see the blog titled “Are you the Real you?”). Another common and well-used biometric feature is the Fingerprint scanner.
For the last 3 years companies have seen a major decrease in smart phones and tablets being stolen. The result comes from implementing fingerprint scanning in mobile devices. To date, iPhones use this finger print scanning system in their iPhones, and it has brought a more security to someone’s personal information on their phone. Are there ways around the fingerprint scanner? Yes, unfortunately, nothing is perfect. The primary issue especially on mobile devices is a tactic where someone uses their breath to resurface your most recent fingerprint impression. By doing this, then using a clear plastic wrap, you could gain access to a person’s phone. (This does not work that often but it has worked for a couple people just trying it out on their own phones). Do not fear there are ways to prevent such an attack happening to you, the main on is to clear your screen and scammer after every use. This way if it is stolen there will not be a trace of your fingerprint, essentially making the phone useless to some on else.
Biometric Authentication is wonderful. It keeps you safe from outside people. No more covering your phone to type a password in. The next big thing is retina scan. Some computer companies have started to install a facial recognition feature and a retina scan feature, hence taking security to the next level. “If you like to read more, like and share this article and follow my Facebook page. Enjoy!”

Leave a Reply

Your email address will not be published. Required fields are marked *

Skip to toolbar