Understanding Biometric Technology: An Overview
Understanding Biometric Technology: An Overview
Close
Artificial intelligence is converging with biometrics to help provide more security in computers and smartphones . This article explains the topic.
Disclaimer: This post includes affiliate links
If you click on a link and make a purchase, I may receive a commission at no extra cost to you.
Biometrics Defined
Biometrics is defined as the study and application of scientific and/or technological methods designed to measure, analyze, and/or record a human’s unique physiological or behavioral characteristics.
Biometrics leverage human characteristics that are unique from one person to the next so that our own selves become the means of identification/authentication instead of having to enter in a strong password or lengthy pin code.
In fact, many of us already use biometrics now in the forms of our fingerprints and our faces.
How Biometrics Are Used in Daily Life
Although biometrics has been used by various industries for decades, modern tech has helped it gain more public awareness. For example, many of the latest smartphones feature fingerprint scanners and/or facial recognition to unlock devices.
Anthony Lee / Getty Images
Compared with so called_token-based_ (e.g. keys, ID cards, driver’s licences) and_knowledge-based_ (e.g. PIN codes, passwords) methods of access control, biometric traits are far more difficult to hack, steal, or fake.
This is one reason why biometrics are often favored for high-level secure entry (e.g. government/military buildings), access to sensitive data/information, and the prevention of fraud or theft.
Characteristics used by biometric identification/authentication are predominantly permanent, which offers a convenience — you can’t simply forget or accidentally leave them somewhere at home.
However, the collection, storage, and handling of biometric data (particularly with regards to consumer tech) often brings up concerns about personal privacy, security, and identity protection.
Biometric Types and Screening Characteristics
There are a number of biometric characteristics in use today, each with different means of collection, measurement, evaluation, and application. Physiological characteristics used in biometrics relate to the_shape and/or composition_ of the body. Some examples are (but not limited to):
- DNA
- Fingerprints/palm prints
- Iris/retina
- Face
- Vein geometry
- Scent/odor
Behavioral characteristics used in biometrics — sometimes referred to as behaviometrics — relate to_unique patterns exhibited through action_ . Some examples are (but not limited to):
- Voice
- Gait
- Signature
- Keystroke
- Heartbeat
Characteristics are chosen because of specific factors that make them suitable for biometric measurements and identification/authentication. The seven factors are:
- Universal – Each individual has to have it.
- Unique – There should be enough differences to distinguish separate individuals from each other.
- Permanence – The resistance to change over time (i.e. how it holds up against aging).
- Collectability – The ease of acquiring and measuring.
- Performance – The speed and accuracy of matching.
- Circumvention – How easily it can be faked or imitated.
- Acceptability – The openness of people to the particular biometric technology/process (i.e. easier and less invasive techniques, such as fingerprint scanners in smartphones , tend to be more widely accepted).
These factors also help determine if one biometric solution may be better to apply in a situation than another. But cost and the overall collection process are also considered. For example, fingerprint and face scanners are small, inexpensive, fast, and easy to implement into mobile devices. This is why smartphones feature those instead of hardware for analyzing body odor or vein geometry!
How Biometrics Work in Everyday Life
Law enforcement agencies regularly collect fingerprints to help establish crime scenes and identify individuals. MAURO FERMARIELLO/SCIENCE PHOTO LIBRARY / Getty Images
Biometric identification/authentication starts with the collection process. This requires sensors designed for capturing specific biometric data. Many iPhone owners may be familiar with setting up Touch ID , where they have to place fingers on the Touch ID sensor over and over and over again.
The accuracy and reliability of equipment/technology used for collection help to sustain higher performance and lower error rates in subsequent steps (i.e. matching). Basically, new tech/discovery helps to improve the process with better hardware.
Some types of biometric sensors and/or collection processes are more common and prevalent than others in everyday life (even if unrelated to identification/authentication). Consider:
- Forensic Science: Law enforcement agencies regularly collect fingerprints, DNA samples (hair, blood, saliva, etc.), video surveillance (face/gait recognition), handwriting/signatures, and audio recordings (speaker recognition) to help establish crime scenes and identify individuals. The process is frequently portrayed (i.e. dramatized with varying degrees of actual realism) in movies and television shows. You can even purchase forensic science toys for aspiring detectives.
- Computer Security: Fingerprint scanners are a growing type of security feature to be incorporated in mobile devices — these scanners have been available (both integrated and as a separate unit) for desktop/laptop computers for years. Facial recognition, found in smartphones such as the Apple iPhone X with Face ID or any Android using Google Smart Lock , perform security actions (typically unlocking) either in lieu of or in addition to fingerprint scanners.
- Medicine: Many annual wellness checks include digital retinal imaging as an (optional) enhancement to comprehensive eye examinations. Photographs of the inner of eye help doctors screen for eye diseases/conditions. There is also genetic testing, used by doctors to help individuals determine the risks and prospects of developing a hereditary disease/condition. Paternity tests are commonplace too (often a recurring theme of some daytime talk shows).
- Home Entertainment/Automation: Speech recognition (different from_speaker recognition_ , which is used by forensics to identify individuals through voice patterns) has been available for quite some time. It’s mostly applied for word recognition, such as speech-to-text , language translation, and device control. If you’ve had a conversation with Apple’s Siri , Amazon’s Alexa , Android’s Google Now , and/or Microsoft’s Cortana , then you’ve experienced the entertainment of speech recognition. Many smart home devices can also be automated through voice activation .
- Purchases/Contracts: If you’ve ever paid using a credit card and/or established an agreement (e.g. ID cards, bank checks, medical/insurance, titles/deeds, wills, renting, etc.) with a person/entity, you’ve likely had to sign your name. Such signatures can be examined to help establish identity and/or forgery – trained professionals are able to discern natural variations in one’s handwriting versus differences that indicate a completely different writer.
Once a biometric sample has been captured a sensor (or sensors), the information undergoes analysis by computer algorithms. The algorithms are programmed to identify and extract certain aspects and/or patterns of characteristics (e.g. ridges and valleys of fingerprints, networks of blood vessels in retinas, complex markings of irises, pitch and style/cadence of voices, etc.), typically converting the data to a digital format/template.
The digital format makes the information easier to analyze/compare against others. Good security practice would involve encryption and secure storage of all digital data/templates.
Next, the processed information passes along to a matching algorithm, which compares the input against one (i.e. authentication) or more (i.e. identification) entries saved within a system’s database.
Matching involves a scoring process that calculates degrees of similarity, errors (e.g. imperfections from the collection process), natural variances (i.e. some human characteristics can experience subtle changes over time), and more. If a score passes the minimum mark for matching, then the system succeeds at identifying/authenticating the individual.
Biometric Identification vs. Authentication (Verification)
Fingerprint scanners are a growing type of security feature to be incorporated in mobile devices. mediaphotos / Getty Images
When it comes to biometrics, the terms ‘identification’ and ‘authentication’ are often confused with one another. However, each one is really asking a slightly different yet distinct question.
Biometric identification wants to know_who you are_ — the one-to-many matching process compares biometric data input against all other entries within a database. For example, an unknown fingerprint found at a crime scene would be processed to identify who it belongs to.
Biometric authentication wants to know if_you are who you claim to be_ – the one-to-one matching process compares biometric data input against one entry (typically yours that had been previously enrolled for reference) within a database.
For example, when using the fingerprint scanner to unlock your smartphone, it checks to ensure that you are indeed the authorized owner of the device.
What Are Finger Scanners and How Do They Work?
FAQ
- What is a biometric screening?
A biometric screening refers to the practice of clinically evaluating a person’s physical characteristics and wellness, offering them a snapshot of their current health. Height, weight, BMI, blood pressure, and more are usually assessed. These are most often performed by employers or throughout the process of immigration, though they can be used in other contexts, too. - How long after a biometric screening does it usually take to get a U.S. Green Card?
This process varies, but after your biometrics appointment is done and the accompanying paperwork filed, it usually takes between 6 and 10 months to process before you will receive a Green Card.
Was this page helpful?
Thanks for letting us know!
Get the Latest Tech News Delivered Every Day
Tell us why!
Other Not enough details Hard to understand
Submit
Also read:
- [New] Growth Hurdle Cleared 500 Subscribers Win for 2024
- [Updated] In 2024, Ultimate Screen Capture Tool 2021
- [Updated] Step-By-Step Tutorial Engaging in a Call on Snapchat
- 8 Remedies for iPhone Charging Alerts on Hold – Fixes and Tricks Revealed
- Complete Hiccup's Journey: The Right Sequence to Experience How to Train Your Dragon Movies
- Creative iPhone and iPad Shenanigans to Surprise Your Friends
- Exploring How Fast Memory Influences System Responsiveness and Latency
- Fixing the Screen Hurdle: Sonic Frontiers Win on W11
- How To Securely Update Your Facebook Password Today
- How to Successfully Upload a Movie File (MOV) on YouTube
- In 2024, Step-by-Step Tutorial How To Bypass Infinix Zero 5G 2023 Turbo FRP
- Learn The Tricks: Crafting A Secondary Gmail ID For Better Contact Management
- Netflix Viewing Party Tips: How To Do a Live Movie Watch Along
- Step-by-Step Fixes for When You Can't Find libgdk-win32-2.0-0.dll on Windows
- The Ultimate Guide to Finding the Best iPhone X/11/SE PDF Readers - 11 Options Included!
- Ultimate Tips for Watching Netflix Movies Offline on Laptops
- Unveiling the Art of Quiet Video Capture Methods for 2024
- Updated 2024 Approved Auditory Alteration Made Easy Two Paths to Revamping Sound in Visual Media
- What's Next for Apple Enthusiasts? Rumors and Insights on Apple Watch Ultra Ⅱ Pricing, Launch Schedule & Expected Innovations
- Title: Understanding Biometric Technology: An Overview
- Author: John
- Created at : 2024-10-16 07:33:08
- Updated at : 2024-10-19 02:45:38
- Link: https://techno-recovery.techidaily.com/understanding-biometric-technology-an-overview/
- License: This work is licensed under CC BY-NC-SA 4.0.