Biometrics
Biometrics is the science of measuring a unique physical characteristic about an individual as an identification mechanism. A number of widely used biometric technologies and techniques exist. These techniques are deployed in new network design to secure the network environment even better. The most common biometric technologies are fingerprint scanning and voice recognition. This section briefly touches on other technologies such as face recognition (iris and retina), typing biometrics, and signature recognition.Biometric access methods for computer systems are gaining popularity because of governmental and corporate businesses' increased focus on security. Numerous commercial products are already available, and the future will inevitably see all portable devices, access doors, and so on being biometrically protected. The integration of biometrics in your security policy will provide a solid foundation for developing a secure environment.
Fingerprint Scanning
Fingerprint scanning is probably the most widely used biometric technology. As everyone knows, the fingertips of each individual have unique characteristics. These characteristics vary from the geometry to the pattern and size of the ridges. Picture how the ridges of the fingertip generate a fingerprint. Fingerprint scanners can read the fingerprint and convert it into a digital representation. The digital copy is checked against an authorized copy stored on the central computer system.Although this technology may seem sophisticated, it has a few drawbacks. For instance, the system can be cheated because it cannot determine if a fingerprint was made by a live user or was copied. If you are starting to deploy biometrics in your environment, consider commercially available computer keyboards with integrated fingerprint scanners. These are excellent and relatively cheap options.
Voice Recognition
Voice recognition, sometimes referred to as speech analysis, is based on vocal characteristics. Just as with fingerprints, each individual voice has unique characteristics. A few instruments and techniques are availablemost common is the microphone in combination with speech analysis applications. The purpose of all voice recognition systems is to depict the speech signal in some way and to capture and store its characteristics on a computer system. Again, these characteristics are checked against an authorized copy stored on the central computer system.
Typing Biometrics
Typing biometrics examine the characteristic typing techniques of computer users. Some known characteristics are as follows:
- Speed
- Patterns
- Force
- Keystroke duration
- Inter-keystroke latency (latency between the first and second keystroke)
- Error frequency
In general, typing biometric techniques are used when users type in their passwords during a login process. It is good practice when implementing this technology to set up a system in which deviation from the reference data in one or more of these characteristics requires further authentication or second-level authentication of the user by other authentication technologies.
Face Recognition
Just as with other recognition techniques, face recognition uses certain parameters and characteristics to reveal an individual's identity.Since September 11, 2001, discussion on the subject of using biometrics has increased, specifically about face recognition at airports to identify known terrorists crossing borders. The U.S. Department of Defense is involved in the development of a facial recognition technology program called FERET. More information can be found at the following link:http://www.frvt.org/defaultIris and retina recognition can also be categorized in this segment of biometric technology.
Signature Recognition
Signature identification systems analyze individual signatures based on factors such as speed, acceleration, velocity, pen pressure, and stroke length.Newer biometric measurements include techniques for DNA comparisons, which will be refined in the years to come.