What is the best biometric technology?
There is no single biometric technology that would be ideal for all applications.
Each technology has its own benefits and weaknesses in terms of accuracy, cost, ease of use, intrusiveness, ease of deployment.
"Biometric" comes from the Greek words "bio" (life) and "metric" (to measure). Biometrics are technologies used for measuring and analyzing a person's unique characteristics. There are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification while physical biometrics can be used for either identification or verification.
Identification is determining who a person is. It involves trying to find a match for a person's biometric data in a database containing records of people characteristics. This method requires time and a large amount of processing power, especially if the database is very large.
Verification is determining if a person is who they pretend they are. It involves comparing a user's biometric data to the previously recorded data for that person to ensure that this is the same person. This method requires less processing power and time, and is used for access control (to buildings or data).
The main physical biometric technologies include:
hand / palm vein
There are also a number of behavioral biometric technologies such as:
voice recognition (analyzing a speaker's vocal behavior)
keystroke and signature (measuring the time spacing of typed words or analyzing the way you sign)
Other biometric techniques, still in exploratory stages would include:
DNA biometrics, ear shape, fingernails and gait recognition (manner of walking)
How biometric systems work.
Biometric devices normally consist of 3 elements:
a device, such as a scanner / reader / camera / mic - that captures the user's biometrics characteristics
a piece of software that converts this data into digital form and compares it with data previously enrolled
a database, which stores the biometric data or an encrypted equivalent of it
The process comprises 4 main steps:
At enrolment, a person's biometrics is captured by the enrolment device. The software converts the biometric input into a template and identifies specific points of data as "match points". The match points are processed using an algorithm into a value that can be compared with biometric data in the database.
Our range of biometric solutions is designed to make collaboration inside and outside of your organization easy and hassle free, without compromising the security of the biometric solutions.
A growing range of biometric solutions are currently available in the marketplace. These include both physiological and behavioral solutions.
Biometric systems involve three primary modes of operation depending on the application: enrollment, verification, and identification modes.
In the enrolment mode, a biometric template is built for the user by capturing sample data and constructing a mathematical representation of corresponding biometric traits.
In the verification mode, the user claims a certain identity (e.g. by supplying a user name or identification).
The verification process consists of validating the person’s identity by comparing the captured biometric data with the biometric template(s) stored in the system database for the claimed identity. It is a 1-to-1 matching process.
Verification is the basis of authentication and access control systems.
In the identification mode, the system is presented with an unattributed sample, e.g., a latent fingerprint collected in a crime scene.
The identification process consists of recognizing the actual individual that produced the sample by searching the templates of all the individuals in the database for a match.
It is a 1-to-n matching process.