Iris scanners can now identify us from 40 feet away

Biometric technologies are on the rise. By electronically recording data about individual's physical attributes such as fingerprints or iris patterns, security and law enforcement services can quickly identify people with ...

As hacking grows, biometric security gains momentum

With hackers seemingly running rampant online and millions of users compromised, efforts for stronger online identity protection—mainly using biometrics—are gaining momentum.

The future of biometric technology

Biometric security such as fingerprint, face and voice recognition is set to hit the mainstream as global technology companies market the systems as convenient and easy to use, according to a prominent information security ...

Forget your password: The future is 'passthoughts'

(Phys.org) —Instead of typing your password, in the future you may only have to think your password, according to School of Information researchers. A new study explores the feasibility of brainwave-based computer authentication ...

IDair has a fingerprint scanner from standoff distance

Researchers are exploring better designs in biometrics to meet business and government demands for reliable identification and verification tools. Out of the many biometric technologies that continue to be works in progress, ...

iPhone 5S fingerprint scanning: Thumbs up or down?

Technology to acquire and use biometric data such as fingerprints has been around for several decades and has made its way from forensic investigation to laptop computers – and now, with this week's introduction of iPhone ...

Finger vein authentication using smartphone camera

Hitachi today announced the development of highly-accurate finger vein authentication technology using the camera commonly integrated in the standard smartphone. This technology will enable the use of biometric authentication ...

page 1 from 10

Biometrics

Biometrics (or biometric authentication) consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

Biometric identifiers are the distinctive, measurable characteristics used to identify individuals. The two categories of biometric identifiers include physiological and biological characteristics. Physiological characteristics are related to the shape of the body, and include but are not limited to: fingerprint, face recognition, DNA, palm print, hand geometry, iris recognition (which has largely replaced retina), and odour/scent. Behavioral characteristics are related to the behavior of a person, including but not limited to: typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.

More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number . Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods, however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information.

This text uses material from Wikipedia, licensed under CC BY-SA