SlideShare a Scribd company logo
1 of 14
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
Computer Security Trends
Enforcing Digital Security via User Authentication
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
In our day-to-day technical
support for Calgary companies,
one of the most common I.T.
requests is the password reset.
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
The simple text password is one of the
most basic forms of authentication.
There are, however, many other ways
to authenticate access to a resource.
In this article we discuss computer
security trends.
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
Authentication is used to
• verify the user’s identity
• to control access to the resources
• to prevent unauthorized users from
accessing the system, and
• to store system logs about users’
activities.
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
There are two basic modes of
authentication:
• Verification (a 1-to-1 comparison)
• Identification (a 1-to-many comparison)
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
There are 3 basic authentication methods:
• Something we know
(password, key sequence etc.)
• Something we have
(token, smartcard etc.)
• Something we are
(biometrics – fingerprints, eye scan etc.)
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
However, passwords can be
stolen or tokens can be lost.
Therefore, enter biometrics.
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
Biometric authentication is a
process of analysis of someone’s
physical characteristics, or
behavioral aspects, in order to
prove the person’s identity.
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
The phrase biometrics comes from
the Greek language: bio (= life) and
metric (= to measure).
A well-known concept for biometrics
is the use of fingerprints for personal
identification, at a police station for
example.
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
A good biometric method should
possess the following 3 properties:
• Broadness: almost all people should
have the characteristic.
• Stability: the characteristic should
not change or mutate.
• Exclusiveness: the characteristic of
each person should be unique.
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
The biometric authentication can be
completed in 2 ways:
• Physical characteristics recognition –
based on some physical feature for
identification and authentication, like
fingerprints.
• Behavioral characteristic recognition –
based on some dynamic characteristics,
such as keyboard typing, writing, or a
hand signature.
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
Common biometric technologies are:
• Face biometrics
• Fingerprint biometrics
• Eye biometrics
• Hand geometry biometrics
• Signature biometrics
• Voice biometrics
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
Less commonly used biometric technologies:
• Keystroke dynamics
• Vein recognition
• Body odor measurement
• Palm-print
• Gait recognition
• Ear shape
• DNA recognition
Matterhorn Business Solutions
Tel. 587-350-1082
Email: david@matterhornsolutions.ca
http://matterhornsolutions.ca/calgary-tech-support/
These are just some of the
biotechnologies that we can expect
to commonly see in the future.

More Related Content

Similar to Calgary Tech Support on Computer Security Trends

How We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card BreachHow We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card BreachTeradata
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric SolutionTanvir Ahmed
 
Importance of Biometrics data security.pdf
Importance of Biometrics data security.pdfImportance of Biometrics data security.pdf
Importance of Biometrics data security.pdfSarahLee434084
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdftonkung6
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd Iaetsd
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiCRAW CYBER SECURITY PVT LTD
 
Huntsville All Clearances or Cyber Virtual Job Fair Handbook June 3
Huntsville All Clearances or Cyber Virtual Job Fair Handbook June 3Huntsville All Clearances or Cyber Virtual Job Fair Handbook June 3
Huntsville All Clearances or Cyber Virtual Job Fair Handbook June 3ClearedJobs.Net
 
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDCyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDClearedJobs.Net
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonVlad Catrinescu
 
Calgary Computer Virus Removal
Calgary Computer Virus RemovalCalgary Computer Virus Removal
Calgary Computer Virus RemovalMatthew Horner
 
KeyAI. Solving a math problem to recover lost crypto assets.
KeyAI. Solving a math problem to recover lost crypto assets.KeyAI. Solving a math problem to recover lost crypto assets.
KeyAI. Solving a math problem to recover lost crypto assets.RFID INC
 

Similar to Calgary Tech Support on Computer Security Trends (20)

How We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card BreachHow We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card Breach
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
 
Importance of Biometrics data security.pdf
Importance of Biometrics data security.pdfImportance of Biometrics data security.pdf
Importance of Biometrics data security.pdf
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in Delhi
 
Huntsville All Clearances or Cyber Virtual Job Fair Handbook June 3
Huntsville All Clearances or Cyber Virtual Job Fair Handbook June 3Huntsville All Clearances or Cyber Virtual Job Fair Handbook June 3
Huntsville All Clearances or Cyber Virtual Job Fair Handbook June 3
 
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDCyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Calgary Computer Virus Removal
Calgary Computer Virus RemovalCalgary Computer Virus Removal
Calgary Computer Virus Removal
 
KeyAI. Solving a math problem to recover lost crypto assets.
KeyAI. Solving a math problem to recover lost crypto assets.KeyAI. Solving a math problem to recover lost crypto assets.
KeyAI. Solving a math problem to recover lost crypto assets.
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Calgary Tech Support on Computer Security Trends

  • 1. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ Computer Security Trends Enforcing Digital Security via User Authentication
  • 2. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ In our day-to-day technical support for Calgary companies, one of the most common I.T. requests is the password reset.
  • 3. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ The simple text password is one of the most basic forms of authentication. There are, however, many other ways to authenticate access to a resource. In this article we discuss computer security trends.
  • 4. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ Authentication is used to • verify the user’s identity • to control access to the resources • to prevent unauthorized users from accessing the system, and • to store system logs about users’ activities.
  • 5. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ There are two basic modes of authentication: • Verification (a 1-to-1 comparison) • Identification (a 1-to-many comparison)
  • 6. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ There are 3 basic authentication methods: • Something we know (password, key sequence etc.) • Something we have (token, smartcard etc.) • Something we are (biometrics – fingerprints, eye scan etc.)
  • 7. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ However, passwords can be stolen or tokens can be lost. Therefore, enter biometrics.
  • 8. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ Biometric authentication is a process of analysis of someone’s physical characteristics, or behavioral aspects, in order to prove the person’s identity.
  • 9. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ The phrase biometrics comes from the Greek language: bio (= life) and metric (= to measure). A well-known concept for biometrics is the use of fingerprints for personal identification, at a police station for example.
  • 10. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ A good biometric method should possess the following 3 properties: • Broadness: almost all people should have the characteristic. • Stability: the characteristic should not change or mutate. • Exclusiveness: the characteristic of each person should be unique.
  • 11. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ The biometric authentication can be completed in 2 ways: • Physical characteristics recognition – based on some physical feature for identification and authentication, like fingerprints. • Behavioral characteristic recognition – based on some dynamic characteristics, such as keyboard typing, writing, or a hand signature.
  • 12. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ Common biometric technologies are: • Face biometrics • Fingerprint biometrics • Eye biometrics • Hand geometry biometrics • Signature biometrics • Voice biometrics
  • 13. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ Less commonly used biometric technologies: • Keystroke dynamics • Vein recognition • Body odor measurement • Palm-print • Gait recognition • Ear shape • DNA recognition
  • 14. Matterhorn Business Solutions Tel. 587-350-1082 Email: david@matterhornsolutions.ca http://matterhornsolutions.ca/calgary-tech-support/ These are just some of the biotechnologies that we can expect to commonly see in the future.