SlideShare a Scribd company logo
1 of 8
Biometric
authentication
methods
Souhaila Messeria
Tinlé Van Heddeghem
Jonas Vandijck
What is biometric authentication methods
• Biometric authentication works by comparing two sets of data:
o the first one is preset by the owner of the device, while the second one belongs to a device visitor.
o If the two data are nearly identical, the device knows that “visitor” and “owner” are one and the same, and
gives access to the person.
• Biometric authentication refers to the security procedure that involves the use of unique biological characteristics
of individuals
o such as retinas, irises, voices, facial characteristics, and fingerprints in order to verify people are who they
claim to be.
o This process is used to control access to physical and digital resources, such as buildings, rooms, and different
devices.
• The word biometric is a combination of two words: bio (human) and metric (measurement). In simpler words,
biometrics are any metrics related to human features which make an individual different from other individuals.
• Biometrics originated in the identification systems of criminal activity developed by Alphonse Bertillon (1853–
1914) and by Francis Galton 's theory of fingerprints and physiognomy
Types of Biometric authentication methods
• Chemical biometric devices
o DNA (deoxyribonucleic acid) matching uses genetic material to identify a
person.
• Visual biometric devices
o Retina scans identify subjects by analysing the pattern of blood vessels at
the back of their eyes.
o Iris recognition uses a picture of the iris to identify people.
o Fingerprint scanning identifies people based on their fingerprints.
o Hand geometry recognition verifies identity or authorizes transactions
using a mathematical representation of the unique characteristics of
people's hands.
o Facial recognition relies on the unique characteristics and patterns of
people's faces to confirm their identity.
o Ear authentication verifies identity based on users' unique ear shape.
o Signature recognition uses pattern recognition to identify individuals based
on their handwritten signature.
Types of Biometric
authentication methods
• Vein or vascular scanners
o Finger vein ID identifies individuals based on
the vein patterns in their finger.
• Behavioural identifiers
o Gait analyses the way people walk.
o Typing recognition establishes people's
identity based on their unique typing
characteristics, including how fast they type.
• Auditory biometric devices
o Voice ID identifies individuals by their voice
and relies on characteristics created by the
shape of the mouth and throat.
Biometric authentication
methods applications
• Biometrics was once something confined to the world of
science fiction, but over the past decade, we have seen the
emergence of biometrics in our everyday lives.
Now, it’s a rare day when we don’t interact with some
form of biometric technology. Biometric technology is all
around us.
• For example:
o Airport Security
o Law Enforcement
o Mobile Access and Authentication
o Banking
o Home Assistants
o Building Access
o Schools
o Public Transport
o Blood Banks
Biometric authentication
methods disruptive
• Biometric authentication is one of the most quietly disruptive
technologies we continue to use
• People forget how biometrics has disrupted our lives and it’s
continuing to do so
• Biometrics have disrupted banking, law enforcement, and
cybersecurity, and that disruption has happened over the
course of many years. Basically, as long people find new and
useful applications for it, biometrics will continue to be
disruptive.
• Another potential issue with biometric authentication is that,
once a system has been implemented, an organization may be
tempted to use the system for functions beyond its original
intention
o For example, a company may find the technology useful
for employee monitoring and management, but once a
biometric system has been installed, the organization
may find that it has the ability to track exactly where an
employee has been
Gartner Technology Roadmap
• Disadvantages of Biometric authentication methods:
o Costs :It’s no surprise that a more advanced security system would require significant investments and costs
to implement. Transitioning to a biometrics authentication wouldn’t be the only thing a company would have to pay
for, a need to upgrade current systems in order to support a shift to biometric authentication on their devices
o Data breaches: Businesses and governments that collect and store users personal data are under constant threat
from hackers. Because biometric data is irreplaceable, organizations need to treat sensitive biometric data with
increased security and caution.
o Tracking and data: As the world increases its use of biometric authentication systems like facial recognition
technology and other biometric security measures, privacy of users needs to be taken into consideration. Many
instances, organizations and governments have used facial recognition software to track and identify people with
scary accuracy that significantly inhibits privacy. Deployment risk color: red
• Enterprise value: small
o the risk of biometric is red this is because all privacy of the people who use it is preserved. this wouldn't be safe if it
ever got hacked. we also suspect from the Gartner Technology Roadmap that the value of biometric authentication
methods is not high. This is because nowadays there are other ways to protect the security of your business without
compromising the privacy of the users.
Bibliography
Wikipedia contributors. (2021, 14 december). Biometrics. Wikipedia. Geraadpleegd op 15 december 2021, van
https://en.wikipedia.org/wiki/Biometrics
Contributor, T. (2021, 19 april). What is biometric authentication? SearchSecurity. Geraadpleegd op 15 december 2021,
van https://www.techtarget.com/searchsecurity/definition/biometric-authentication
V. (2017, 9 november). Biometrics are the Ultimate Disruption. Veridium. Geraadpleegd op 17 december 2021, van
https://www.veridiumid.com/biometrics-ultimate-distruption/
G. (2021, 11 oktober). The Top 9 Common Uses of Biometrics in Everyday Life. NEC. Geraadpleegd op 15 december
2021, van https://www.nec.co.nz/market-leadership/publications-media/the-top-9-common-uses-of-biometrics-in-
everyday-life/
Mitek. (2021, 15 maart). Advantages and disadvantages of biometrics |. Geraadpleegd op 15 december 2021, van
https://www.miteksystems.com/blog/advantages-and-disadvantages-of-biometrics

More Related Content

What's hot

Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technologyMaidaShahbaz3
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materialsyasmeenreem
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionIOSR Journals
 
Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in IndiaKshitij Behl
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law EnforcementHow Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law Enforcementmehedi76
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety
 
Biometric Authentication in Banking
Biometric Authentication in BankingBiometric Authentication in Banking
Biometric Authentication in BankingMuthu Ramanathan
 

What's hot (19)

Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materials
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Pdf1
Pdf1Pdf1
Pdf1
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human Recognition
 
Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in India
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
Shamaas
ShamaasShamaas
Shamaas
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law EnforcementHow Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
Biometric Authentication in Banking
Biometric Authentication in BankingBiometric Authentication in Banking
Biometric Authentication in Banking
 

Similar to Ai

Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technologypalsantosh
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBirkumarJana
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 

Similar to Ai (20)

Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometric
 Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 

Recently uploaded (20)

Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 

Ai

  • 2. What is biometric authentication methods • Biometric authentication works by comparing two sets of data: o the first one is preset by the owner of the device, while the second one belongs to a device visitor. o If the two data are nearly identical, the device knows that “visitor” and “owner” are one and the same, and gives access to the person. • Biometric authentication refers to the security procedure that involves the use of unique biological characteristics of individuals o such as retinas, irises, voices, facial characteristics, and fingerprints in order to verify people are who they claim to be. o This process is used to control access to physical and digital resources, such as buildings, rooms, and different devices. • The word biometric is a combination of two words: bio (human) and metric (measurement). In simpler words, biometrics are any metrics related to human features which make an individual different from other individuals. • Biometrics originated in the identification systems of criminal activity developed by Alphonse Bertillon (1853– 1914) and by Francis Galton 's theory of fingerprints and physiognomy
  • 3. Types of Biometric authentication methods • Chemical biometric devices o DNA (deoxyribonucleic acid) matching uses genetic material to identify a person. • Visual biometric devices o Retina scans identify subjects by analysing the pattern of blood vessels at the back of their eyes. o Iris recognition uses a picture of the iris to identify people. o Fingerprint scanning identifies people based on their fingerprints. o Hand geometry recognition verifies identity or authorizes transactions using a mathematical representation of the unique characteristics of people's hands. o Facial recognition relies on the unique characteristics and patterns of people's faces to confirm their identity. o Ear authentication verifies identity based on users' unique ear shape. o Signature recognition uses pattern recognition to identify individuals based on their handwritten signature.
  • 4. Types of Biometric authentication methods • Vein or vascular scanners o Finger vein ID identifies individuals based on the vein patterns in their finger. • Behavioural identifiers o Gait analyses the way people walk. o Typing recognition establishes people's identity based on their unique typing characteristics, including how fast they type. • Auditory biometric devices o Voice ID identifies individuals by their voice and relies on characteristics created by the shape of the mouth and throat.
  • 5. Biometric authentication methods applications • Biometrics was once something confined to the world of science fiction, but over the past decade, we have seen the emergence of biometrics in our everyday lives. Now, it’s a rare day when we don’t interact with some form of biometric technology. Biometric technology is all around us. • For example: o Airport Security o Law Enforcement o Mobile Access and Authentication o Banking o Home Assistants o Building Access o Schools o Public Transport o Blood Banks
  • 6. Biometric authentication methods disruptive • Biometric authentication is one of the most quietly disruptive technologies we continue to use • People forget how biometrics has disrupted our lives and it’s continuing to do so • Biometrics have disrupted banking, law enforcement, and cybersecurity, and that disruption has happened over the course of many years. Basically, as long people find new and useful applications for it, biometrics will continue to be disruptive. • Another potential issue with biometric authentication is that, once a system has been implemented, an organization may be tempted to use the system for functions beyond its original intention o For example, a company may find the technology useful for employee monitoring and management, but once a biometric system has been installed, the organization may find that it has the ability to track exactly where an employee has been
  • 7. Gartner Technology Roadmap • Disadvantages of Biometric authentication methods: o Costs :It’s no surprise that a more advanced security system would require significant investments and costs to implement. Transitioning to a biometrics authentication wouldn’t be the only thing a company would have to pay for, a need to upgrade current systems in order to support a shift to biometric authentication on their devices o Data breaches: Businesses and governments that collect and store users personal data are under constant threat from hackers. Because biometric data is irreplaceable, organizations need to treat sensitive biometric data with increased security and caution. o Tracking and data: As the world increases its use of biometric authentication systems like facial recognition technology and other biometric security measures, privacy of users needs to be taken into consideration. Many instances, organizations and governments have used facial recognition software to track and identify people with scary accuracy that significantly inhibits privacy. Deployment risk color: red • Enterprise value: small o the risk of biometric is red this is because all privacy of the people who use it is preserved. this wouldn't be safe if it ever got hacked. we also suspect from the Gartner Technology Roadmap that the value of biometric authentication methods is not high. This is because nowadays there are other ways to protect the security of your business without compromising the privacy of the users.
  • 8. Bibliography Wikipedia contributors. (2021, 14 december). Biometrics. Wikipedia. Geraadpleegd op 15 december 2021, van https://en.wikipedia.org/wiki/Biometrics Contributor, T. (2021, 19 april). What is biometric authentication? SearchSecurity. Geraadpleegd op 15 december 2021, van https://www.techtarget.com/searchsecurity/definition/biometric-authentication V. (2017, 9 november). Biometrics are the Ultimate Disruption. Veridium. Geraadpleegd op 17 december 2021, van https://www.veridiumid.com/biometrics-ultimate-distruption/ G. (2021, 11 oktober). The Top 9 Common Uses of Biometrics in Everyday Life. NEC. Geraadpleegd op 15 december 2021, van https://www.nec.co.nz/market-leadership/publications-media/the-top-9-common-uses-of-biometrics-in- everyday-life/ Mitek. (2021, 15 maart). Advantages and disadvantages of biometrics |. Geraadpleegd op 15 december 2021, van https://www.miteksystems.com/blog/advantages-and-disadvantages-of-biometrics