2. What is biometric authentication methods
• Biometric authentication works by comparing two sets of data:
o the first one is preset by the owner of the device, while the second one belongs to a device visitor.
o If the two data are nearly identical, the device knows that “visitor” and “owner” are one and the same, and
gives access to the person.
• Biometric authentication refers to the security procedure that involves the use of unique biological characteristics
of individuals
o such as retinas, irises, voices, facial characteristics, and fingerprints in order to verify people are who they
claim to be.
o This process is used to control access to physical and digital resources, such as buildings, rooms, and different
devices.
• The word biometric is a combination of two words: bio (human) and metric (measurement). In simpler words,
biometrics are any metrics related to human features which make an individual different from other individuals.
• Biometrics originated in the identification systems of criminal activity developed by Alphonse Bertillon (1853–
1914) and by Francis Galton 's theory of fingerprints and physiognomy
3. Types of Biometric authentication methods
• Chemical biometric devices
o DNA (deoxyribonucleic acid) matching uses genetic material to identify a
person.
• Visual biometric devices
o Retina scans identify subjects by analysing the pattern of blood vessels at
the back of their eyes.
o Iris recognition uses a picture of the iris to identify people.
o Fingerprint scanning identifies people based on their fingerprints.
o Hand geometry recognition verifies identity or authorizes transactions
using a mathematical representation of the unique characteristics of
people's hands.
o Facial recognition relies on the unique characteristics and patterns of
people's faces to confirm their identity.
o Ear authentication verifies identity based on users' unique ear shape.
o Signature recognition uses pattern recognition to identify individuals based
on their handwritten signature.
4. Types of Biometric
authentication methods
• Vein or vascular scanners
o Finger vein ID identifies individuals based on
the vein patterns in their finger.
• Behavioural identifiers
o Gait analyses the way people walk.
o Typing recognition establishes people's
identity based on their unique typing
characteristics, including how fast they type.
• Auditory biometric devices
o Voice ID identifies individuals by their voice
and relies on characteristics created by the
shape of the mouth and throat.
5. Biometric authentication
methods applications
• Biometrics was once something confined to the world of
science fiction, but over the past decade, we have seen the
emergence of biometrics in our everyday lives.
Now, it’s a rare day when we don’t interact with some
form of biometric technology. Biometric technology is all
around us.
• For example:
o Airport Security
o Law Enforcement
o Mobile Access and Authentication
o Banking
o Home Assistants
o Building Access
o Schools
o Public Transport
o Blood Banks
6. Biometric authentication
methods disruptive
• Biometric authentication is one of the most quietly disruptive
technologies we continue to use
• People forget how biometrics has disrupted our lives and it’s
continuing to do so
• Biometrics have disrupted banking, law enforcement, and
cybersecurity, and that disruption has happened over the
course of many years. Basically, as long people find new and
useful applications for it, biometrics will continue to be
disruptive.
• Another potential issue with biometric authentication is that,
once a system has been implemented, an organization may be
tempted to use the system for functions beyond its original
intention
o For example, a company may find the technology useful
for employee monitoring and management, but once a
biometric system has been installed, the organization
may find that it has the ability to track exactly where an
employee has been
7. Gartner Technology Roadmap
• Disadvantages of Biometric authentication methods:
o Costs :It’s no surprise that a more advanced security system would require significant investments and costs
to implement. Transitioning to a biometrics authentication wouldn’t be the only thing a company would have to pay
for, a need to upgrade current systems in order to support a shift to biometric authentication on their devices
o Data breaches: Businesses and governments that collect and store users personal data are under constant threat
from hackers. Because biometric data is irreplaceable, organizations need to treat sensitive biometric data with
increased security and caution.
o Tracking and data: As the world increases its use of biometric authentication systems like facial recognition
technology and other biometric security measures, privacy of users needs to be taken into consideration. Many
instances, organizations and governments have used facial recognition software to track and identify people with
scary accuracy that significantly inhibits privacy. Deployment risk color: red
• Enterprise value: small
o the risk of biometric is red this is because all privacy of the people who use it is preserved. this wouldn't be safe if it
ever got hacked. we also suspect from the Gartner Technology Roadmap that the value of biometric authentication
methods is not high. This is because nowadays there are other ways to protect the security of your business without
compromising the privacy of the users.
8. Bibliography
Wikipedia contributors. (2021, 14 december). Biometrics. Wikipedia. Geraadpleegd op 15 december 2021, van
https://en.wikipedia.org/wiki/Biometrics
Contributor, T. (2021, 19 april). What is biometric authentication? SearchSecurity. Geraadpleegd op 15 december 2021,
van https://www.techtarget.com/searchsecurity/definition/biometric-authentication
V. (2017, 9 november). Biometrics are the Ultimate Disruption. Veridium. Geraadpleegd op 17 december 2021, van
https://www.veridiumid.com/biometrics-ultimate-distruption/
G. (2021, 11 oktober). The Top 9 Common Uses of Biometrics in Everyday Life. NEC. Geraadpleegd op 15 december
2021, van https://www.nec.co.nz/market-leadership/publications-media/the-top-9-common-uses-of-biometrics-in-
everyday-life/
Mitek. (2021, 15 maart). Advantages and disadvantages of biometrics |. Geraadpleegd op 15 december 2021, van
https://www.miteksystems.com/blog/advantages-and-disadvantages-of-biometrics