SlideShare a Scribd company logo
1 of 10
Biometric authentication
methods
What is BAM?
• Biometric authentication refers to the security procedure that
involves the use of unique biological characteristics of
individuals such as retinas, irises, voices, facial characteristics,
and fingerprints in order to verify people who they claim to be.
• Authentication =/ identification!
• Auth: Is it true you’re saying who you are?
• Id: who are you?
What is used for BAM?
• DNA matching
• Ear shape
• Iris or retina recognition (eye)
• Face
• Fingerprint
• Gait
• Odour
• Hand Geometry
• Vein
• Voice
Where is it
used?
• Mostly for security so:
• Airports
• Military buildings
• Scientific buildings
• Politicial buildings (White
House)
• Apps (like your own bank
account)
• = places with high
security/importance
But also businesses!
• Disney has implemented fingerprint biometrics as part of its access system since 2013!
• Barclays was one of the first to develop one-touch fingerprint banking access and have
since expanded their biometric approach to include voice-enabled biometrics.
• American Airlines is one of the major airline companies successfully using biometric
technology in the U.S. by creating a biometric facial recognition program that plans to
streamline a client’s journey through the boarding process.
How does it work?
• Biometric authentication works by comparing two sets of data: the first one is preset by
the owner of the device, while the second one belongs to a device visitor. If the two data
are nearly identical, the device knows that “visitor” and “owner” are one and the same,
and gives access to the person.
Worth it?
• Yes and no
• Yes: - easy to use
- Hard to ‘hack’
- Hard to steal/replicate
• No: - Vulnerable if exposed
- Very privacy-sensitive
- Can not be changed, ever (so if it is hacked, you can’t do nothing much about it!)
Will this change the world?
• No
• It replaces older uses like the password or PIN.
• => No significant changes on the market or job availability.
• Will change the concept of ‘privacy’ however!
• So legal, acces and privacy jurisdiction will change with BAM.
Gartner scale
• Red and small
• Red = dangerous because of privacy and possible misuse of this concept
• Small = won’t change how a company earns money or make products.
• Something to watch but not of high urgency.
Sources
• Types of biometrics. (2021, 29 november). Biometrics Institute. Geraadpleegd op 17 december 2021, van
https://www.biometricsinstitute.org/what-is-biometrics/types-of-biometrics/
• Din, A. (2021, 13 oktober). What Is Biometric Authentication? A Complete Overview. Heimdal Security Blog.
Geraadpleegd op 17 december 2021, van https://heimdalsecurity.com/blog/biometric-authentication
• Vulnerability & Testing. (2018, 14 december). Biometrics Institute. Geraadpleegd op 17 december 2021, van
https://www.biometricsinstitute.org/what-is-biometrics/vulnerability-testing/

More Related Content

What's hot

Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 

What's hot (6)

An open & sustainable internet of things
An open & sustainable internet of thingsAn open & sustainable internet of things
An open & sustainable internet of things
 
Lawyers in the Cloud
Lawyers in the CloudLawyers in the Cloud
Lawyers in the Cloud
 
Smartphone Wireless Patents: New Business Opportunity & Risk
Smartphone Wireless Patents: New Business Opportunity & RiskSmartphone Wireless Patents: New Business Opportunity & Risk
Smartphone Wireless Patents: New Business Opportunity & Risk
 
Presentation on IP Management and Start Ups by Prof. A. B. Suraj
Presentation on IP Management and Start Ups by Prof. A. B. SurajPresentation on IP Management and Start Ups by Prof. A. B. Suraj
Presentation on IP Management and Start Ups by Prof. A. B. Suraj
 
The Time of Makers. How to Get out of Digital World and Create Physical Produ...
The Time of Makers. How to Get out of Digital World and Create Physical Produ...The Time of Makers. How to Get out of Digital World and Create Physical Produ...
The Time of Makers. How to Get out of Digital World and Create Physical Produ...
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 

Similar to Biometric authentication methods

Token or no token-2,000 word arti cle
Token or no token-2,000 word arti cleToken or no token-2,000 word arti cle
Token or no token-2,000 word arti cle
Hector Hoyos
 
02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of Biometrics02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of Biometrics
Hector Hoyos
 

Similar to Biometric authentication methods (20)

Ai
AiAi
Ai
 
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...
 
Innovative Technologies and Tech Trends
Innovative Technologies and Tech TrendsInnovative Technologies and Tech Trends
Innovative Technologies and Tech Trends
 
Biometrics
BiometricsBiometrics
Biometrics
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Token or no token-2,000 word arti cle
Token or no token-2,000 word arti cleToken or no token-2,000 word arti cle
Token or no token-2,000 word arti cle
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of Biometrics02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of Biometrics
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Digitalization: A Challenge and An Opportunity for Banks
Digitalization: A Challenge and An Opportunity for BanksDigitalization: A Challenge and An Opportunity for Banks
Digitalization: A Challenge and An Opportunity for Banks
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Recently uploaded (20)

Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 

Biometric authentication methods

  • 2. What is BAM? • Biometric authentication refers to the security procedure that involves the use of unique biological characteristics of individuals such as retinas, irises, voices, facial characteristics, and fingerprints in order to verify people who they claim to be. • Authentication =/ identification! • Auth: Is it true you’re saying who you are? • Id: who are you?
  • 3. What is used for BAM? • DNA matching • Ear shape • Iris or retina recognition (eye) • Face • Fingerprint • Gait • Odour • Hand Geometry • Vein • Voice
  • 4. Where is it used? • Mostly for security so: • Airports • Military buildings • Scientific buildings • Politicial buildings (White House) • Apps (like your own bank account) • = places with high security/importance
  • 5. But also businesses! • Disney has implemented fingerprint biometrics as part of its access system since 2013! • Barclays was one of the first to develop one-touch fingerprint banking access and have since expanded their biometric approach to include voice-enabled biometrics. • American Airlines is one of the major airline companies successfully using biometric technology in the U.S. by creating a biometric facial recognition program that plans to streamline a client’s journey through the boarding process.
  • 6. How does it work? • Biometric authentication works by comparing two sets of data: the first one is preset by the owner of the device, while the second one belongs to a device visitor. If the two data are nearly identical, the device knows that “visitor” and “owner” are one and the same, and gives access to the person.
  • 7. Worth it? • Yes and no • Yes: - easy to use - Hard to ‘hack’ - Hard to steal/replicate • No: - Vulnerable if exposed - Very privacy-sensitive - Can not be changed, ever (so if it is hacked, you can’t do nothing much about it!)
  • 8. Will this change the world? • No • It replaces older uses like the password or PIN. • => No significant changes on the market or job availability. • Will change the concept of ‘privacy’ however! • So legal, acces and privacy jurisdiction will change with BAM.
  • 9. Gartner scale • Red and small • Red = dangerous because of privacy and possible misuse of this concept • Small = won’t change how a company earns money or make products. • Something to watch but not of high urgency.
  • 10. Sources • Types of biometrics. (2021, 29 november). Biometrics Institute. Geraadpleegd op 17 december 2021, van https://www.biometricsinstitute.org/what-is-biometrics/types-of-biometrics/ • Din, A. (2021, 13 oktober). What Is Biometric Authentication? A Complete Overview. Heimdal Security Blog. Geraadpleegd op 17 december 2021, van https://heimdalsecurity.com/blog/biometric-authentication • Vulnerability & Testing. (2018, 14 december). Biometrics Institute. Geraadpleegd op 17 december 2021, van https://www.biometricsinstitute.org/what-is-biometrics/vulnerability-testing/