Biometric authentication methods (BAM) use unique biological characteristics like fingerprints, irises, and facial features to verify someone's identity. Common biometric traits used include fingerprints, irises, faces, DNA, and voices. BAM is used for high security areas like airports, government buildings, and apps like banking. It works by comparing a stored biometric template to a new scan and authenticating if they match. While convenient, BAM raises privacy concerns if data is exposed, and identities cannot be changed if compromised. Overall, BAM replaces passwords and pins but does not significantly change markets or jobs.
2. What is BAM?
• Biometric authentication refers to the security procedure that
involves the use of unique biological characteristics of
individuals such as retinas, irises, voices, facial characteristics,
and fingerprints in order to verify people who they claim to be.
• Authentication =/ identification!
• Auth: Is it true you’re saying who you are?
• Id: who are you?
3. What is used for BAM?
• DNA matching
• Ear shape
• Iris or retina recognition (eye)
• Face
• Fingerprint
• Gait
• Odour
• Hand Geometry
• Vein
• Voice
4. Where is it
used?
• Mostly for security so:
• Airports
• Military buildings
• Scientific buildings
• Politicial buildings (White
House)
• Apps (like your own bank
account)
• = places with high
security/importance
5. But also businesses!
• Disney has implemented fingerprint biometrics as part of its access system since 2013!
• Barclays was one of the first to develop one-touch fingerprint banking access and have
since expanded their biometric approach to include voice-enabled biometrics.
• American Airlines is one of the major airline companies successfully using biometric
technology in the U.S. by creating a biometric facial recognition program that plans to
streamline a client’s journey through the boarding process.
6. How does it work?
• Biometric authentication works by comparing two sets of data: the first one is preset by
the owner of the device, while the second one belongs to a device visitor. If the two data
are nearly identical, the device knows that “visitor” and “owner” are one and the same,
and gives access to the person.
7. Worth it?
• Yes and no
• Yes: - easy to use
- Hard to ‘hack’
- Hard to steal/replicate
• No: - Vulnerable if exposed
- Very privacy-sensitive
- Can not be changed, ever (so if it is hacked, you can’t do nothing much about it!)
8. Will this change the world?
• No
• It replaces older uses like the password or PIN.
• => No significant changes on the market or job availability.
• Will change the concept of ‘privacy’ however!
• So legal, acces and privacy jurisdiction will change with BAM.
9. Gartner scale
• Red and small
• Red = dangerous because of privacy and possible misuse of this concept
• Small = won’t change how a company earns money or make products.
• Something to watch but not of high urgency.
10. Sources
• Types of biometrics. (2021, 29 november). Biometrics Institute. Geraadpleegd op 17 december 2021, van
https://www.biometricsinstitute.org/what-is-biometrics/types-of-biometrics/
• Din, A. (2021, 13 oktober). What Is Biometric Authentication? A Complete Overview. Heimdal Security Blog.
Geraadpleegd op 17 december 2021, van https://heimdalsecurity.com/blog/biometric-authentication
• Vulnerability & Testing. (2018, 14 december). Biometrics Institute. Geraadpleegd op 17 december 2021, van
https://www.biometricsinstitute.org/what-is-biometrics/vulnerability-testing/