Biometric authentication uses unique physical or behavioral traits to confirm identity and determine access. Physiological biometrics use physical traits like fingerprints, while behavioral biometrics use behavior like voice or gait. Data collected varies based on intended use, and can include tracking patterns and access times.
Biometric authentication is the process of using a unique physical or behavioral trait as a method of confirming identity and determining a person’s login profile. This type of identification has greatly increased in popularity with the advent of faster computer processors and greater accuracy in data collection devices. Common examples include fingerprint scanning and voice activated locks.
There are two types of authentication using biometrics: physiological and behavioral. Physiological biometrics are based on a unique physical trait, such as a fingerprint, palm print, DNA or facial recognition. In this type of system, a trait scan is performed on a secure site and linked to the person’s profile. Security rights are assigned to this profile, based on the person’s job or security access level. This information is stored in a secure system connected directly to individual locks or security stations.
In order to access a specific space or resource, the person must present the correct physical trait to the scanner. The system then compares the sample to the database. Only when a match is achieved can the person gain the requested access. The strength in this type of biometric authentication is the very unique trait that must be used to gain access. It is very difficult to fake a fingerprint or face to bypass security.
Behavior authentication is based on the person’s actual behavior. Common examples of this type of authentication include voice, gait, and the rhythm or diction of speech. While it’s easy enough to mimic the sound of another person’s voice, the actual pitch or note of their speech is much harder to duplicate. This type of security is often used to access computer files or other managed security systems.
The type of data collected and stored depends on the application and intended use. For example, a company may install fingerprint scanners in every building and staff have to scan their fingers to access the facility. This is a very simple use of the technology and the cost of individual scanners is steadily decreasing over time.
Using the same system, the employer may decide to track additional information from this activity. For example, the software can be expanded to record the date and time the person scanned their fingerprint. It can also be programmed to look for patterns, such as the same people scanning in and out of buildings on a recurring basis. You can also keep track of the time spent in each building, as well as other buildings accessed in the same time period.
Protect your devices with Threat Protection by NordVPN