Beruflich Dokumente
Kultur Dokumente
Biometrics is concerned with identifying a person based on his / her physiological or behavioral characteristics. Examples of biometrics systems include fingerprint, hand, face, eye (iris or retina), and speech recognition. y Biometrics (or biometric authentication)[note 1] consists of methods for uniquely recognizing humans based upon one or more intrinsicphysical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to identify individuals[1]. The two categories of biometric identifiers include physiological and behavioral characteristics[2]. Physiological characteristics are related to the shape of the body, and include but are not limited to: fingerprint, face recognition, DNA, palm print, hand geometry, iris recognition (which has largely replacedretina), and odour/scent. Behavioral characteristics are related to the behavior of a person, including but not limited to: typing rhythm,gait, and voice[note 2]. Some researchers have coined the term behaviometrics to describe the latter class of biometrics[3]. More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number [1]. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods, however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information[1][4]. y
technologies for Single Sign On Solutions are fingerprint recognition devices. Also, iris recognition technologies are utilized, but to a lesser degree. Why are biometrics secure? Unique: The various biometrics systems have been developed around unique characteristics of individuals. The probability of 2 people sharing the same biometric data is virtually nil. Cannot be shared: Because a biometric property is an intrinsic property of an individual, it is extremely difficult to duplicate or share (you cannot give a copy of your face or your hand to someone!). Cannot be copied: Biometric characteristics are nearly impossible to forge or spoof, especially with new technologies ensuring that the biometric being identified is from a live person. Cannot be lost: A biometric property of an individual can be lost only in case of serious accident.
Advantages of Biometrics :
* Increase security - Provide a convenient and low-cost additional tier of security. * Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise the opportunity for ID fraud, buddy punching. * Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorised use of lost, stolen or "borrowed" ID cards. * Reduce password administration costs. * Replace hard-to-remember passwords which may be shared or observed. * Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access * Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! * Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance. * Unequivocally link an individual to a transaction or event.