Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Understanding Biometrics

Understanding Biometrics

It’s a familiar scene from many science fiction properties: a person approaches a locked door. They unlock it, but rather than using a key, a red beam scans their eye to confirm their identity and permit them access. The thing is, this and similar biometric authentication technologies are likely to begin appearing in real-world businesses sooner than later. Let’s discuss:

What Are Biometrics?

Biometrics are a form of authentication that, instead of using a password or key code, leverage some physical attribute or qualifier. These could include fingerprints, voice patterns, and even the rhythm that a person uses to type. Not only are they easier for a user to leverage, they can be compounded, enhancing security as well as supporting many other business practices.

Let’s dive further into the kinds of biometrics that can be leveraged by a business (although not all of them are practical to do so as of yet).

Biometric Types

There are two primary types of identifiers that any biometrics rely on, physical identifiers and behavioral identifiers. Physical identifiers, as listed below, are far more commonly seen today:

  • Signatures - Chances are, you’ve seen this variety of biometrics a great number of times in your personal and business life. This signature serves as a confirmation that the person fulfilling an action--be it a transaction or an agreement--is authorized to do so. From retail outlets to financial institutions, this biometric technology is very common in day-to-day life.
  • Fingerprints and Physiological Attributes - This is another common form of authentication, as it is likely you use it to unlock your smartphone. Scanning someone’s fingerprint as a means of confirming their identity has been used for quite some time and has been adopted by many companies and individuals. Physiological recognition is also commonly used, as evidenced by palm scanners, retinal scanning, and facial recognition.
  • Voice - Voice-based authentication is also increasingly common in all walks of life, personal users commanding their virtual assistants and businesses utilizing voice authentication to enable their automated answering systems.
  • DNA - While the technology still has a ways to go, there is some promise of DNA sequencing transitioning from a cinematic feature to a practically-used solution.

There are also behavioral identifiers that newer forms of biometric authentication are able to pick up on. These methods are largely still in development.

  • Typing Patterns - Understandably, just like people write differently, they type differently as well. Therefore, by measuring how quickly a user types, the pressure they apply to the keys, and even the time it takes to move between keys, a user’s identity can be confirmed.
  • Navigation and Engagement - Expanding on the basis of typing pattern analysis, our use of technology is distinctive enough from person to person that other behaviors are indicative of our identity. Therefore, everything from our mouse movements to how we actually hold and use a device can be used as a secondary authentication measure now, and potentially be a standalone security measure someday.

Reliability (and Risks) of Biometrics

As it currently stands, biometric authentication is a problematic technology, simply because the ‘key’--the user--can be inconsistent. Voices can sound different for a variety of reasons, and fashion choices can easily change one’s appearance enough to frustrate a biometric system. Imagine not being able to access the office because you experimented with a new haircut or picked up a fashionable new pair of spectacles! However, this doesn’t mean that there aren’t ways to cheat these systems. Photos can be effective, as can recordings of one’s voice.

This is why most experts suggest that, if biometric authentication is to be used, multiple factors are taken into account.

Security is a Major Concern

Of course, this kind of data will also need to be heavily protected for the sake of the user’s privacy. Furthermore, it isn’t as though these are the kinds of credentials that can be easily changed. For these reasons alone, it will likely be quite a while before biometrics truly become the norm.

One thing is for sure, you need to ensure that your business’ data is secure. FRS Pros has the solutions that can help. Give us a call at 561-795-2000 for more information.

Checking Up on Medical IT in 2019
Tip of the Week: What To Do With a Wet Smartphone
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, May 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Internet Privacy Network Security Business Computing Google Productivity User Tips Cloud Business Management Hackers Innovation Microsoft Tech Term Hardware Software Efficiency Mobile Devices Windows 10 Malware Data Backup Computer Hosted Solutions Browser Smartphones Data Recovery Smartphone Cybersecurity Office 365 IT Services Data Windows Apps Data Security Internet of Things Email Android IT Support Outsourced IT Backup Cybercrime Upgrade Communication Business Continuity Communications Disaster Recovery VoIP Operating System Network Workplace Tips Small Business Alert Users Saving Money Law Enforcement Mobile Device Management Ransomware Vulnerability Server Gadgets Phishing Business Money Artificial Intelligence Managed IT Services Managed IT Services Passwords Miscellaneous Information Virtualization Cloud Computing Spam Social Media Microsoft Office Employer-Employee Relationship Collaboration Applications Wireless Chrome Best Practice Automation IT Support Managed IT Unsupported Software Information Technology Windows 10 Save Money Blockchain Two-factor Authentication Computers App Bring Your Own Device Holiday Facebook Router Networking Health Telephone Systems Word OneNote Google Drive Tech Support Managed Service Provider BDR Data Breach Hacking IT Management Government Cost Management Gmail Travel Augmented Reality Managed Service Excel WannaCry Robot Access Control File Sharing Commerce Application Printing Fraud Mobile Security The Internet of Things Encryption Evernote VPN iPhone Safety Budget Proactive IT Google Assistant Wireless Technology User Error SaaS Data Management Hybrid Cloud Risk Management Cortana Touchscreen Data Storage Quick Tips Productivity WiFi Conferencing Hosted Solution Sports Mobile Device Avoiding Downtime Mobility Business Technology Wi-Fi Search Telephony Patch Management Wireless Charging Audit Update Google Docs Project Management Data Protection Politics Password Devices Meetings Shortcut Bandwidth YouTube Scam Uninterrupted Power Supply PC Outlook Computer Fan Going Green Social Computer Forensics Peripheral Microsoft Excel Upgrades IT budget Touchpad Credit Cards Hard Disk Drive App store Chromebook Co-Managed Services Google Maps Spyware Alexa for Business Payment Cards Education Specifications Marketing Virus BYOD Camera Samsung Microsoft Word Financial Payroll Employees Paperless Office Management Humor DDoS IT Solutions Telephone Legal Files Apple Employee Sales Webinar Proactive Personal Information Projects Antivirus Disaster Tablets Maintenance Security Cameras Recovery Vendor OneDrive Sync PowerPoint Admin Storage Consultant Social Engineering Battery FAQ Reputation Hyperlink Edge Remote Monitoring Break/Fix Retail IT solutions Websites History Identity NFL eWaste Data storage Machine Learning Hacker Administrator Employee-Employer Relationship Voice over Internet Protocol Lithium-ion battery Remote Computing Wireless Internet Saving Time Emergency Streaming Media Identities Medical IT Point of Sale Charger iOS WIndows Server 2008 Value Wasting Time Data Loss Ciminal Access Windows 10s Data Theft HBO Data Privacy Windows 7 Entertainment Device Security Settings Amazon Downtime Screen Mirroring Identity Theft Adobe Computer Care Workers Nanotechnology Gamification Keyboard Shortcuts Chromecast Legislation Language Software as a Service 5G Office Sabotage Transportation Accessory Unified Threat Management Laptop Internet Exlporer Gifts Solid State Drive Computing Private Cloud Hard Drive Display Windows Ink Virtual Assistant E-Commerce Comparison Emails Cast Testing Vendor Management Licensing Updates Root Cause Analysis Memory Human Resources How To Books Hiring/Firing Video Games Experience HaaS Work/Life Balance End of Support Virtual Reality Crowdsourcing Employer Employee Relationship es Relocation Current Events Electronic Medical Records Benefits Phone System Cache Save Time Computer Accessories Training Monitors Smart Technology Flexibility Music PDF Compliance Mobile Computing Printers Television CrashOverride Instant Messaging Company Culture Regulation Thank You Scalability Analytics Text Messaging Keyboard Black Market Cleaning Automobile Congratulations Twitter Big Data Office tips Advertising Managing Stress USB Worker