Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Understanding Biometrics

Understanding Biometrics

It’s a familiar scene from many science fiction properties: a person approaches a locked door. They unlock it, but rather than using a key, a red beam scans their eye to confirm their identity and permit them access. The thing is, this and similar biometric authentication technologies are likely to begin appearing in real-world businesses sooner than later. Let’s discuss:

What Are Biometrics?

Biometrics are a form of authentication that, instead of using a password or key code, leverage some physical attribute or qualifier. These could include fingerprints, voice patterns, and even the rhythm that a person uses to type. Not only are they easier for a user to leverage, they can be compounded, enhancing security as well as supporting many other business practices.

Let’s dive further into the kinds of biometrics that can be leveraged by a business (although not all of them are practical to do so as of yet).

Biometric Types

There are two primary types of identifiers that any biometrics rely on, physical identifiers and behavioral identifiers. Physical identifiers, as listed below, are far more commonly seen today:

  • Signatures - Chances are, you’ve seen this variety of biometrics a great number of times in your personal and business life. This signature serves as a confirmation that the person fulfilling an action--be it a transaction or an agreement--is authorized to do so. From retail outlets to financial institutions, this biometric technology is very common in day-to-day life.
  • Fingerprints and Physiological Attributes - This is another common form of authentication, as it is likely you use it to unlock your smartphone. Scanning someone’s fingerprint as a means of confirming their identity has been used for quite some time and has been adopted by many companies and individuals. Physiological recognition is also commonly used, as evidenced by palm scanners, retinal scanning, and facial recognition.
  • Voice - Voice-based authentication is also increasingly common in all walks of life, personal users commanding their virtual assistants and businesses utilizing voice authentication to enable their automated answering systems.
  • DNA - While the technology still has a ways to go, there is some promise of DNA sequencing transitioning from a cinematic feature to a practically-used solution.

There are also behavioral identifiers that newer forms of biometric authentication are able to pick up on. These methods are largely still in development.

  • Typing Patterns - Understandably, just like people write differently, they type differently as well. Therefore, by measuring how quickly a user types, the pressure they apply to the keys, and even the time it takes to move between keys, a user’s identity can be confirmed.
  • Navigation and Engagement - Expanding on the basis of typing pattern analysis, our use of technology is distinctive enough from person to person that other behaviors are indicative of our identity. Therefore, everything from our mouse movements to how we actually hold and use a device can be used as a secondary authentication measure now, and potentially be a standalone security measure someday.

Reliability (and Risks) of Biometrics

As it currently stands, biometric authentication is a problematic technology, simply because the ‘key’--the user--can be inconsistent. Voices can sound different for a variety of reasons, and fashion choices can easily change one’s appearance enough to frustrate a biometric system. Imagine not being able to access the office because you experimented with a new haircut or picked up a fashionable new pair of spectacles! However, this doesn’t mean that there aren’t ways to cheat these systems. Photos can be effective, as can recordings of one’s voice.

This is why most experts suggest that, if biometric authentication is to be used, multiple factors are taken into account.

Security is a Major Concern

Of course, this kind of data will also need to be heavily protected for the sake of the user’s privacy. Furthermore, it isn’t as though these are the kinds of credentials that can be easily changed. For these reasons alone, it will likely be quite a while before biometrics truly become the norm.

One thing is for sure, you need to ensure that your business’ data is secure. FRS Pros has the solutions that can help. Give us a call at 561-795-2000 for more information.

Checking Up on Medical IT in 2019
Tip of the Week: What To Do With a Wet Smartphone
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, March 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Google Business Computing Cloud User Tips Business Management Tech Term Productivity Hackers Software Hardware Microsoft Browser Data Backup Computer Hosted Solutions Malware Mobile Devices Smartphone Cybersecurity Windows 10 Efficiency Innovation IT Services Windows Data Security Outsourced IT Smartphones Internet of Things Office 365 Android Email Data Recovery Cybercrime Data Upgrade Apps Business Continuity Communication IT Support VoIP Operating System Backup Small Business Vulnerability Saving Money Money Phishing Business Server Alert Disaster Recovery Law Enforcement Ransomware Communications Mobile Device Management Applications Information Chrome IT Support Collaboration Network Workplace Tips Virtualization Users Managed IT Services Passwords Microsoft Office Miscellaneous Social Media Gadgets Best Practice Cloud Computing Spam Employer-Employee Relationship Google Drive Blockchain Windows 10 Two-factor Authentication Bring Your Own Device Save Money OneNote Computers Artificial Intelligence Networking Information Technology Managed Service Provider Managed IT Managed IT Services Telephone Systems Unsupported Software Tech Support Holiday App Automation Facebook Router Managed Service SaaS Wi-Fi Access Control Travel Proactive IT Quick Tips Hacking Excel Update Hosted Solution Shortcut Search Mobile Security Touchscreen Data Storage Politics Gmail Avoiding Downtime Mobility Fraud WiFi Mobile Device BDR Google Assistant Evernote Hybrid Cloud User Error Audit Budget Meetings Data Protection Wireless Technology Government Cortana Application Data Management Business Technology Conferencing Word Encryption Robot Cost Management IT Management Safety Productivity Augmented Reality The Internet of Things Patch Management Wireless Charging Sports Google Docs Project Management iPhone Commerce Devices WannaCry VPN Risk Management Data Breach Password Health Specifications Virus Remote Monitoring Uninterrupted Power Supply Identity Theft Management Microsoft Word Settings Printing Telephone IT solutions Wireless Employee File Sharing Projects Security Cameras Apple Vendor Sales Proactive Laptop Vendor Management PowerPoint Admin Tablets Maintenance iOS WIndows Server 2008 Transportation DDoS Scam Hyperlink Sync Windows 10s HBO Files Private Cloud Break/Fix Storage Social Engineering Recovery Identity FAQ Screen Mirroring Disaster Machine Learning Edge Computer Care Nanotechnology Employee-Employer Relationship Retail Websites Unified Threat Management Touchpad Samsung Wireless Internet Saving Time NFL eWaste Going Green Social Identities Value Wasting Time Solid State Drive Medical IT Administrator Data Privacy Windows 7 Charger Emails Cast Legal Amazon Downtime Data Loss Ciminal Root Cause Analysis Data Theft Upgrades Lithium-ion battery Antivirus Humor Gamification Keyboard Shortcuts Device Security Computer Fan Streaming Media Legislation Language Accessory Adobe Workers Hard Disk Drive Software as a Service Access Hard Drive Display Marketing BYOD Personal Information Virtual Assistant E-Commerce Chromecast Testing Gifts Computing Memory Human Resources Windows Ink Hacker Bandwidth Comparison Telephony Computer Forensics Peripheral Licensing Updates IT Solutions Emergency Reputation Point of Sale Internet Exlporer Data storage Chromebook Co-Managed Services Outlook Webinar History Alexa for Business Payment Cards Microsoft Excel IT budget Remote Computing Camera Credit Cards App store Consultant Entertainment Financial Payroll Google Maps Spyware Text Messaging Black Market Cleaning Television CrashOverride Automobile Office es Big Data Managing Stress Company Culture Office tips USB Worker Advertising How To Books Compliance Education Hiring/Firing Printers Video Games Experience Work/Life Balance Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Regulation Benefits End of Support Phone System HaaS Save Time Relocation Thank You Computer Accessories Twitter Battery Smart Technology Flexibility Music Instant Messaging Cache Congratulations PDF Scalability Analytics Mobile Computing Keyboard Training Monitors