SlideShare uma empresa Scribd logo
1 de 8
Biometric
authentication
methods
Souhaila Messeria
Tinlé Van Heddeghem
Jonas Vandijck
What is biometric authentication methods
• Biometric authentication works by comparing two sets of data:
o the first one is preset by the owner of the device, while the second one belongs to a device visitor.
o If the two data are nearly identical, the device knows that “visitor” and “owner” are one and the same, and
gives access to the person.
• Biometric authentication refers to the security procedure that involves the use of unique biological characteristics
of individuals
o such as retinas, irises, voices, facial characteristics, and fingerprints in order to verify people are who they
claim to be.
o This process is used to control access to physical and digital resources, such as buildings, rooms, and different
devices.
• The word biometric is a combination of two words: bio (human) and metric (measurement). In simpler words,
biometrics are any metrics related to human features which make an individual different from other individuals.
• Biometrics originated in the identification systems of criminal activity developed by Alphonse Bertillon (1853–
1914) and by Francis Galton 's theory of fingerprints and physiognomy
Types of Biometric authentication methods
• Chemical biometric devices
o DNA (deoxyribonucleic acid) matching uses genetic material to identify a
person.
• Visual biometric devices
o Retina scans identify subjects by analysing the pattern of blood vessels at
the back of their eyes.
o Iris recognition uses a picture of the iris to identify people.
o Fingerprint scanning identifies people based on their fingerprints.
o Hand geometry recognition verifies identity or authorizes transactions
using a mathematical representation of the unique characteristics of
people's hands.
o Facial recognition relies on the unique characteristics and patterns of
people's faces to confirm their identity.
o Ear authentication verifies identity based on users' unique ear shape.
o Signature recognition uses pattern recognition to identify individuals based
on their handwritten signature.
Types of Biometric
authentication methods
• Vein or vascular scanners
o Finger vein ID identifies individuals based on
the vein patterns in their finger.
• Behavioural identifiers
o Gait analyses the way people walk.
o Typing recognition establishes people's
identity based on their unique typing
characteristics, including how fast they type.
• Auditory biometric devices
o Voice ID identifies individuals by their voice
and relies on characteristics created by the
shape of the mouth and throat.
Biometric authentication
methods applications
• Biometrics was once something confined to the world of
science fiction, but over the past decade, we have seen the
emergence of biometrics in our everyday lives.
Now, it’s a rare day when we don’t interact with some
form of biometric technology. Biometric technology is all
around us.
• For example:
o Airport Security
o Law Enforcement
o Mobile Access and Authentication
o Banking
o Home Assistants
o Building Access
o Schools
o Public Transport
o Blood Banks
Biometric authentication
methods disruptive
• Biometric authentication is one of the most quietly disruptive
technologies we continue to use
• People forget how biometrics has disrupted our lives and it’s
continuing to do so
• Biometrics have disrupted banking, law enforcement, and
cybersecurity, and that disruption has happened over the
course of many years. Basically, as long people find new and
useful applications for it, biometrics will continue to be
disruptive.
• Another potential issue with biometric authentication is that,
once a system has been implemented, an organization may be
tempted to use the system for functions beyond its original
intention
o For example, a company may find the technology useful
for employee monitoring and management, but once a
biometric system has been installed, the organization
may find that it has the ability to track exactly where an
employee has been
Gartner Technology Roadmap
• Disadvantages of Biometric authentication methods:
o Costs :It’s no surprise that a more advanced security system would require significant investments and costs
to implement. Transitioning to a biometrics authentication wouldn’t be the only thing a company would have to pay
for, a need to upgrade current systems in order to support a shift to biometric authentication on their devices
o Data breaches: Businesses and governments that collect and store users personal data are under constant threat
from hackers. Because biometric data is irreplaceable, organizations need to treat sensitive biometric data with
increased security and caution.
o Tracking and data: As the world increases its use of biometric authentication systems like facial recognition
technology and other biometric security measures, privacy of users needs to be taken into consideration. Many
instances, organizations and governments have used facial recognition software to track and identify people with
scary accuracy that significantly inhibits privacy. Deployment risk color: red
• Enterprise value: small
o the risk of biometric is red this is because all privacy of the people who use it is preserved. this wouldn't be safe if it
ever got hacked. we also suspect from the Gartner Technology Roadmap that the value of biometric authentication
methods is not high. This is because nowadays there are other ways to protect the security of your business without
compromising the privacy of the users.
Bibliography
Wikipedia contributors. (2021, 14 december). Biometrics. Wikipedia. Geraadpleegd op 15 december 2021, van
https://en.wikipedia.org/wiki/Biometrics
Contributor, T. (2021, 19 april). What is biometric authentication? SearchSecurity. Geraadpleegd op 15 december 2021,
van https://www.techtarget.com/searchsecurity/definition/biometric-authentication
V. (2017, 9 november). Biometrics are the Ultimate Disruption. Veridium. Geraadpleegd op 17 december 2021, van
https://www.veridiumid.com/biometrics-ultimate-distruption/
G. (2021, 11 oktober). The Top 9 Common Uses of Biometrics in Everyday Life. NEC. Geraadpleegd op 15 december
2021, van https://www.nec.co.nz/market-leadership/publications-media/the-top-9-common-uses-of-biometrics-in-
everyday-life/
Mitek. (2021, 15 maart). Advantages and disadvantages of biometrics |. Geraadpleegd op 15 december 2021, van
https://www.miteksystems.com/blog/advantages-and-disadvantages-of-biometrics

Mais conteúdo relacionado

Mais procurados

Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technologyMaidaShahbaz3
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materialsyasmeenreem
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionIOSR Journals
 
Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in IndiaKshitij Behl
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law EnforcementHow Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law Enforcementmehedi76
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety
 
Biometric Authentication in Banking
Biometric Authentication in BankingBiometric Authentication in Banking
Biometric Authentication in BankingMuthu Ramanathan
 

Mais procurados (19)

Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materials
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Pdf1
Pdf1Pdf1
Pdf1
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human Recognition
 
Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in India
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
Shamaas
ShamaasShamaas
Shamaas
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law EnforcementHow Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
Biometric Authentication in Banking
Biometric Authentication in BankingBiometric Authentication in Banking
Biometric Authentication in Banking
 

Semelhante a Ai

Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technologypalsantosh
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBirkumarJana
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 

Semelhante a Ai (20)

Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometric
 Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Biometrics
BiometricsBiometrics
Biometrics
 

Último

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 

Último (20)

VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 

Ai

  • 2. What is biometric authentication methods • Biometric authentication works by comparing two sets of data: o the first one is preset by the owner of the device, while the second one belongs to a device visitor. o If the two data are nearly identical, the device knows that “visitor” and “owner” are one and the same, and gives access to the person. • Biometric authentication refers to the security procedure that involves the use of unique biological characteristics of individuals o such as retinas, irises, voices, facial characteristics, and fingerprints in order to verify people are who they claim to be. o This process is used to control access to physical and digital resources, such as buildings, rooms, and different devices. • The word biometric is a combination of two words: bio (human) and metric (measurement). In simpler words, biometrics are any metrics related to human features which make an individual different from other individuals. • Biometrics originated in the identification systems of criminal activity developed by Alphonse Bertillon (1853– 1914) and by Francis Galton 's theory of fingerprints and physiognomy
  • 3. Types of Biometric authentication methods • Chemical biometric devices o DNA (deoxyribonucleic acid) matching uses genetic material to identify a person. • Visual biometric devices o Retina scans identify subjects by analysing the pattern of blood vessels at the back of their eyes. o Iris recognition uses a picture of the iris to identify people. o Fingerprint scanning identifies people based on their fingerprints. o Hand geometry recognition verifies identity or authorizes transactions using a mathematical representation of the unique characteristics of people's hands. o Facial recognition relies on the unique characteristics and patterns of people's faces to confirm their identity. o Ear authentication verifies identity based on users' unique ear shape. o Signature recognition uses pattern recognition to identify individuals based on their handwritten signature.
  • 4. Types of Biometric authentication methods • Vein or vascular scanners o Finger vein ID identifies individuals based on the vein patterns in their finger. • Behavioural identifiers o Gait analyses the way people walk. o Typing recognition establishes people's identity based on their unique typing characteristics, including how fast they type. • Auditory biometric devices o Voice ID identifies individuals by their voice and relies on characteristics created by the shape of the mouth and throat.
  • 5. Biometric authentication methods applications • Biometrics was once something confined to the world of science fiction, but over the past decade, we have seen the emergence of biometrics in our everyday lives. Now, it’s a rare day when we don’t interact with some form of biometric technology. Biometric technology is all around us. • For example: o Airport Security o Law Enforcement o Mobile Access and Authentication o Banking o Home Assistants o Building Access o Schools o Public Transport o Blood Banks
  • 6. Biometric authentication methods disruptive • Biometric authentication is one of the most quietly disruptive technologies we continue to use • People forget how biometrics has disrupted our lives and it’s continuing to do so • Biometrics have disrupted banking, law enforcement, and cybersecurity, and that disruption has happened over the course of many years. Basically, as long people find new and useful applications for it, biometrics will continue to be disruptive. • Another potential issue with biometric authentication is that, once a system has been implemented, an organization may be tempted to use the system for functions beyond its original intention o For example, a company may find the technology useful for employee monitoring and management, but once a biometric system has been installed, the organization may find that it has the ability to track exactly where an employee has been
  • 7. Gartner Technology Roadmap • Disadvantages of Biometric authentication methods: o Costs :It’s no surprise that a more advanced security system would require significant investments and costs to implement. Transitioning to a biometrics authentication wouldn’t be the only thing a company would have to pay for, a need to upgrade current systems in order to support a shift to biometric authentication on their devices o Data breaches: Businesses and governments that collect and store users personal data are under constant threat from hackers. Because biometric data is irreplaceable, organizations need to treat sensitive biometric data with increased security and caution. o Tracking and data: As the world increases its use of biometric authentication systems like facial recognition technology and other biometric security measures, privacy of users needs to be taken into consideration. Many instances, organizations and governments have used facial recognition software to track and identify people with scary accuracy that significantly inhibits privacy. Deployment risk color: red • Enterprise value: small o the risk of biometric is red this is because all privacy of the people who use it is preserved. this wouldn't be safe if it ever got hacked. we also suspect from the Gartner Technology Roadmap that the value of biometric authentication methods is not high. This is because nowadays there are other ways to protect the security of your business without compromising the privacy of the users.
  • 8. Bibliography Wikipedia contributors. (2021, 14 december). Biometrics. Wikipedia. Geraadpleegd op 15 december 2021, van https://en.wikipedia.org/wiki/Biometrics Contributor, T. (2021, 19 april). What is biometric authentication? SearchSecurity. Geraadpleegd op 15 december 2021, van https://www.techtarget.com/searchsecurity/definition/biometric-authentication V. (2017, 9 november). Biometrics are the Ultimate Disruption. Veridium. Geraadpleegd op 17 december 2021, van https://www.veridiumid.com/biometrics-ultimate-distruption/ G. (2021, 11 oktober). The Top 9 Common Uses of Biometrics in Everyday Life. NEC. Geraadpleegd op 15 december 2021, van https://www.nec.co.nz/market-leadership/publications-media/the-top-9-common-uses-of-biometrics-in- everyday-life/ Mitek. (2021, 15 maart). Advantages and disadvantages of biometrics |. Geraadpleegd op 15 december 2021, van https://www.miteksystems.com/blog/advantages-and-disadvantages-of-biometrics