Biometrics are particularly useful as it is an authentication process that cannot be easily circumvented. Where standard process of access control has failed (passwords, smart cards, keys, or certificates) because it was bypassed by another person who had otherwise obtained the knowledge; biometrics will succeed because it use inherent physical characteristics that cannot be "imitated". Thus, this process tightens security access control.
The following figure shows the biometric authentication process:

Types of biometrics:
As explained earlier, there are several developed biometrics ranging from fingerprint, voice, face, iris and handprint geometry that have their fair share of advantages and disadvantages. When enterprises are confronted with the task of choosing one biometric, although a difficult task, the trick is to choose the right one to implement depending on what needs to be accomplished. Below is another figure of comparison between the most widely used biometrics today:

As the previous figure resumed, fingerprint biometric is basically the imprint of one's fingerprint data stored in a machine that will allow access when recognized (there can only be one match, thus allowing stricter control). Next we have the face biometric which memorizes one's facial structure and characteristics. We follow with the iris biometric which scans one's iris to allow access (rendered very popular by the movie industry as we see it regularly in action movies). And finally we have voice recognition and hand geometry biometrics which memorizes the pattern and intonation of your voice and the lines, shape, length of your hand respectively, to allow access.
Here are a few pictures of popular biometrics:
Below is the fingerprint biometric door lock guardian XL30t

Below is the iris scanner

No comments:
Post a Comment