[X]   Directory of
Guides & Reviews

Beginners Guides
Motherboards by Brand
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....
Biometrics Explained
Biometrics Explained - PCSTATS
Biometrics is the methodology for recognizing or identifying persons based on physiological or behavioral characteristics.
Filed under: Biometrics Published:  Author: 
External Mfg. Website: Various Dec 21 2000   Max Page  
Home > Reviews > Biometrics > Various

Biometrics Explained

Biometrics is the methodology for recognizing or identifying persons based on physiological or behavioral characteristics. Essentially all security features are based on a combination of three key concepts. Security can be based on something you have, something you know or something you are. While tokens or passwords can copied or stolen, biometric identifiers are much more difficult to reproduce.

Currenty physical traits which can be used as identifiers include facial shape, fingerprints, iris patterns, retina patterns, hand geometry, speech, handwriting / keystroke order and finally even wrist vein patterns. For these identifiers to be physically compromised it would involve a very gory operation...

It is the task of biometric products to apply a mathematical algorithm to the identifier (retina, or fingerprint for example) to determine if a user is a who they are pretending to be. In devices where a finger print is the means of identification, a small device will scan the fingerprint of the user and momentarily record the fine details. Where fingerprints are concern this may include features such as the finger prints' hills and valleys, the direction and branching points, line endings and dozens of other minutiae.

The fingers features can be acquired optically, thermally based on temperature differences between the fingertip's valleys and ridges, by a pressure sensor or via a capacitive sensor which is essentially a small silicon chip with many thousands of sensing elements. For instance Infineon's "FingerTIP sensor uses the capacity difference between the surface of the sensor and the surface of the finger. The capacity measured at a ridge differs from that at a valley. Thus, about 65.000 capacitors acquire the data in a field of 224 x 288 pixels and transform it into a digital signal."

Optical sensors, consisting of a lens and/or prism optical system added to a CCD or CMOS camera, measure light deflections produced by a finger on a sensor surface. Thermal sensors rely on measuring temperature differences at the fingertip so they can be influenced by changes in temperature in the surrounding environment. Generally thermal sensors must operate in a O° C or above ambient temperature.

Different means of storing the identifiers exist, and while their are benefits to each method there is no absolute best. Some companies opt to store all identifiers on a central server, where user information is sent during authentication. Other technologies store the identifier on the local hard drive in a highly encrypted format. To minimize the ability of an individual going around the biometric security features some companies even enable users of their devices to add special protective layers to the hard drive. In these configurations the file allocation table (FAT table) is an integral part of the security system protecting their computer. When the OS attempts to access the FAT table the software side of the biometric security system can prompt for an authentication of the user. If the data doesn't match the hard drive remains physically locked out at the most basic level, rendering all information stored on it unusable.

Restricted access is good, but what if you are rejected during the authentication procedure from accessing your own computer? It can happen if you have a large cut on your finger for instance. In such situations you would be in the same position as if you had forgotten your password. What would happen if you were just rejected for no reason, or even worse some one else had a finger print similar to yours and was able to gain access your computer? Well the odds are statistically in your favor that neither of these situations will occur. Currently, some biometric devices boast False Acceptance Rates (FAR) of as low as 1 in 1 billion, while the industry average sits at about 1 in 10,000. Conversely the False Recognition Rate (FRR) is typically about 2%.

Of all the identifiers in the realm of biometrics the most accurate and secure are the retinal and iris scanning technologies. As your eyes are generally speaking very well protected and extremely unique there is much less room for errors to stand between you and your data. Though on the other hand, if you experience any kind of physical trauma to your eye you might be out of luck...

All in all biometrics is the final piece in the security triangle and the most secure. With the growing number of networked computers, and volume of sensitive data being stored on those machines the need for a means of securing data is ever increasing. Biometrics still seem to be marginalized into the James Bond category as far as the mainstream consumer is concerned. For instances where security is paramount, it offers a level of reassurance that is not there with passwords or token security devices. Think of it this way. If you run a website and your server is stored with hundreds of other servers at the hosting companies building, would you feel more secure knowing a retina scanner or hand geometry security device was protecting your server from tampering, or lock and key?


Contents of Article: Various

Hardware Sections 

PCSTATS Network Features Information About Us Contact
PCSTATS Newsletter
Tech Glossary
Technology WebSite Listings
News Archives
(Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2023 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.