Biometrics provides authentication based on something you are (physiological) or something you do (behavioral), not something you know, such as a password.
Currently the most popular biometric mechanism involves software that measures how long you hold a key on a keyboard and the speed at which you type. This keystroke-analysis software would be an example of a behavioral biometric device, which works because your typing style is almost as unique as a fingerprint. It is popular because it is non-intrusive (as opposed to hold still while the laser scans your eyes) and also the least expensive option. Other behavioral biometric options include voice recognition and signature scanning. See also section 184.108.40.206 for more information on biometrics.
Physiological biometric options include fingerprint scanning, iris or retinal scanning of the eye and, as visitors to some Disney theme parks have experienced first-hand, various types of hand-scanning. APC has brought the fingerprint scanner to sub-$50 USD levels59.
Different biometric identification mechanisms are appropriate for different situations when authenticating employees, citizens, and customers and not all may be perceived as acceptable in all situations (do your customers really want to be authenticated at your site with their fingerprints?)
For more information about biometrics, at a management overview level, including discussions of privacy and the uses of biometrics in various vertical markets, see the book Biometrics60 by Nanavati et al.
60. Nanavati, Samir, Michael Thieme, Raj Nanavati, Biometrics, John Wiley, October 2002. http://www.nerdbooks.com/item.html?id=0471099457
Home - Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.