logo

Biometric Authentication: Technologies, Applications, and Recommendations

   

Added on  2023-06-06

12 Pages2659 Words322 Views
Running head: BIOMETRIC AUTHENTICATION 1
Biometric Authentication
Student’s Name
Institution

BIOMETRIC AUTHENTICATION 2
Contents
Abstract.......................................................................................................................................................3
INTRODUCTION...........................................................................................................................................4
Report background..................................................................................................................................4
The aim of the report..............................................................................................................................4
Relevant technologies and their application...............................................................................................5
Cryptographic concept............................................................................................................................6
User authentication process....................................................................................................................7
Importance of securing computing environment....................................................................................8
Recommendations.......................................................................................................................................9
References.................................................................................................................................................11
2

BIOMETRIC AUTHENTICATION 3
Abstract
Authentication and identification are the second methods that an individual’s individuality tends
determination using biometric technology concept. According to (Hanna 2015, p54) verification
checks that an individual is indeed who they assert to be and accomplishes a one-to-one
assessment of the individual’s thumbprint sample with a stowed reference pattern. Identification,
on the other hand, executes a one-to-many evaluation in confirming an individual’s personality.
The identification procedure associates the individual’s fingerprint taster against all the allusion
templates kept in a single file. An individual is confidently identified if the person’s fingerprint
appearance equals any of the stored patterns. An association can enjoy unbounded benefits by
adequately deploying biometric technology in their daily functioning. The present economy is a
developing entity, and technological progressions have changed the technique in which
organizations operate and conduct their dealings. Current organizations need to be adaptive,
supple and agile to endure in the economical business situation. For instance, fingerprint
expertise tends to benefit organizations in a diversity of sectors such as government, retail
originalities, health care, technology establishments, manufacturing production, libraries, and
colleges among others (Hejazi et al. 2016). Organizations are advised in the employment of
biometric technologies in their productions as they cater to more secure document storage and
curb unauthorized access in their databases.
3

BIOMETRIC AUTHENTICATION 4
INTRODUCTION
Report background
The report below mainly addresses the issue of biometric authentication in the current
technology in the environment. Techniques of securing information and data in the present days
have evolved to a more secure means of biometric authentication where access to a particular
network in the system only enhanced after the authentication process. The report further
discusses the limitations and procedural application of various types of biometric authentication.
Biometric technologies are the unique, measurable physiognomies used in labeling and
describing individuals (Bemmel & Mian 2014, p90). These identifiers (biometric) often tends
categorized as physical versus behavioral features. Physiological appearances are related to the
body shape, for instance, face recognition, fingerprint, veins of the palm, hand geometry, iris
recognition, among others. On the other hand, behavioral appearances are related to the design of
behavior of an individual, including but not restricted to gait, typing rhythm, and voice.
Meanwhile, biometric identifiers are unique to persons; they are more dependable in verifying
identity than token and knowledge-based approaches; though, the gathering of biometric
identifiers increases privacy concerns about the eventual use of this data. The report discusses
the application areas of biometric technologies and their concerned issues.
The aim of the report
The reports aim at enhancing scholars and organizational workforces in knowledge-based
equipping with biometric technology in the present era. The report displays the concept of
biometrics as a very robust authentication mechanism that based on something that an individual
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Assignment: Fingerprinting vs Face Recognition
|27
|7463
|220

The Evolution of Biometrics | Capitol Technology
|5
|707
|22

Information Security: Biometric Authentication
|12
|3063
|323

Biometric Authentication: System Security & Privacy
|6
|3012
|32

BIOMETRIC VERIFICATION.
|3
|388
|88

Research Project - Assignment PDF
|7
|1519
|75