answersLogoWhite

0


Verified answer

computer scientists are always trying to improve biometric authentication methods

User Avatar

Wiki User

6y ago
This answer is:
User Avatar
Still have questions?
magnify glass
imp
Continue Learning about Biology

What is the point of biometrics?

Biometrics takes advantage of your unique characteristics. Supposedly you are the only one with your fingerprints, voice, retinal patterns, iris, palmprint, face, etc. In theory, those characteristics can be used to uniquely identify you and access to rooms, computer systems, etc. can be granted or denied based on whether you are really you. This contrasts with other methods of access control - something you know (like username/password, PIN, etc.) and something you have (smart-card, magnetic key, physical key, token, etc.). In theory, no one else has all your biometric characteristics, but someone could possibly learn your password or steal your smartcard. In that respect biometrics are supposed to be more secure than the other methods. In practice, biometrics are still somewhat prone to both false positive and false negative failures. Most biometric identification methods can still be fooled at least some of the time by a very skillful intruder. For these reasons, when reliable authentication is very important, 2-factor or even 3-factor authentication is recommended, with biometric authentication being one of the authenticating factors.


Biometrics were first used to?

Biometrics were first used to track local nationals overseas.


How are biometrics helpful?

Biometrics are helpful tools for security and identity verification. They are especially useful to establish the identity where a person might be stranger to the other, for example huge databases like banks. Biometrics identify on the basis of features unique to an individual, like signature, finger print, iris etc. These are difficult to forge. Biometrics used in home doors do not require carrying a key, or the fear of the key getting stolen. Biometrics are also used to identify criminals and determine their identity.


What are the applications of biometrics?

Applications of biometrics are broadly classfied into three categories: 1. Forensic Applications; 2. Government Applications and 3. Commercial Applicatuions


What is Biometric technoloy?

Biometrics is the measurement and statistical analysis of people's physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance. The basic premise of biometric authentication is that everyone is unique and an individual can be identified by his or her intrinsic physical or behavioral traits. (The term "biometrics" is derived from the Greek words "bio" meaning life and "metric" meaning to measure.) There are two main types of biometric identifiers:Physiological characteristics: The shape or composition of the body.Behavioral characteristics: The behavior of a person.Examples of physiological characteristics used for biometric authentication include fingerprints; DNA; face, hand, retina or ear features; and odor. Behavioral characteristics are related to the pattern of the behavior of a person, such as typing rhythm, gait, gestures and voice. Certain biometric identifiers, such as monitoring keystrokes or gait in real time, can be used to provide continuous authentication instead of a single one-off authentication check. Other areas that are being explored in the quest to improve biometric authentication include brainwave signals, electronic tattoos, and a password pill that contains a microchip powered by the acid present in the stomach. Once swallowed, it creates a unique ID radio signal that can be sensed from outside the skin, turning the entire body into a password.

Related questions

Which authentication proof is implemented with Biometrics?

Authentication proofs are often grouped into the categories: Something you know (like a password or PIN) Something you have (like a smart card or dongle) Something you are - this would be biometrics.


Which authentication technology uses a physical characteristic of the user in conjunction with a password?

biometrics


What are common firewall mechanisms for third party authentication?

biometrics digital certs secureid


What is default authentication method while creating new web application project?

Windows authentication is the default authentication method when you create a new Web application project.


What is the weakest challenge and response authentication method used by iis7?

Basic Authentication


What wireless authentication method allows the use of a backend authentication server?

EAP


What is the default authentication method according to the 802.11?

Open system authentication (default).


What the meaning of authentication?

Authentication is something that verifies what is real or true.


What is a method for confirming users identities?

Authentication


What is multicast authentication?

multicast authentication is the effective method of delivering data from sender to multiple receivers..


List three reasons people might be reluctant to use biometrics for authentication?

AnswerWell for one it only helps you. If someone wants to use your computer then they need you to unlock it. If you have a family then biometrics is a bad idea. Third biometrics is expensive. Some whole packages can be 1,000. For what! For inconvenience and debt. The third reluctancy is it really is no challenge for hackers to get past.AnswerIts very personal. Its one thing having a password, but a computer storing your fingerprints can be quite daunting.Its costly.Suprisingly biometrics arent as secure as you might imagine.About a year ago, a customer asked me to crack into his laptop, his only authentication method was a fingerprint scanner. The night before he came to me, he happend to burn his finger and it blistered. The following day he wasnt able to get into his laptop. So I guess that's another reason why you might be reluctant.


What kind of authentication method is kerberos?

It's a mutual authentication; it verifies both user and sender of the ticket using symmetric keys.