BIOMETRIC DATA CAPTURE

BIOMETRIC DATA CAPTURE

 

Biometrics is the measurement and statistical analysis of people's physical and behavioral characteristics. The technology is mainly used for identication and access control, or for identifying individuals that are under surveillance. The basic premise of biometric authentication is that everyone is unique and an individual can be identified by his or her intrinsic physical or behavioral traits. (The term "biometrics" is derived from the Greek words "bio" meaning life and "metric" meaning to measure.)

There are two main types of biometric identifiers:
- Physiological characteristics: The shape or composition of the body.
- Behavioral characteristics: The behavior of a person.


Examples of physiological characteristics used for biometric authentication include ngerprints; DNA; face, hand, retina or ear features; and odor.
Behavioral characteristics are related to the pattern of the behavior of a person, such as typing rhythm, gait, gestures and voice. Certain biometric identiers, such as monitoring keystrokes or gait in real time, can be used to provide continuous authentication instead of a single one-off authentication check.


Other areas that are being explored in the quest to improve biometric authentication include brainwave signals, electronic tattoos, and a password pill that contains a microchip powered by the acid present in the stomach. Once swallowed, it creates a unique ID radio signal that can be sensed from outside the skin, turning the entire body into a password.


Biometric verication becoming common Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics, and point-of-sale applications. In addition to security, the driving force behind biometric verication has been convenience, as there are no passwords to remember or security tokens to carry. Measuring someone’s gait doesn’t even require a contact with the person.


Biometric devices, such as Fingerprint readers, consist of:
- A reader or scanning device.
- Software that converts the scanned information into digital form and compares match points.
- A database that stores the biometric data for comparison.

Accuracy of Biometrics:
The accuracy and cost of readers has until recently been a limiting factor in the adoption of biometric authentication solutions but the presence of high quality
cameras, microphones, and Fingerprint readers in many of today’s mobile devices means biometrics is likely to become a considerably more common method of
authenticating users, particularly as the new FIDO specification means that two factor authentication using biometrics is Finally becoming cost effective and in a position to be
rolled out to the consumer market.
The quality of biometric readers is improving all the time, but they can still produce false negatives and false positives. One problem with Fingerprints is that people inadvertently leave
their Fingerprints on many surfaces they touch, and it’s fairly easy to copy them and create a replica in silicone. People also leave DNA everywhere they go and someone’s voice is
also easily captured. Dynamic biometrics like gestures and facial expressions can change, but they can be captured by HD cameras and copied.
Also, whatever biometric is being measured, if the measurement data is exposed at any point during the authentication process, there is always the possibility it can be intercepted. This
is a big problem, as people can’t change their physical attributes as they can a password.
While limitations in biometric authentication schemes are real, biometrics is a great improvement over passwords as a means of authenticating an individual.

Joins Us on Facebook

Contact us

Corporate Headquarter

Sama Road,

Off Shehu Shagari House,

Sokoto.


Branch Office

No.16 Goduwa Estate,

Off Prince & Princess Estates,

Garki

FCT, Abuja