What is biometric authentication?

<p>Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify their identity. Instead of relying on personal identification numbers (PINs) or <a href=”https://www.techtarget.com/searchsecurity/definition/password”>passwords</a>, biometric authentication systems compare physical or behavioral traits to stored, confirmed, authentic data in a database. If both samples of the biometric data match, <a href=”https://www.techtarget.com/searchsecurity/definition/authentication”>authentication</a> is confirmed. Typically, biometric authentication is used to manage access to physical and digital resources, such as buildings, rooms and computing devices.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Biometric identification uses <a href=”https://www.techtarget.com/searchsecurity/definition/biometrics”>biometrics</a>, such as fingerprints, facial recognition and retina scans, to <i>identify</i> a person, whereas biometric authentication is the use of biometrics to <i>verify</i> that people are who they claim to be.</p>
<section class=”section main-article-chapter” data-menu-title=”Types of biometric authentication methods”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Types of biometric authentication methods</h2>
<p>The following examples of biometric technology built using <a href=”https://www.techtarget.com/searchenterpriseai/feature/Computer-vision-tools-reach-into-test-healthcare-security”>computer vision</a> algorithms. These technologies can be used to digitally identify people or permit them to access a system:</p>
<ul class=”default-list”>
<li>Chemical biometric devices</li>
</ul>
<ul class=”default-list”>
<li style=”list-style-type: none;”>
<ul style=”list-style-type: circle;” class=”default-list”>
<li>DNA (deoxyribonucleic acid) matching uses genetic material to identify a person.</li>
</ul> </li>
</ul>
<ul class=”default-list”>
<li>Visual biometric devices</li>
</ul>
<ul c

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: