<p>Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify their identity. Instead of relying on personal identification numbers (PINs) or <a href=”https://www.techtarget.com/searchsecurity/definition/password”>passwords</a>, biometric authentication systems compare physical or behavioral traits to stored, confirmed, authentic data in a database. If both samples of the biometric data match, <a href=”https://www.techtarget.com/searchsecurity/definition/authentication”>authentication</a> is confirmed. Typically, biometric authentication is used to manage access to physical and digital resources, such as buildings, rooms and computing devices.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Biometric identification uses <a href=”https://www.techtarget.com/searchsecurity/definition/biometrics”>biometrics</a>, such as fingerprints, facial recognition and retina scans, to <i>identify</i> a person, whereas biometric authentication is the use of biometrics to <i>verify</i> that people are who they claim to be.</p>
<section class=”section main-article-chapter” data-menu-title=”Types of biometric authentication methods”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Types of biometric authentication methods</h2>
<p>The following examples of biometric technology built using <a href=”https://www.techtarget.com/searchenterpriseai/feature/Computer-vision-tools-reach-into-test-healthcare-security”>computer vision</a> algorithms. These technologies can be used to digitally identify people or permit them to access a system:</p>
<ul class=”default-list”>
<li>Chemical biometric devices</li>
</ul>
<ul class=”default-list”>
<li style=”list-style-type: none;”>
<ul style=”list-style-type: circle;” class=”default-list”>
<li>DNA (deoxyribonucleic acid) matching uses genetic material to identify a person.</li>
</ul> </li>
</ul>
<ul class=”default-list”>
<li>Visual biometric devices</li>
</ul>
<ul c
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: