Skip to main content

Five Places where Biometric Systems Add Convenience and Security

We’ve all seen the movies where a character provides an iris or fingerprint scan to prove their identity in order to get access into a bank vault or a secured facility. That is actually an example of a biometric system. In general, biometrics is a measure of human physiological characteristics and behavior. A biometric system could scan a person’s fingerprint, finger vein, palm vein, iris, facial profile or some other unique physical or behavioral aspect. The purpose of most biometric systems is to authenticate a person’s claimed identity.
Biometrics systems are widely considered to be more convenient and secure than other current methods of identity authentication. One of the most attractive characteristics of using biometrics for individual authentication is that you may forget your ID at home when you head out the door or lose it on your way to the office, but you always carry unique your own biometric credentials wherever you go.  Imagine verifying your identity while at the grocery store just by swiping your finger across a fingerprint sensor instead of a credit card. How convenient is that?
As biometric technology evolves, there are many more ways it can be used for authentication in our everyday lives. The rapid adoption of biometric systems for individual authentication are making our day to day life not only more convenient, but also much more secure. Today I am going to share my imaginary friend Tom’s experience of howbiometric made a difference in his life.

Comments

Popular posts from this blog

Biometric Authentication to Stop Money Laundering in Pakistan

Recently The State Bank of Pakistan has mandated all of its banks to start verifying all of their account holders using biometric technology. The goal of this exercise is to stop money laundering in Pakistan. In the past; opening a bank account only requires the account holder’s details in printed/written form along with their id cards. However, after this current announcement, to open a bank account in Pakistan, one has to provide biometric data using an e-registration system. This procedure is also applicable for those who have registered before without biometric verification process. Many private banks throughout the globe have already deployed biometric identification solution to reduce fraud at their banks. Biometric technology help banks to know their customers better and revolutionize their KYC process. After implementing the biometric solution from M2SYS for customer identification in the microcredit loan process, this helped Grupo Monge (Costa Rican Capital Corpor...

Iris Recognition vs. Retina Scanning – What are the Differences?

In biometrics, iris and retinal scanning are known as “ocular-based” identification technologies, meaning they rely on unique physiological characteristics of the eye to identify an individual. Even though they both share part of the eye for identification purposes, these biometric modalities are quite different in how they work. Let’s take a closer look at both and then explain the similarities and differences in detail: Retinal Scanning:  The human retina is a thin tissue composed of neural cells that are located in the posterior portion of the eye. Because of the complex structure of the capillaries that supply the retina with blood, each person’s retina is unique. The network of blood vessels in the retina is so complex that even identical twins do not share a similar pattern. Although retinal patterns may be altered in cases of diabetes, glaucoma or retinal degenerative disorders, the retina typically remains unchanged from birth until death. (Source: Wikipedia) ...

False Rejection Rate – What Does It Mean And Why Should I Care?

False reject rate   is a statistic used to measure biometric performance when operating in the verification task and it usually calculated as the percentage of times the system produces a false reject.  A false reject occurs when an individual is not matched to their own existing biometric template.  For example: John claims to be John, but the system incorrectly denies the verification.  This can be particularly frustrating for an end user who knows that they are enrolled in the system and should be recognized and verified, but for some reason the system is incorrectly rejecting their scan.  This can cause unnecessary logjams, affect service, frustrate staff and negatively impact productivity.