Each person has a set of unique characteristics that can be used for authentication. Biometrics uses these unique characteristics for authentication. Today’s Biometric systems examine retina patterns, iris patterns, fingerprints, handprints, voice patterns, keystroke patterns etc for authentication. But most of the biometric devices which are available on the market, only retina pattern, iris patterns, fingerprint and handprint systems are properly classified as biometric systems. Others are more classified as behavioral systems.
Biometric identification systems normally work by obtaining unique characteristics from you, like a handprint, a retina pattern etc. The biometric system then compares that to the specimen data stored in the system.
Biometrics authentication is much better when compared with other types of authentication methods. But the users are reluctant in using biometric authentication. For example, many users feel that retina scanner biometric authentication system may cause loss of their vision. False positives and false negatives are a serious problem with Biometric authentication.
Retina Pattern Biometric Systems
Everybody has a unique retinal vascular pattern. Retina Pattern Biometric system uses an infrared beam to scan your retina. Retina pattern biometric systems examine the unique characteristics of user’s retina and compare that information with stored pattern to determine whether user should be allowed access. Some other biometric systems also perform iris and pupil measurements. Retina Pattern Biometric Systems are highly reliable. Users are often worried in using retina scanners because they fear that retina scanners will blind or injure their eyes.
Iris Scans Biometric Systems
Iris scan verify the identity by scanning the colored part of the front of the eye. Iris scan is is much easier and very accurate.
Fingerprints Biometric Systems
Fingerprints are used in forensic and identification for long time. Fingerprints of each individual are unique. Fingerprint Biometric Systems examine the unique characteristics of your fingerprints and use that information to determine whether or not you should be allowed access.
The theoretical working of the fingerprint scanner is as described below. The user’s finger is placed on the scanner surface. Light flashes inside the machine, and the reflection is captured by a scanner, and it is used for analysis and then verified against the original specimen stored in the system. The user is allowed or denied based on the result of this verification.
Handprints Biometric Systems
As in the case of finger print, everybody has unique handprints. A handprint Biometric Systems scans hand and finger sand the data is compared with the specimen stored for you in the system. The user is allowed or denied based on the result of this verification.
Voice Patterns Biometric Systems
Voice Patterns Biometric Systems can also be used for user authentication. Voice Patterns Biometric Systems examine the unique characteristics of user’s voice.
Keystrokes Biometric Systems
Keystroke Biometric Systems examine the unique characteristics of user’s keystrokes and use that information to determine whether the user should be allowed access.