ROI Integrated Office Technologies Blog

Biometric Authentication Becomes More Commonplace

Biometric Authentication Becomes More Commonplace

Biometrics are a common sight in futuristic or science-fiction settings, but they are increasingly entering the real world in practical ways. In fact, similar technologies are being implemented every day for businesses all over the world. Let’s take a look at some of them, as well as what benefits they provide these organizations.

What Are Biometrics?
Biometrics are a method of authentication that uses some sort of physical attribute or qualifier rather than a password or a key code. Some examples include fingerprints, voice patterns, typing rhythms, and so much more. They are easier to use than your typical passwords or key codes, and even better, they can be used in conjunction with traditional security measures and practices.

Let’s take a closer look at what some of these biometrics are, as well as the most practical way to implement them.

Biometric Types
There are two major categories for biometrics: physical identifiers and behavioral identifiers. Physical identifiers are by far the most common:

  • Signatures: Signatures are one of the unique ways you can identify an individual, and you’ve surely seen this biometric used at least once somewhere or another. Whether it’s a transaction or an agreement, a signature can do much to guarantee someone’s authenticity.
  • Fingerprints/Physiological Attributes: This particular biometric is often used to secure smartphones. Fingerprints can be used to determine the identity of the user, as well as various other physiological attributes, like palm scanning, retinal scanning, and facial recognition.
  • Voice: Voice-based authentication is common all over the place these days, whether it’s a personal user issuing commands to a virtual assistant or a business using voice authentication to navigate automated answering systems.
  • DNA: The technology to implement DNA sequencing into authentication is still a ways off, but it’s closer than you might think.

There are other behavioral identifiers that are used for biometric authentication. While these methods are still in development, here are a few examples of them:

  • Typing Patterns: People all write in different ways, and the same goes for typing. Therefore, this can be used to determine the authenticity of the user based on their keystrokes and the pressure applied to the keys.
  • Navigation and Engagement: In a similar fashion, the way that people navigate applications and systems can also determine identity. Mouse movements are quite showing, as well as how we hold devices.

Reliability (and Risks) of Biometrics
Biometrics are proving problematic to an extent, mostly because they can be inconsistent. Voices can vary depending on the user’s health or age, and faces can change based on a clean-shaven (or bearded) face, a haircut, or a pair of glasses. There are ways to work around this system, and with biometric authentication, there is much that needs to be taken into account.

Security is a Major Concern
This kind of data needs to be heavily protected, as it not only exposes sensitive information, but personal information as well. These kinds of credentials are also not easily changed, as they are heavily based on physical traits. For these reasons, biometrics may take some time to be adopted as the norm.

What are your thoughts on biometrics? Let us know in the comments.

Getting to Know About Phishing Attacks Can Keep Yo...
Tip of the Week: 9.0 Pie Brings with It New Featur...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Productivity Network Security Google User Tips Microsoft Data Software Hackers Malware Innovation Internet Backup Hardware Smartphones Mobile Devices Email Tech Term Business Communications Business Management Smartphone Browser Data Backup Android Business Continuity IT Services Workplace Tips Windows 10 VoIP Cloud Computing Computer Efficiency Data Recovery Outsourced IT Computers Disaster Recovery Communication Alert Managed IT Services Artificial Intelligence Windows 10 Ransomware Chrome Managed IT Services Network Router Cybercrime Windows Miscellaneous Social Media Small Business Internet of Things Collaboration Cybersecurity Law Enforcement IT Support Office Mobile Device Gadgets Office 365 Money How To Password Facebook Holiday Applications Wi-Fi Health Virtualization Passwords Server Quick Tips Google Drive App Social Engineering BYOD Saving Money Upgrade Private Cloud Word BDR Spam Phishing Mobile Device Management Information Automation Save Money Telephone Systems Training Office Tips Microsoft Office Vulnerability Scam Hacking Settings Bring Your Own Device Voice over Internet Protocol Encryption Connectivity Paperless Office Data Security Data Breach Two-factor Authentication Managed Service Flexibility Work/Life Balance Operating System HaaS Data Protection SMB's Apps Mobility Productivity Networking Meetings Battery Google Docs Blockchain History IT Management PDF Avoiding Downtime Value Big Data Identity Theft Infrastructure Website Business Intelligence Users Education OneNote Managed Service Provider Redundancy IT Plan Entertainment Hiring/Firing Cryptocurrency Automobile Charger Remote Computing Keyboard Electronic Medical Records Wireless Human Resources Servers Display Unsupported Software IT Support Fraud Employer-Employee Relationship Public Cloud VPN Managed IT Data Management Cleaning Spam Blocking Government Telephony Worker Staff Legal USB Remote Monitoring Firewall Mobile Computing Access Control Update CES Machine Learning Software as a Service Virtual Assistant Botnet Computer Care Augmented Reality Save Time Comparison Bandwidth End of Support Content Management Windows 7 Data Storage Marketing Telephone System Samsung Sports Patch Management Start Menu Workers Worker Commute Net Neutrality Specifications Books Internet exploMicrosoft Budget Password Management Two Factor Authentication Emails Nanotechnology File Sharing Security Cameras Politics Television Social Flash Online Shopping IT Consultant Cortana Practices eWaste Audiobook Apple Smart Office Search Engine Frequently Asked Questions OLED Instant Messaging Digital Signature NIST Tools Employer Employee Relationship Vendor Management Addiction Warranty ISP Video Games Supercomputer Advertising Evernote Smart Tech Remote Worker Smartwatch HIPAA Music Public Computer Vendor Transportation Leadership Information Technology Hosted Computing Criminal Loyalty Solid State Drive iPhone Document Management Bing Excel Credit Cards Password Manager Computer Accessories Cache Printer Cryptomining Millennials Data loss Sync Computing Infrastructure Monitor Wiring Employee Multi-Factor Security Wearable Technology User Error Benefits Inventory Recovery SaaS Audit Help Desk Tip of the week Safe Mode Business Mangement Bluetooth Techology Wireless Internet Mouse Database Workforce Scalability Emergency Current Events Screen Mirroring Wireless Charging Netflix Devices Unified Threat Management Digital Signage Trending Downtime Internet Exlporer HVAC webinar Software Tips Computer Fan Windows Server 2008 Amazon Hybrid Cloud Accountants Gmail Wire Administrator HBO Business Technology Telecommuting Knowledge Cast Skype Google Apps Virtual Reality Rootkit Data storage Thought Leadership 5G Camera Google Search Best Practice Troubleshooting Root Cause Analysis Enterprise Content Management Black Market Smart Technology Conferencing Physical Security Proactive IT Authentication Safety MSP WiFi Risk Management Assessment FENG Files IBM YouTube Shortcuts Amazon Web Services Hacker Travel Recycling Content Windows 10s The Internet of Things Microchip Outlook Biometric Security Remote Work Network Congestion Twitter Printers Competition Customer Relationship Management Company Culture IP Address Compliance Webinar Customer Service Managing Stress Mobile Office Regulation Manufacturing Domains IT solutions CrashOverride Fun Public Speaking Presentation How to Lithium-ion battery Wireless Technology Hard Drives Tech Support Search