k_Street Consulting, LLC Blog

Biometric Authentication Becomes More Commonplace

Biometric Authentication Becomes More Commonplace

Biometrics are a common sight in futuristic or science-fiction settings, but they are increasingly entering the real world in practical ways. In fact, similar technologies are being implemented every day for businesses all over the world. Let’s take a look at some of them, as well as what benefits they provide these organizations.

What Are Biometrics?
Biometrics are a method of authentication that uses some sort of physical attribute or qualifier rather than a password or a key code. Some examples include fingerprints, voice patterns, typing rhythms, and so much more. They are easier to use than your typical passwords or key codes, and even better, they can be used in conjunction with traditional security measures and practices.

Let’s take a closer look at what some of these biometrics are, as well as the most practical way to implement them.

Biometric Types
There are two major categories for biometrics: physical identifiers and behavioral identifiers. Physical identifiers are by far the most common:

  • Signatures: Signatures are one of the unique ways you can identify an individual, and you’ve surely seen this biometric used at least once somewhere or another. Whether it’s a transaction or an agreement, a signature can do much to guarantee someone’s authenticity.
  • Fingerprints/Physiological Attributes: This particular biometric is often used to secure smartphones. Fingerprints can be used to determine the identity of the user, as well as various other physiological attributes, like palm scanning, retinal scanning, and facial recognition.
  • Voice: Voice-based authentication is common all over the place these days, whether it’s a personal user issuing commands to a virtual assistant or a business using voice authentication to navigate automated answering systems.
  • DNA: The technology to implement DNA sequencing into authentication is still a ways off, but it’s closer than you might think.

There are other behavioral identifiers that are used for biometric authentication. While these methods are still in development, here are a few examples of them:

  • Typing Patterns: People all write in different ways, and the same goes for typing. Therefore, this can be used to determine the authenticity of the user based on their keystrokes and the pressure applied to the keys.
  • Navigation and Engagement: In a similar fashion, the way that people navigate applications and systems can also determine identity. Mouse movements are quite showing, as well as how we hold devices.

Reliability (and Risks) of Biometrics
Biometrics are proving problematic to an extent, mostly because they can be inconsistent. Voices can vary depending on the user’s health or age, and faces can change based on a clean-shaven (or bearded) face, a haircut, or a pair of glasses. There are ways to work around this system, and with biometric authentication, there is much that needs to be taken into account.

Security is a Major Concern
This kind of data needs to be heavily protected, as it not only exposes sensitive information, but personal information as well. These kinds of credentials are also not easily changed, as they are heavily based on physical traits. For these reasons, biometrics may take some time to be adopted as the norm.

What are your thoughts on biometrics? Let us know in the comments.

Manufacturers Utilize IT in a Multitude of Ways
Tip of the Week: 9.0 Pie Brings with It New Featur...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, April 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Content Management eCommerce Programming Regulations Files Hosted Solution ISP Spam WIndows 7 Net Neutrality Business Owner Wearable Technology Hacking Wireless Technology Database Humor Benefits Productivity Hiring/Firing Servers Best Available Pain Points Employee Environment Students Emergency Shortcuts Windows 10 HVAC Phishing Millennials IoT Assessment HBO Hring/Firing analytics Information iphone Specifications Audit Apple VoIP Smart Office Telephony Hard Drives E-Commerce Cables Smart Tech Data loss Excel Office Outsourced IT Blockchain Keyboard Document Management Fraud Botnet Identity Theft Online Currency Battery Hacker Antivirus Relocation Unified Communications YouTube Troubleshooting NarrowBand User Error OLED Data Breach Customer Service USB Amazon Uninterrupted Power Supply Windows 8 Healthcare Backup and Disaster Recovery Gadgets Small Business Advertising Computer Care Going Green Update Product Reviews HIPAA Authentication Windows Downtime Cameras Strategy Regulation PowerPoint Microchip Encryption Remote Monitoring and Maintenance Productivity Enterprise Content Management Root Cause Analysis Microsoft Physical Security Settings Employer Employee Relationship Save Money IT service Google Search Hackers Vendor Management App Tech Term Congratulations Television Conferencing Business Continuity Outlook Website Managed IT Services Apps Solid State Drive Information Technology Practices Streaming Media Two Factor Authentication User Tips Insurance Data Backup Customer Relationship Management Efficiency Recycling Remote Monitoring Gmail Managed Service Provider Content Filter Safe Mode Display Flexibility IT Support Touchscreen Thought Leadership Computer Accessories Telecommuting Thank You Cleaning Netflix Loyalty Scam Augmented Reality Social Networking BYOD Application CrashOverride Saving Time Windows 10 Remote Worker Automobile Printers Science Ransomware Google Docs Data Security Virtual Private Network Statistics Health Cybercrime Wire Save Time Video Games Upgrade MSP NIST Proactive IT How to Storage Mobile Device Google Drive Skype travel Transportation Cost Management Fiber-Optic IT Plan Recovery Line of Business Sports Credit Cards Scalability Managed IT Microsoft Office Audiobook SharePoint Point of Sale Safety Archive Hosted Computing Business Technology Facebook Knowledge Cloud Computing Alert Music Fax Server Chromecast Quick Tips Password Management Customers Business Intelligence Bluetooth Router Manufacturing Screen Mirroring Technology Data Management Innovation Computers Electronic Health Records Human Resources HaaS Google Apps Tablets Hosted Solutions Digital Signature Password Office Tips Bring Your Own Device Data Warehousing Legal Accountants Search Engine Digital Payment BDR eWaste Office 365 User Notifications Amazon Web Services Multiple Versions Cloud Money Sync 5G Mobile Office Mobile Tools Internet exploMicrosoft Public Cloud Techology Memory Consultant Camera Help Desk Collaboration Evernote Two-factor Authentication Maintenance Bloatware Remote Work Telephone Systems Laptop communications Workforce Domains Software as a Service Spam Blocking Disaster Recovery IT Solutions Comparison Vendor IBM Security Cameras Access Control Worker Commute Budget Cryptocurrency Printer Cybersecurity Theft File Versioning Colocation Virtual Assistant OneNote Virus Administrator Wi-Fi Professional Services Compliance Current Events Employer-Employee Relationship Windows 10s Private Cloud Running Cable Robot Law Enforcement Cortana Big data Training Analysis Entrepreneur Security Best Practices Content Password Manager Mobility Devices Distribution Google Instant Messaging Hybrid Cloud Worker IT Management Patch Management Users Artificial Intelligence Wiring Marketing Virtualization Samsung Tech Support Tip of the Week Windows Media Player IT solutions Unsupported Software Mobile Device Management Smartwatch webinar Best Practice Chrome Data Browser Emails Network Lithium-ion battery Project Management Government Content Filtering Charger Server Wireless Internet Bing Business Management Computer IaaS Voice over Internet Protocol Restore Data Start Menu Social Media VPN Employee/Employer Relationship Firewall DDoS Workplace Tips Tablet Distributed Denial of Service Logistics IT Consultant Holiday Android Leadership Software Tips Analyitcs Utility Computing Wireless Charging Electronic Medical Records Computer Repair Unified Threat Management Retail History Lifestyle Social Printer Server Network Security Biometrics Networking Mouse Data Storage Education Paperless Office Warranty Saving Money CES How To Digital Signage WiFi Work/Life Balance Multi-Factor Security Experience Word Staff File Sharing Smartphones Data Recovery avoiding downtime Miscellaneous Politics Virtual Desktop Internet Rootkit malware Trending Smart Technology Virtual Reality Value Addiction Online Shopping Administration The Internet of Things Communication Machine Learning Business Mangement Email Business Wireless Supercomputer Network Congestion FENG IT Support Frequently Asked Questions Computing Infrastructure Privacy Gaming Console Webinar Automation Passwords Applications Reputation Meetings Mobile Devices Proactive Touchpad Hardware LinkedIn Twitter Workers Company Culture Nanotechnology Books Cast Data storage Black Market Infrastructure Managing Stress People Managed IT Services Biometric Security Flash Business Computing Telephone System Remote Computing Search Cache Phone System Smartphone Shortcut Managed Service Social Engineering Internet Exlporer Analytic Bandwidth Shadow IT SaaS End of Support Mobile Computing Tip of the week Inventory Operating System Computer Fan Public Computer Criminal Monitor Software Cryptomining Data Protection Operating Systems Backup Risk Management GDPR IT Services Windows Server 2008 Windows 7 Internet of Things PDF Entertainment Read Vulnerability Connectivity Redundancy Intranet

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *