Understanding Biometric Systems: How Do They Work?

Understanding Biometric Systems: How Do They Work?

Stephen Lv12

Understanding Biometric Systems: How Do They Work?

Close

Artificial intelligence is converging with biometrics to help provide more security in computers and smartphones . This article explains the topic.

FX PRO (Gold Robot + Silver Robot(Basic Package))

Biometrics Defined

Biometrics is defined as the study and application of scientific and/or technological methods designed to measure, analyze, and/or record a human’s unique physiological or behavioral characteristics.

Biometrics leverage human characteristics that are unique from one person to the next so that our own selves become the means of identification/authentication instead of having to enter in a strong password or lengthy pin code.

In fact, many of us already use biometrics now in the forms of our fingerprints and our faces.


VSDC Pro Video Editor is a light professional non-linear video editing suite for creating a movie of any complexity. It supports the most popular video/audio formats and codecs, including 4K, HD and GoPro videos. Preconfigured profiles make the creation of videos for various multimedia and mobile devices absolutely hassle-free.

Key features:

• Import from any devices and cams, including GoPro and drones. All formats supported. Сurrently the only free video editor that allows users to export in a new H265/HEVC codec, something essential for those working with 4K and HD.
• Everything for hassle-free basic editing: cut, crop and merge files, add titles and favorite music
• Visual effects, advanced color correction and trendy Instagram-like filters
• All multimedia processing done from one app: video editing capabilities reinforced by a video converter, a screen capture, a video capture, a disc burner and a YouTube uploader
• Non-linear editing: edit several files with simultaneously
• Easy export to social networks: special profiles for YouTube, Facebook, Vimeo, Twitter and Instagram
• High quality export – no conversion quality loss, double export speed even of HD files due to hardware acceleration
• Stabilization tool will turn shaky or jittery footage into a more stable video automatically.
• Essential toolset for professional video editing: blending modes, Mask tool, advanced multiple-color Chroma Key

How Biometrics Are Used in Daily Life

Although biometrics has been used by various industries for decades, modern tech has helped it gain more public awareness. For example, many of the latest smartphones feature fingerprint scanners and/or facial recognition to unlock devices.

Eye overlaid with a computer-generated retina scanner

Anthony Lee / Getty Images

Compared with so called_token-based_ (e.g. keys, ID cards, driver’s licences) and_knowledge-based_ (e.g. PIN codes, passwords) methods of access control, biometric traits are far more difficult to hack, steal, or fake.

This is one reason why biometrics are often favored for high-level secure entry (e.g. government/military buildings), access to sensitive data/information, and the prevention of fraud or theft.

Characteristics used by biometric identification/authentication are predominantly permanent, which offers a convenience — you can’t simply forget or accidentally leave them somewhere at home.

However, the collection, storage, and handling of biometric data (particularly with regards to consumer tech) often brings up concerns about personal privacy, security, and identity protection.

WonderFox DVD Ripper Pro

Biometric Types and Screening Characteristics

There are a number of biometric characteristics in use today, each with different means of collection, measurement, evaluation, and application. Physiological characteristics used in biometrics relate to the_shape and/or composition_ of the body. Some examples are (but not limited to):

  • DNA
  • Fingerprints/palm prints
  • Iris/retina
  • Face
  • Vein geometry
  • Scent/odor

Behavioral characteristics used in biometrics — sometimes referred to as behaviometrics — relate to_unique patterns exhibited through action_ . Some examples are (but not limited to):

  • Voice
  • Gait
  • Signature
  • Keystroke
  • Heartbeat

Characteristics are chosen because of specific factors that make them suitable for biometric measurements and identification/authentication. The seven factors are:

  • Universal – Each individual has to have it.
  • Unique – There should be enough differences to distinguish separate individuals from each other.
  • Permanence – The resistance to change over time (i.e. how it holds up against aging).
  • Collectability – The ease of acquiring and measuring.
  • Performance – The speed and accuracy of matching.
  • Circumvention – How easily it can be faked or imitated.
  • Acceptability – The openness of people to the particular biometric technology/process (i.e. easier and less invasive techniques, such as fingerprint scanners in smartphones , tend to be more widely accepted).

These factors also help determine if one biometric solution may be better to apply in a situation than another. But cost and the overall collection process are also considered. For example, fingerprint and face scanners are small, inexpensive, fast, and easy to implement into mobile devices. This is why smartphones feature those instead of hardware for analyzing body odor or vein geometry!

How Biometrics Work in Everyday Life

PDF application, powered by AI-based OCR, for unified workflows with both digital and scanned documents.

A thumb in the process of recording a print with black ink

Law enforcement agencies regularly collect fingerprints to help establish crime scenes and identify individuals. MAURO FERMARIELLO/SCIENCE PHOTO LIBRARY / Getty Images

Biometric identification/authentication starts with the collection process. This requires sensors designed for capturing specific biometric data. Many iPhone owners may be familiar with setting up Touch ID , where they have to place fingers on the Touch ID sensor over and over and over again.

The accuracy and reliability of equipment/technology used for collection help to sustain higher performance and lower error rates in subsequent steps (i.e. matching). Basically, new tech/discovery helps to improve the process with better hardware.

Some types of biometric sensors and/or collection processes are more common and prevalent than others in everyday life (even if unrelated to identification/authentication). Consider:

  • Forensic Science: Law enforcement agencies regularly collect fingerprints, DNA samples (hair, blood, saliva, etc.), video surveillance (face/gait recognition), handwriting/signatures, and audio recordings (speaker recognition) to help establish crime scenes and identify individuals. The process is frequently portrayed (i.e. dramatized with varying degrees of actual realism) in movies and television shows. You can even purchase forensic science toys for aspiring detectives.
  • Computer Security: Fingerprint scanners are a growing type of security feature to be incorporated in mobile devices — these scanners have been available (both integrated and as a separate unit) for desktop/laptop computers for years. Facial recognition, found in smartphones such as the Apple iPhone X with Face ID or any Android using Google Smart Lock , perform security actions (typically unlocking) either in lieu of or in addition to fingerprint scanners.
  • Medicine: Many annual wellness checks include digital retinal imaging as an (optional) enhancement to comprehensive eye examinations. Photographs of the inner of eye help doctors screen for eye diseases/conditions. There is also genetic testing, used by doctors to help individuals determine the risks and prospects of developing a hereditary disease/condition. Paternity tests are commonplace too (often a recurring theme of some daytime talk shows).
  • Home Entertainment/Automation: Speech recognition (different from_speaker recognition_ , which is used by forensics to identify individuals through voice patterns) has been available for quite some time. It’s mostly applied for word recognition, such as speech-to-text , language translation, and device control. If you’ve had a conversation with Apple’s Siri , Amazon’s Alexa , Android’s Google Now , and/or Microsoft’s Cortana , then you’ve experienced the entertainment of speech recognition. Many smart home devices can also be automated through voice activation .
  • Purchases/Contracts: If you’ve ever paid using a credit card and/or established an agreement (e.g. ID cards, bank checks, medical/insurance, titles/deeds, wills, renting, etc.) with a person/entity, you’ve likely had to sign your name. Such signatures can be examined to help establish identity and/or forgery – trained professionals are able to discern natural variations in one’s handwriting versus differences that indicate a completely different writer.

Once a biometric sample has been captured a sensor (or sensors), the information undergoes analysis by computer algorithms. The algorithms are programmed to identify and extract certain aspects and/or patterns of characteristics (e.g. ridges and valleys of fingerprints, networks of blood vessels in retinas, complex markings of irises, pitch and style/cadence of voices, etc.), typically converting the data to a digital format/template.

The digital format makes the information easier to analyze/compare against others. Good security practice would involve encryption and secure storage of all digital data/templates.

Next, the processed information passes along to a matching algorithm, which compares the input against one (i.e. authentication) or more (i.e. identification) entries saved within a system’s database.

Matching involves a scoring process that calculates degrees of similarity, errors (e.g. imperfections from the collection process), natural variances (i.e. some human characteristics can experience subtle changes over time), and more. If a score passes the minimum mark for matching, then the system succeeds at identifying/authenticating the individual.

Biometric Identification vs. Authentication (Verification)

A close up of hands holding smartphones using biometric access for mobile banking apps

Fingerprint scanners are a growing type of security feature to be incorporated in mobile devices. mediaphotos / Getty Images

When it comes to biometrics, the terms ‘identification’ and ‘authentication’ are often confused with one another. However, each one is really asking a slightly different yet distinct question.

Biometric identification wants to know_who you are_ — the one-to-many matching process compares biometric data input against all other entries within a database. For example, an unknown fingerprint found at a crime scene would be processed to identify who it belongs to.

Biometric authentication wants to know if_you are who you claim to be_ – the one-to-one matching process compares biometric data input against one entry (typically yours that had been previously enrolled for reference) within a database.

For example, when using the fingerprint scanner to unlock your smartphone, it checks to ensure that you are indeed the authorized owner of the device.

What Are Finger Scanners and How Do They Work?

FAQ

  • What is a biometric screening?
    A biometric screening refers to the practice of clinically evaluating a person’s physical characteristics and wellness, offering them a snapshot of their current health. Height, weight, BMI, blood pressure, and more are usually assessed. These are most often performed by employers or throughout the process of immigration, though they can be used in other contexts, too.
  • How long after a biometric screening does it usually take to get a U.S. Green Card?
    This process varies, but after your biometrics appointment is done and the accompanying paperwork filed, it usually takes between 6 and 10 months to process before you will receive a Green Card.

Was this page helpful?

Thanks for letting us know!

Get the Latest Tech News Delivered Every Day

Subscribe

Tell us why!

Other Not enough details Hard to understand

Submit

  • Title: Understanding Biometric Systems: How Do They Work?
  • Author: Stephen
  • Created at : 2024-08-12 04:10:15
  • Updated at : 2024-08-13 04:10:15
  • Link: https://tech-recovery.techidaily.com/understanding-biometric-systems-how-do-they-work/
  • License: This work is licensed under CC BY-NC-SA 4.0.