answersLogoWhite

0


Best Answer

Biometric authentication - is using something like a fingerprint scanner to verify a persons identity. These devices are used in high-security areas such as a power stations control room, so that only those people who are authorised to work there actually get into the building.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is biometric authentication methods?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Biology

What is true about biometrics as an authentication method?

computer scientists are always trying to improve biometric authentication methods


What is the technology which is used to measure and analyze human body characteristics for authentication purposes?

biometric


What is a type of attack where an intruder is able to forge a biometric sample?

Methods used to successfully forge biometric input have included using a jelly copy of a finger with the fingerprint embedded on it and using a photograph of an individual in place of their face for a facial scan. The better biometric devices will incorporate methods to prevent these types of methods from succeeding, but both these two methods and others have been demonstrated as still working on some biometric authentication devices still on the market. There is also the potential problem of "splicing". Some formats for smart cards sign each piece of information separately, so an attacker can steal the legitimate signed identity of another user and splice it into his own biometric information. To combat this, better smart cards sign the entire set of data including both the user identity and their biometric information.


What are the disadvantages of biometric login?

Biometric login can have a few drawbacks. There is an assumption that a person's biometric information cannot be "faked" but biometric experts will tell you that most biometric login methods can be defeated given enough time and resources. Some biometric characteristics change change for a person due to illness or even weather conditions, resulting in an authorized user being denied access. If it is voice - a cold can alter the voice. Injuries to hands can mess up fingerprints, infections can alter iris and retina patterns. Biometric readers can also become damaged and fail to properly authenticate a user. The damage can be so subtle that it cannot be easily detected. As a result of these potential problems it is generally not a good idea to rely exclusively on biometrics for login authentication. It is better to have it as one possible method or as part of a multi-factor authentication.


What is biometric system?

Biometrics is a methods of recognizing a person by behavioral characteristic.

Related questions

Which authentication methods support biometric security devices?

EAP


What is true about biometrics as an authentication method?

computer scientists are always trying to improve biometric authentication methods


Which two devices are considered input devices?

biometric authentication device digital camera


Is biometric authentication device and digital camera an input device?

Yes they are input devices.


What is the technology which is used to measure and analyze human body characteristics for authentication purposes?

biometric


What is a type of attack where an intruder is able to forge a biometric sample?

Methods used to successfully forge biometric input have included using a jelly copy of a finger with the fingerprint embedded on it and using a photograph of an individual in place of their face for a facial scan. The better biometric devices will incorporate methods to prevent these types of methods from succeeding, but both these two methods and others have been demonstrated as still working on some biometric authentication devices still on the market. There is also the potential problem of "splicing". Some formats for smart cards sign each piece of information separately, so an attacker can steal the legitimate signed identity of another user and splice it into his own biometric information. To combat this, better smart cards sign the entire set of data including both the user identity and their biometric information.


What is a A type of attack where an intruder is able to forge a biometric sample?

Methods used to successfully forge biometric input have included using a jelly copy of a finger with the fingerprint embedded on it and using a photograph of an individual in place of their face for a facial scan. The better biometric devices will incorporate methods to prevent these types of methods from succeeding, but both these two methods and others have been demonstrated as still working on some biometric authentication devices still on the market. There is also the potential problem of "splicing". Some formats for smart cards sign each piece of information separately, so an attacker can steal the legitimate signed identity of another user and splice it into his own biometric information. To combat this, better smart cards sign the entire set of data including both the user identity and their biometric information.


What are the login authentication methods in sql server 2005?

SQL Authentication Windows Authentication (Domain)


Which behavioral biometric authentication model should a technician deploy in a secure data center and why?

voice recognition


Which two devices are consider input devices?

Keyboard, Bar-code Reader, biometric authentication device


What are the disadvantages of biometric login?

Biometric login can have a few drawbacks. There is an assumption that a person's biometric information cannot be "faked" but biometric experts will tell you that most biometric login methods can be defeated given enough time and resources. Some biometric characteristics change change for a person due to illness or even weather conditions, resulting in an authorized user being denied access. If it is voice - a cold can alter the voice. Injuries to hands can mess up fingerprints, infections can alter iris and retina patterns. Biometric readers can also become damaged and fail to properly authenticate a user. The damage can be so subtle that it cannot be easily detected. As a result of these potential problems it is generally not a good idea to rely exclusively on biometrics for login authentication. It is better to have it as one possible method or as part of a multi-factor authentication.


What is the portrays authentication based on something the user has?

An ID card portrays authentication based upon something the user has.