What are the steps used in Biometric authentication systems?


Biometrics is the recognition of a person by the measurement of their biological characteristics. For instance, users identifying to a computer or constructing by their fingerprint or voice is treated a biometrics identification.

Biometric devices measure biological elements (like human features) to perform functions, including logging health/fitness data and authenticating users. There are some uses for the technology and a multiple methods for its implementation. Types of biometric data such as visual, audio, spatial and behavioral. Biometric security devices play an essential role in checking a person's identity by enforcing access control methods through their unique biological traits.

Biometric devices authenticate users to access control systems through some element of personal identifier including a fingerprint, voiceprint, iris scan, retina scan, facial scan, or signature dynamics.

There are several biometric technologies are accessible in the market today that can be used for security. Biometric technologies vary in their capabilities, implementation and complexity. They can be used to check or make a person’s identity and they all share multiple elements.

Biometric identification systems are essentially pattern identification systems. They need acquisition scanning devices and cameras to capture pictures, or measurements of an individual’s features, and computer hardware and software to extract, encode, save, and compare these features.

Biometric authentication systems employ unique physical features (or attributes) of an individual person to authenticate the person’s identity. Physical attributes employed in biometric authentication systems such as fingerprints, hand geometry, hand -written signatures, retina patterns and voice patterns. Biometric authentication systems depends upon these physical attributes have been produced for computer login applications.

Biometric authentication systems generally work in the following manner −

  • Prior to some authentication attempts, a user is “enrolled” by making a reference profile (or template) based on the acquired physical attribute. The reference profile is generally based on the set of multiple measurements. The resulting template is related to the identity of the user and stored for later use.

  • When trying to authenticate themselves, the user enters the login name or, alternatively, the user can provide a card/token including identification information. The user’s physical attribute is then computed.

  • The previously saved reference profile of the physical attribute is compared with the measured profile of the attribute created from the user. The result of the comparison can be used to accept or reject the user.

  • Biometric systems can support an enhancing level of security for IT systems, but the technology is less matures than memory or smart cards. Imperfections in biometric authentication devices increase from technical complexities in measuring and profiling physical attributes and from the somewhat variable feature of physical attributes.

Ginni
Ginni

e

Updated on: 09-Mar-2022

234 Views

Kickstart Your Career

Get certified by completing the course

Get Started
Advertisements