Biometrics is the science of measuring a unique physical
characteristic about an individual as an identification mechanism. A number of
widely used biometric technologies and techniques exist. These techniques can
be deployed to help secure the network. The most common biometric technologies
are fingerprint scanning and voice recognition. Other technologies, such as
face recognition and signature recognition, can also be used in biometric
identification.
Biometric access methods for computer systems are gaining
popularity because of increased focus on security. Numerous commercial products
are already available, and the future will inevitably see all portable devices,
access doors, and so on being biometrically protected. The integration of
biometrics in the security policy will provide a solid foundation for
developing a secure environment.
Fingerprint Scanning
Fingerprint scanning is probably the most
widely used biometric technology. The fingertips of each individual have unique
characteristics. These characteristics vary from the geometry to the pattern
and size of the ridges. Fingerprint scanners can read the fingerprint and
convert it into a digital representation
. Fingerprint
scanners can be small enough to fit on a laptop, keyboard, or mouse. The
digital copy made by the scanner is checked against an authorized copy that is
stored in a secure system so that it can be used as a comparison for
authentication.
Although this technology may seem sophisticated, it has
a few drawbacks. For instance, the system can be cheated because it cannot
determine if a fingerprint was made by a live user or was copied. When deciding
to deploy biometrics in the network, consider commercially available computer
keyboards with integrated fingerprint scanners. These are excellent and
relatively cheap options.
Voice Recognition
Voice recognition,
sometimes referred to as speech analysis, is based on vocal characteristics.
Just as with fingerprints, each individual voice has unique characteristics. A
few instruments and techniques are available. The most common implementation is
a microphone in combination with a speech analysis application. The purpose of
all voice recognition systems is to depict the speech signal in some way and to
capture and store its characteristics on a computer system. Again, these
characteristics are checked against an authorized copy stored on the central
computer system.
Face Recognition
Just as with other recognition techniques, face
recognition uses certain parameters and characteristics to reveal an
individual's identity. The U.S. Department of Defense is involved in the
development of a facial recognition technology program called FERET. Iris and
retina recognition can also be categorized in this segment of biometric
technology.
Signature Recognition
Signature identification
systems analyze individual signatures based on factors such as speed,
acceleration, velocity, pen pressure, and stroke length.
Newer biometric
measurements include techniques for DNA comparisons, which will be refined in
the years to come.