Authentication Technologies
Biometrics

Biometrics is the science of measuring a unique physical characteristic about an individual as an identification mechanism. A number of widely used biometric technologies and techniques exist. These techniques can be deployed to help secure the network. The most common biometric technologies are fingerprint scanning and voice recognition. Other technologies, such as face recognition and signature recognition, can also be used in biometric identification.

Biometric access methods for computer systems are gaining popularity because of increased focus on security. Numerous commercial products are already available, and the future will inevitably see all portable devices, access doors, and so on being biometrically protected. The integration of biometrics in the security policy will provide a solid foundation for developing a secure environment.

Fingerprint Scanning
Fingerprint scanning is probably the most widely used biometric technology. The fingertips of each individual have unique characteristics. These characteristics vary from the geometry to the pattern and size of the ridges. Fingerprint scanners can read the fingerprint and convert it into a digital representation . Fingerprint scanners can be small enough to fit on a laptop, keyboard, or mouse. The digital copy made by the scanner is checked against an authorized copy that is stored in a secure system so that it can be used as a comparison for authentication.

Although this technology may seem sophisticated, it has a few drawbacks. For instance, the system can be cheated because it cannot determine if a fingerprint was made by a live user or was copied. When deciding to deploy biometrics in the network, consider commercially available computer keyboards with integrated fingerprint scanners. These are excellent and relatively cheap options.

Voice Recognition
Voice recognition, sometimes referred to as speech analysis, is based on vocal characteristics. Just as with fingerprints, each individual voice has unique characteristics. A few instruments and techniques are available. The most common implementation is a microphone in combination with a speech analysis application. The purpose of all voice recognition systems is to depict the speech signal in some way and to capture and store its characteristics on a computer system. Again, these characteristics are checked against an authorized copy stored on the central computer system.

Face Recognition
Just as with other recognition techniques, face recognition uses certain parameters and characteristics to reveal an individual's identity. The U.S. Department of Defense is involved in the development of a facial recognition technology program called FERET. Iris and retina recognition can also be categorized in this segment of biometric technology.

Signature Recognition
Signature identification systems analyze individual signatures based on factors such as speed, acceleration, velocity, pen pressure, and stroke length.

Newer biometric measurements include techniques for DNA comparisons, which will be refined in the years to come.