Specific Individual identification

So, biometric identification involves determining the identity of a specific person by comparing an individual presented (or scanned) biometric signature with that which is already cataloged in the solutions database and making a decision: does it or doesn't it match? This can be seen in the following diagram:

A biometric signature can be an item obtained from the individual such as the following:

  • A photo of their face
  • A record of their voice
  • An image of their fingerprint

Keep in mind that biometric data is a general term used to refer to any data that is created during a biometric scanning process.

In addition to the previously mentioned, this biometric data may also include any samples, models, fingerprints, similarity scores, and all verification or identification data including the individual's name and demographics.

Also included in the individual’s signature can be palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina, and odor/scent. Further, behavioral characteristics that are related to the pattern of behavior of an individual (for example, his or her a gait or typing rhythm) may also be part of the biometric database.

It should also be of note that, since biometric data is digital in format, it can be efficiently processed by computer systems and easily encrypted as a safeguard against unethical manipulation and use by unauthorized persons.

Another point is the submission of a single set of biometric samples to a biometric system for identification or verification is referred to as an attempt. For obvious reasons, solutions typically allow only a single attempt to identify or verify an individual. Attempts made by individuals who do not have a cataloged biometric signature previously scanned and cataloged within the solutions database will fail authentication. This is significant since it reduces the amount of data needing to be scanned and cataloged for the solution to work: you only need to establish digital signatures for those individuals that do need to be authenticated and granted access.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset