Chapter 5: Types of Biometrics
Retina scan
Analyze blood-vessel pattern of the rear portion of the eyeball area. Using a low-level light source & camera. Accurate but susceptible to changes. Some feel they are intrusive & unsanitary.
Voice pattern
Audio recordings & other sensors capture as many as 7 parameters of nasal tones, larynx & throat vibrations, & air pressure from the voice. Isn't accurate, voices can be easily replicated by computer software. Response time 1-4 seconds.
Privacy issues
Biometrics collects information intrinsic to people. Must submit an examination, must be digitally recorded & stored. Unauthorized access imminent. Recorded & replayed ID data might allow a person to pretend to be someone else- risk of identity theft.
Hand geometry
Camera takes a picture of the palm, 45-degree mirror, the side of the hand. Length, width, thickness, & contour of the fingers. Response time 1-3 seconds
Authentication by action
Newest authentication method. Set aside as a separate authentication category. Called 'something you do'. Stores patterns or nuances of how you do something. Record typing patterns.
Fingerprint
Pattern of ridges & valleys on the tip of a finger
Advantages of biometrics
Person must be physically present to authenticate; nothing to remember; hard to fake; lost IDs or forgotten passwords are not problems.
Disadvantages of biometrics
Physical characteristics might change; physically disabled users might have difficulty; not all technologies are not equally effective; response time too slow; expensive; require time to authenticate
Authentication by location
Physical location strong indicator of authenticity. Separate locations may raise enough suspicion to deny the necessary access to funds. Should only be used in multifactor authentication.
Palm print
Physical structure of the palm. Reaction time is 5-7 seconds.
Signature dynamics
Sensors in a pen, stylus, or writing tablet are used to record pen-stroke speed, direction, & pressure. Accurate & users accept them.
Iris scan
Small video recorder record unique patterns on the iris, caused by striations, pits, freckles, rifts, fibers, etc. continuous monitoring to prevent session hijacking. Response time 1-2 seconds.
Keystroke dynamics
User types a selected phrase onto reference template. Measure each keystroke's dwell time & flight time. Very accurate, two-factor authentication.
Facial recognition
Video cameras measure certain features of the face, such as distance between eyes, shape of chin & jaw, length & width of nose, shape of cheekbones & eye sockets. Not as accurate in a moving crowd. Passive & nonintrusive.