Biometrics authentication and identification
Biometrics allows a person to be identified and authenticated based on recognizable and verifiable data, which are unique and specific to them.
Biometric authentication compares data for the person's characteristics to that person's biometric "template" to determine resemblance.
- The reference model is first stored.
- The data stored is then compared to the person's biometric data to be authenticated.
In this mode, the question is: "Are you indeed, Mr or Mrs. X?"
Biometric identification consists of determining the identity of a person.
- The aim is to capture an item of biometric data from this person. It can be a photo of their face, a record of their voice, or an image of their fingerprint.
- This data is then compared to the biometric data of several other persons kept in a database.
In this mode, the question is a simple one: "Who are you?"
To know more about our
Faced with document fraud and identity theft, terrorism and cybercrime, international regulation changes, new biometric security solutions are being implemented.
Of course, increased public acceptance, massive accuracy gains, a rich offer, and falling prices of sensors, IP cameras, and software make it all the easier to install biometric systems.
Today, many applications make use of this technology.
What is biometrics? Definition and examples
Biometrics is the science of analyzing physical or behavioral characteristics specific to each individual to authenticate their identity.
There are two categories of biometrics:
They can be either morphological or biological.
- Morphological identifiers mainly consist of fingerprints, hand's shape, of the finger, vein pattern, the eye (iris and retina), and the shape of the face for morphological analyses.
- For biological analyses, DNA, blood, saliva, or urine may be used by medical teams and police forensics.