• slide-1
  • slide-2
  • slide-3
  • slide-4
  • slide-5

 

Authentication Form Factor

Advantages

Dis-advantages

Fingerprint

A fingerprint is an impression of the friction ridges of all or any part of the finger

 

Very little time is required for enrolment with a fingerprint scanning system
As noted previously, fingerprints are unique identifier specific to the individual
As most people are familiar with the use of fingerprint for identification purposes, it is generally accepted as a technology

Injury, whether temporary or permanent, can interfere with the scanning process
There is nothing to suggest that the same technology that is used to store fingerprint as statistical algorithm cannot also be used or modified to recreate accurate depiction of the print itself
User acceptance, fingerprint scanning crosses the fine line between the impersonal and non-intrusive nature of passwords and PIN

Iris Scan

Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the iris of an individual’s eyes.

It is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane
The fine texture remains remarkably stable over many decades
The iris has a fine texture that – like fingerprint – is during embryonic gestation

Iris scanning is a relatively new technology and is incompatible with the very substantial investment
It is a difficult technology if the distance is larger than a few meters and if the person is not standing still

As with other photographic biometric technologies, iris recognition is susceptible to poor image quality, with associated failure to enrol rates

Voice

A voice biometric is numerical model of sound, pattern and rhythm of an individual’s voice.

Reliable
Easy to use

Offer information delivery options

Produce a detectable audit trail

Difficult to forge

Possible to steal an example of someone’s voice
Expensive method

File storage is difficult; it uses a great deal of storage

Keystroke

Behaviour
KeystrokeID monitors and analyse all keyboard behaviour performed by the user during his/her access

Affordable
Quick identification

No user interference

The user behaviour becomes the identification token

Almost no affect on someone’s privacy

Your type behaviour can never be lost

No distribution management or replacement of tokens

Low FAR and FRR

Impossible to copy by observation

The keyboards of other countries are different (Germany, France)

What's your e-authentication method?

Go to top