Biometrics authentication

The aim of Biometrics is to protect individuals and organizations from intrusion by unauthorized personnel.

Biometrics authentication
View of biometrics-authentication Gate Pass with figure print signals.

BIOMETRIC AUTHENTICATION
This is a security measure which involves the identification of a person's biological characteristics which are unique so as to verify who the person is.

READ ALSO: How to Create Android Horizontal Scrolling RecyclerView

The aim of Biometrics is to protect individuals and organizations from intrusion by unauthorized personnel.
Types of Biometrics.
There are two classifications of biometrics which can either be Behavioral or Physiological Biometrics.
1. Behavioral Biometrics.
a. Signature recognition.
Electronic signature detection systems have been implemented in many organizations and institutions for example in Banks to enable secure transactions. This helps in identifying account owners before transactions take place as a means of enhancing accounts security.

READ ALSO: Advantages and disadvantages of V-Model

b. Keystroke Dynamics 
This type of biometrics measures the typing pattern of an individual for security reasons. Systems developed to use keystroke Dynamics detect any small change in the typing pattern of a user to reduce invasion by Intruders.
c. Voice recognition
Systems developed for voice recognition purposes record users voice patterns, pitch and hence minimize security issues through voice such as suspected fraudulent activities through phone call.
Physiological Biometrics 
Physical characteristics of individuals such as eyes, ears and fingerprints are used in these type of biometrics.

READ ALSO: Android String-Array Resource for all Counties in Kenya

a. Fingerprint verification
Each individual has a unique fingerprint pattern that does not match that of any other person and hence nowadays many systems or gadgets that are being developed are using this type of biometrics.  Technology has evolved and such biometrics is used to unlock phones nowadays such that one has to first identity using fingerprint to gain access to phone data or to unlock phone. This type of  biometrics is convenient since it minimizes access of data in gadgets or systems by Intruders.
b. Retina recognition.
It records the retina pattern of each individual and hence provides security to access of users data in areas where the retina recognition system is installed. Banks and other financial institutions use this system for authentication of users before they are granted access to data or information.

READ ALSO: SOFTWARE DEVELOPMENT LIFE CYCLE MODELS

c. Face recognition.
Most of these systems use cameras to detect faces of users mostly in gadgets before they are granted access to data so as to enhance security.
d.  Ear authentication .
Human ear canal is considered unique for all individuals and hence systems are developed to use these type of biometrics to distinguish people.
e. D.N.A matching.
Forensic techniques have enabled the use of this type of biometrics to differentiate people. It uses individuals saliva, hair or blood for forensic test in the lab and the results therefore differentiate people.

READ ALSO: Database Management System