Chapter 4. Biometric Technologies

In the previous two chapters, we defined the different types of authentication and discussed the privacy concerns of using biometrics. This chapter deals directly with biometric technology. Biometric technology will be defined in terms of how the user interacts with the technology. Also, what makes a good biometric technology will be explored. Lastly, an understanding of what makes a good biometric for network access will be achieved.

User Interaction with Biometric Technology

Biometrics can be defined by the level of involvement the user needs to provide to be biometrically measured. User involvement with a biometric system falls into two categories:

  1. Passive biometrics

  2. Active biometrics

Passive Biometrics

A passive ...

Get Biometrics for Network Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.