O'Reilly logo

Biometrics for Network Security by Paul Reid

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Biometric Technologies

In the previous two chapters, we defined the different types of authentication and discussed the privacy concerns of using biometrics. This chapter deals directly with biometric technology. Biometric technology will be defined in terms of how the user interacts with the technology. Also, what makes a good biometric technology will be explored. Lastly, an understanding of what makes a good biometric for network access will be achieved.

User Interaction with Biometric Technology

Biometrics can be defined by the level of involvement the user needs to provide to be biometrically measured. User involvement with a biometric system falls into two categories:

  1. Passive biometrics

  2. Active biometrics

Passive Biometrics

A passive ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required