![]() ![]() The biometric system can then search its database to find a logon name associated with the users and their biometric identities. Or they can simply submit their biometric identifier. The users can enter their logon name for identification and use the biometric device for verification. In terms of authentication factor, biometric authentication is considered “something you are.”īiometrics can be used for identification or verification. ![]() For example, you may have a biometric software application that's based on user keystrokes. Biometrics based on behavior traits often come in software form. Biometrics based on human physical traits generally come in the form of hardware devices like fingerprint readers, iris readers, and palm readers. Derrick Rountree, in Security for Microsoft Windows System Administrators, 2011 Biometricsīiometric devices are authentication devices based on human physical or behavioral traits.
0 Comments
Leave a Reply. |