{"id":190,"date":"2017-03-25T10:31:25","date_gmt":"2017-03-25T10:31:25","guid":{"rendered":"https:\/\/blog.bham.ac.uk\/itinnovation\/?p=190"},"modified":"2018-05-25T10:36:33","modified_gmt":"2018-05-25T09:36:33","slug":"biometric-authentication-overview","status":"publish","type":"post","link":"https:\/\/blog.bham.ac.uk\/itinnovation\/2017\/03\/25\/biometric-authentication-overview\/","title":{"rendered":"Biometric Authentication Overview"},"content":{"rendered":"<p>From the casual users of the home computer to the business, corporations and government, there is a great concern\u00a0about the security of files, systems, and the ability of technology to protect us from unauthorised access. Computer\u00a0software companies have put a great effort to meet the demand for better security of sensitive, confidential, and\u00a0classified information. This is where the biometric technology is getting widely adopted. In recent years there has\u00a0been considerable growth in interest in the use of biometric systems for personal authentication. By using biometrics,\u00a0authentication is directly linked to the person, rather than their token or password.<br \/>\nBiometric authentication is any process that validates the identity of a user who wishes to sign into a system by measuring some intrinsic characteristic of that user. Biometric samples include fingerprints, retinal scans, face<br \/>\nrecognition, voice prints and even typing patterns. In this article, we will discuss the concept of biometric\u00a0authentication, the different types of biometric authentication, compare their pros and cons and the technology<br \/>\ncurrent maturity level. Finally, we will conclude our paper with findings and recommendations on how biometric\u00a0authentication could be used in the university.<\/p>\n<p><a href=\"https:\/\/intranet.birmingham.ac.uk\/it\/innovation\/documents\/public\/Experiments\/Biometric-Authentication-Overview.pdf\" target=\"_blank\" rel=\"noopener\">Read full article\u00a0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the casual users of the home computer to the business, corporations and government, there is a great concern\u00a0about the security of files, systems, and the ability of technology to protect us from unauthorised access. Computer\u00a0software companies have put a great effort to meet the demand for better security of sensitive, confidential, and\u00a0classified information. This &hellip; <a href=\"https:\/\/blog.bham.ac.uk\/itinnovation\/2017\/03\/25\/biometric-authentication-overview\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Biometric Authentication Overview&#8221;<\/span><\/a><\/p>\n","protected":false},"author":96,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,6],"tags":[],"class_list":["post-190","post","type-post","status-publish","format-standard","hentry","category-biometric-authentication","category-projects"],"_links":{"self":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts\/190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/comments?post=190"}],"version-history":[{"count":2,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts\/190\/revisions"}],"predecessor-version":[{"id":192,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/posts\/190\/revisions\/192"}],"wp:attachment":[{"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/media?parent=190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/categories?post=190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itinnovation\/wp-json\/wp\/v2\/tags?post=190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}