Menu
Click here for instant contact with one of the 19 people who know about this topic
The use of biometrics

The use of biometrics

Biometrics are the unique physical characteristics of a person that can be recognized by software. For example, by using fingerprint or facial recognition scanners.

Research by Lastpass shows that, on average, a consumer uses more than 25 applications that require a password. Usually, less than 13 different passwords are used.

For business users, this number can rise to more than 200 passwords. On average, no more than 40 different passwords are used. 61% of the respondents even use one password or a variation of 1 password for all their business applications.

As a result, the security of the applications and personal data is low. Biometrics is changing this because security based on specific personal characteristics is virtually impossible to crack.

Biometrics as an alternative to password identification

Biometrics is currently the best alternative to password identification because you don't have to remember anything, and biometrics are 100% person-specific.

Software can identify individuals based on the following biometrics:

1. Finger- and handprint identification

Everyone has a unique finger and handprint. Fingerprint scanners are cheap and are therefore regularly used in smartphones, laptops, door locks, and at many passport controls.

2. Face and iris identification

Everyone has a unique face and a unique iris. Cameras can recognize the unique characteristics of a face or iris. To scan the iris, the person must be close to a camera. Face recognition is also possible from a great distance. Face recognition is used at many airports to detect wanted criminals.

3. Behavior identification

How you walk and move is unique for everyone. Software can deduce from this not only who you are, but also whether you show abnormal behavior such as nervousness. Scanners do need a lot of footage to recognize specific behaviors. That is why this technique is not yet widely used.

4. Speech identification

Speech recognition software can recognize individuals by how they speak. It doesn't matter if you speak loud or soft or in another language. This relatively affordable application is often used in combination with a fingerprint or hand scanner.

5. Handwriting identification

Handwriting recognition is already widely used within banks and by courier services. Usually, this only applies to a signature. Because handwriting and especially signatures can change over the years, this technique is rarely used as a primary security measure.

6. DNA identification

The DNA of an individual is unique, but it is costly and time-consuming to compare DNA. Besides, the individual has to give DNA through, for example, a saliva test. DNA recognition is only applied on a small scale. Usually, this involves a crime.

Useful applications of biometrics

Biometrics is used for more applications than just identifying individuals. Examples of biometric applications are:

  • The creation of a shelf plan Cameras can record the walking route taken and the viewing behavior of consumers in a shop. As a result, the shops know what are known as hotspots and what are possible blind spots in the shop. This information can be used to create an optimal shelf plan that influences consumers' purchasing behavior positively.

  • Navigation optimization Software such as Hotjar maps the way you navigate in sites, software, or an app. As a result, developers and marketers know which buttons and which communication are or are not noticed. It enables them to simplify the navigation or to bring a message to the attention of the user.

  • Optimisation of equipment
    Smartphone developers keep track of how often, where, and how you use your Smartphone. This way, they know if a particular model is used more or less by travelers or business people, and they can adjust the successor of this model accordingly. They also know which pre-installed applications are more and less popular. It enables them to respond even better to the wishes of the target group in the future.

  • Customer recognition Customer recognition is still not very often used but is becoming more and more popular. A customer who enters a bank or shop can be recognized based on his behavior or face. The employee receives the personal information on a screen and can thus serve the customer faster and better.

Privacy and biometrics

In the film Mission: Impossible - Rogue Nation, made in 2015, actor Tom Cruise is unfairly chased by the police who recognize him everywhere on the street by his unique iris. He has to undergo an illegal eye transplant to change his identity.

Many people are afraid that person identification by biometrics will head in this direction in the near future. Everything you do in this scenario is stored in a central database, and if the government would want to do harm, it could be abused.

People who believe this scenario are not all equally anxious. If everything is known to everyone, the criminality will decrease as well. As long as you don't do anything illegal, there is nothing wrong, and if you do, the chance of getting caught is 100%.

Smartphones and privacy

It has been known for years that the NSA can wiretap your Smartphone. Even when your mobile is switched off, the NSA can remotely activate your microphone and camera without you noticing. It became a big scandal when it turned out that the NSA was tapping prominent politicians such as German Chancellor Merkel.

More and more stories are appearing in the media in which it seems that agencies or smartphone producers store information of consumers without their knowledge. Usually, this even violates local and international law.

Biometric data and identification fraud

Even though biometric identification is currently not very difficult to crack, this does not mean that it will always remain so. When all the information of an individual is known, it becomes easier to find ways to circumvent this form of security.

By using the increasingly realistic 3D animations and audio and video manipulation, an individual can easily be imitated. As a result of this identification fraud, biometric identification will suddenly no longer be as secure as one now thinks.

  • Optimierung der Ausrüstung
    Smartphone-Entwickler behalten den Überblick, wie oft, wo und wie du dein Smartphone benutzt. Auf diese Weise wissen sie, ob ein bestimmtes Modell mehr oder weniger von Reisenden oder Geschäftsleuten genutzt wird, und können den Nachfolger dieses Modells entsprechend anpassen. Sie wissen auch, welche vorinstallierten Anwendungen mehr oder weniger beliebt sind. So können sie in Zukunft noch besser auf die Wünsche der Zielgruppe eingehen.

  • Anerkennung der Kunden Die Anerkennung durch die Kunden wird immer noch nicht sehr oft genutzt, aber sie wird immer beliebter. Ein Kunde, der eine Bank oder ein Geschäft betritt, kann anhand seines Verhaltens oder seines Gesichts erkannt werden. Der Mitarbeiter erhält die persönlichen Informationen auf einem Bildschirm und kann so den Kunden schneller und besser bedienen.

Datenschutz und Biometrie

In dem Film Mission: Impossible - Rogue Nation, entstanden 2015, wird der Schauspieler Tom Cruise zu Unrecht von der Polizei verfolgt, die ihn überall auf der Straße an seiner einzigartigen Iris erkennt. Er muss sich einer illegalen Augentransplantation unterziehen, um seine Identität zu ändern.

Viele Menschen befürchten, dass die Identifizierung von Personen durch Biometrie in naher Zukunft in diese Richtung geht. Alles, was du in diesem Szenario tust, wird in einer zentralen Datenbank gespeichert, und wenn die Regierung Schaden anrichten will, könnte es missbraucht werden.

Die Menschen, die dieses Szenario glauben, sind nicht alle gleich ängstlich. Wenn allen alles bekannt ist, wird auch die Kriminalität abnehmen. Solange man nichts Illegales tut, ist nichts falsch, und wenn man es tut, ist die Chance, erwischt zu werden, 100%ig.

Smartphones und Datenschutz

Es ist seit Jahren bekannt, dass die NSA dein Smartphone abhören kann. Selbst wenn dein Handy ausgeschaltet ist, kann die NSA dein Mikrofon und deine Kamera ferngesteuert aktivieren, ohne dass du es merkst. Es wurde zu einem großen Skandal, als sich herausstellte, dass die NSA prominente Politiker wie die deutsche Bundeskanzlerin Merkel abhörte.

In den Medien tauchen immer mehr Geschichten auf, in denen es scheint, dass Agenturen oder Smartphone-Hersteller Informationen von Verbrauchern ohne deren Wissen speichern. In der Regel verstößt dies sogar gegen lokales und internationales Recht.

Biometrische Daten und Identifikationsbetrug

Auch wenn die biometrische Identifizierung derzeit nicht sehr schwer zu knacken ist, bedeutet dies nicht, dass sie immer so bleiben wird. Wenn alle Informationen einer Person bekannt sind, wird es einfacher, Wege zu finden, diese Form der Sicherheit zu umgehen.

Durch die Verwendung der immer realistischeren 3D-Animationen und der Audio- und Videomanipulation kann eine Person leicht imitiert werden. Als Folge dieses Identifikationsbetrugs wird die biometrische Identifikation plötzlich nicht mehr so sicher sein, wie man heute denkt.

Share this article

Related articles

Show more
Instant contact with The use of biometrics
Csaba Magyar
Csaba Magyar
Free
(9)
Full stack web dev
I'm the ONE who helps making a software stable
Jose Wiesner
Jose Wiesner
€ 2,50 pm
(4)
Digital marketing
I'm the ONE with a long experience of life.
Richard Sullivan
Richard Sullivan
€ 0,42 pm
IT Freelancer
I'm the ONE Friendly computer expert for individuals and businesses.
Harrie van der Lubbe
Harrie van der Lubbe
Free
(18)
Creative Developer
I'm the ONE that might be able to help you if you have difficult technical questions
Kobby M
Kobby M
€ 0,83 pm
IT monteur
I'm the ONE #windows macOs
Chirantha Peramunage
Chirantha Peramunage
€ 0,25 pm
IT Engineer
I'm the ONE to give you career guidance help, IT what nots and even cooking tips
Takalani TK Mushungwa
Takalani TK Mushungwa
€ 0,18 pm
Studying engineering
I'm the ONE I'm the one who can teach you math, forex trading and bodyweight training
Dardan Alija
Dardan Alija
€ 0,17 pm
student
I'm the ONE I am a software engineer , I study at Canadian Institute of Technology.
Becky Holton
Becky Holton
€ 0,05 pm
Blogger
I'm the ONE i'm the one of CallTheOne writers.
Jose Manuel Rodriguez Padrino
Jose Manuel Rodriguez Padrino
€ 0,24 pm
Me encanta WordPress
I'm the ONE I'm a web programmer specialized on WordPress, and I'm here to help you!
Ninoska  Arévalo Gutiérrez
Ninoska Arévalo Gutiérrez
€ 0,16 pm
Estudiar y meditar
I'm the ONE Soy la indicada para dar las mejores técnicas en mercadeo tradicional y digital.
Jose Tapia
Jose Tapia
€ 0,16 pm
Software Engineer
I'm the ONE I'm into IT area since I remember
Brian Viquez
Brian Viquez
€ 0,30 pm
I'm the ONE Pongo mis conocimientos a tu disposición. Estoy par servirte.
Dexter Mackie
Dexter Mackie
€ 0,19 pm
I'm the ONE I'm the ONE to talk to for help with any odd task in your everyday life.
Khaoula KARAM
Khaoula KARAM
€ 0,08 pm
Tim Mishutin
Tim Mishutin
€ 0,83 pm
Carlos Suarez
€ 0,15 pm
To learn and teach
I'm the ONE I'm the one who loves to help and teach. I have more than 30 years learning.
Ephraim Nkhoma
€ 0,05 pm
I'm the ONE I'm the ONE because I give my all when helping anyone with anything they need.
Raúl Jiménez
€ 0,58 pm
I'm the ONE Programming php and cloud applications.