Almost every day we touch upon the topic of data security, consider all possible projects, each of which offers us its own unique protection system. However, we have never touched upon the topic of biometric identification and further authentication of the user to this or that data. It turns out that this verification system is used by about 62% of companies around the world. And by 2020, this figure could reach 86%.
It’s hard to believe, but now biometric identification and authentication are used in almost all areas of our lives. It can be banking and healthcare, police, commercial organizations, government, smartphones, smart home systems, and even many applications request this kind of data. This has become very popular as security has become a cult of our time.
Problems
However, not all methods of authentication and biometric identification are as good as it may seem at first glance. But so you can see for yourself, I suggest to consider the most popular methods of identification and authentication:
The first and probably the easiest to use authentication method is login and password. Unfortunately, at the moment it is considered to be one of the most inefficient ways of protection, because there is a high probability of losing this data or stealing it. At the same time, you are required to enter all your logins and passwords manually each time;
the second method is an authentication device that generates an access code for further data entry. This method is also quite simple and is not protected from further theft or possible losses;
in the third place of the comparative characteristics is — fingerprint. Here, the reliability of the data is at a higher level, as there is a high accuracy of biometric data. However, this method is also subject to any damage or even further loss. What’s more, it can be easily copied and replaced;
the fourth method is based on human DNA data. Undoubtedly, this kind of authentication has high accuracy and reliability. However, this is a very expensive procedure for both data entry and analysis;
the fifth method involves voice recognition of the user. And as practice shows, this method is also a little effective and almost unsafe, because it is subject to easy substitution of biometric data;
in sixth place is the method of recognition of the iris. It would seem that the method itself has the highest accuracy of authentication, while it is also not perfect and is subject to all kinds of substitutions.
(Image not shown due to low ratings)
Source
Plagiarism is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam.
Spam is discouraged by the community, and may result in action from the cheetah bot.
More information and tips on sharing content.
If you believe this comment is in error, please contact us in #disputes on Discord
Congratulations @lissabrak! You received a personal award!
You can view your badges on your Steem Board and compare to others on the Steem Ranking
Do not miss the last post from @steemitboard:
Vote for @Steemitboard as a witness to get one more award and increased upvotes!