12.01.2013 Views

Biometrics - Buro Jansen & Janssen

Biometrics - Buro Jansen & Janssen

Biometrics - Buro Jansen & Janssen

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.3 Security Procedures<br />

<strong>Biometrics</strong> is usually used as a security procedure. This can be classified into enrolment and<br />

authentication [Fleming, S.T., p.120, 2003].<br />

Enrolment<br />

During the enrolment phase, biometrics is obtained and linked to an identity of an<br />

individual. The identity is encoded and can now be stored, retrieved and matched. Some<br />

biometric devices store the data locally within the device itself. Individuals must enrol and<br />

authenticate with the same device. Other biometric systems allow the enrolled biometric<br />

data to be stored in a database that can be accessed from multiple locations. For example<br />

there are various controlled entry points, and there are many devices distributed over a<br />

wide area and many potential users. In this case the device allows retrieving the biometric<br />

data from a database and then performs comparisons. Data can be retrieved by a sensory<br />

device for example a fingerprint scanner, and the distinctive biometric characteristic can be<br />

identified.<br />

Authentication<br />

Authentication is the process of an individual claiming to have a certain identity. New<br />

information is compared to the stored data. Authentication can take place in two different<br />

ways: identification and verification.<br />

Identification<br />

Identification is when an individualʹs biological features are searched within a data set.<br />

This is a one‐to‐many search. For example if fingerprints are found at a crime scene, they<br />

are compared to fingerprints of all known delinquents stored in databases. The system<br />

returns all the closest matches to the individual. Identification is usually performed in a<br />

non‐invasive context.<br />

Verification<br />

Verification occurs when someone claims to have a particular identity, for example to gain<br />

access to a high‐security area. The biometric system compares the newly scanned data to a<br />

previously stored version. Thus the userʹs identity is then validated biometrically. This is a<br />

one‐to‐one search process. A direct comparison between the userʹs features and the data are<br />

matched. With a certain error margin it allows for minor temporal factors or sensor<br />

discrepancies.<br />

As a general rule verification systems are considerably more accurate than identification<br />

systems, primarily because one‐to‐one comparisons are technically simpler than one‐to‐<br />

many.<br />

21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!