Biometric security technology: The safest types

Biometric Technology

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • voiceprint

    A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual. 

  • voice ID (voice authentication)

    Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each indiv... 

  • Penetrating a biometric security system

    In this Ask the Expert Q&A, our identity and access management expert takes a closer look at the strengths and weaknesses of a biometric security system. 

  • Hacking smart cards and biometric security systems

    In this Ask the Expert Q&A, our identity and access management guru explains how biometrics and smart cards can be fooled. 

  • Spy vs. Spy

    Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. 

  • fingernail storage

    Fingernail storage is a method of writing data onto a human fingernail using a pulsed laser. The fluorescence of the nail, when exposed to ultraviolet (UV) light, is increased at points where data is written. Data can be read from the fingernail usin... 

  • Checklist for meeting the PCI Data Security Standard

    Contributor Diana Kelley summarizes the best ways to meet the PCI Data Security Standard. 

  • The here and now of biometrics

    Biometrics are increasingly being used to keep the data center safe. And now, the systems are also more affordable, and reliability rates have improved over just a few years ago. 

  • Taking a swipe at two-factor authentication

    Cryptographer Bruce Schneier claims combining passwords with another form of authentication won't stop ID theft or phish scams. Is it really as bad as he says? 

  • Will 2005 measure up as the year of business biometrics?

    Enterprises looking to biometrics for more than just security may be pleasantly surprised if they take the time to investigate what the technology can offer.