Biometrics is a set of methods related to unique identification of people based on physiological or behavioural traits
Questions tagged [biometrics]
136 questions
1
vote
2 answers
Remote Biometric Authentication using mobile phones
As Google endeavours to do away with passwords, biometrics authentication as a method of proving identity has gained popularity. Logging into a system using a fingerprint or other biometric data would be something that is very difficult to steal.…
![](../../users/profiles/116113.webp)
BitsInForce
- 305
- 1
- 10
1
vote
0 answers
How are FIDO and NSA (Natural Security Alliance) different in biometric security?
Fido Alliance and Natural Security Alliance both work on certifications of biometric authentication. How are those different / complementary? What are their targets for making business for themselves? Which one is better choice?
0
votes
1 answer
Is biometric security viable in the long term?
Obviously biometric security is a hot-button topic. I happen to attend a university with a well known biometrics department. (Which I'm not a part of.)
My problem is, biometrics has a large caveat: it can't be changed.
Once my fingerprint has been…
![](../../users/profiles/35492.webp)
Ramrod
- 206
- 1
- 5
0
votes
1 answer
Mobile authentication
I'm currently working on an Android app in which I want to authenticate someone against an REST API. I want to do this as secure as is (cost-)effective/possible/userfriendly.
I've been looking around and found that 2FA (two factor authentication)…
![](../../users/profiles/49805.webp)
Orion
- 101
0
votes
0 answers
Determining the efficiency of a biometric system
How can find the efficiency of any biometric system is there an equation to find it?
How is the efficiency of a biometric security system?
![](../../users/profiles/46269.webp)
nuha
- 21
- 1
- 3
0
votes
1 answer
Performance of biometric authentication on cell phones as of 2014?
How well do the various biometric authentication methods currently perform in regards to precision and recall? Can anyone cite a relevant research article?
![](../../users/profiles/36770.webp)
Emre
- 113
- 4
0
votes
1 answer
How to calculate combined false acceptance/rejection rates of multiple biometrics authentication systems?
I am a taking a network security class at grad school, and I need a little help with my assignment question. I am trying to think this through, and just want to know whether my approach is right or wrong.
Question:
To deal with false acceptance…
![](../../users/profiles/15233.webp)
Saad Rehman Shah
- 111
- 1
- 5
0
votes
0 answers
Solutions for out of band biometric login
I am enhancing our login flow to include biometric verification via your phone. The user will log in to the desktop app but will have to verify their identity via their phone. We already have an app and want to now accept login verification…
![](../../users/profiles/281200.webp)
Decrypter
- 101
- 2
0
votes
0 answers
Are fingerprints stored in biometric checks?
There is a digital banking app for increasing wallet limits. We can verify our fingerprint with this feature.
My question is, is it safe to use? I mean are they going to store my fingerprint and then perform some verification?
![](../../users/profiles/279849.webp)
MoxSk
- 1
0
votes
1 answer
Voice input as security measures for system authentication
Can voice input as a password be a useful security measure as an alternative to a strong password and biometrics (face, thumb, signature etc)?
The voice inputted as a password will be saved as a sound wave file in the system and while the…
![](../../users/profiles/276705.webp)
Prashant Akerkar
- 111
- 3
0
votes
0 answers
Remotely disable a laptop's ability to power on or charge?
If I loan out laptops to my employees to work remotely, such as Dr's, Nurses and other healthcare workers that generate sensitive information on patients, how can I remotely disable the laptop's ability to power on/charge?
Are there any motherboard…
![](../../users/profiles/41148.webp)
Definity
- 109
- 1
0
votes
0 answers
What are the differences between ISO 19794-2 and ANSI 378 fingerprint template?
I am looking for the differences between the ISO 19794-2 and ANSI 378 fingerprint templates.
If there are differences, for what types of applications are each of these standards most suitable?
![](../../users/profiles/274017.webp)
Martin Denion
- 101
- 1
0
votes
0 answers
OpenId with Biometrics - should I write a custom login + OIDC
We are trying to arrive at a solution for an enterprise app
Different Users have different Authentication Methods
User Type 1 - Password + Captcha
User type 2 - Biometric [Not device-based] + Password
User type 3 - Biometric [Device-based, ex on…
0
votes
0 answers
How can one avoid being identified by facial recognition in a public setting?
Facial recognition is ubiquitous and methods like disguises, surgical masks and makeup are becoming ineffective owing to the improvement in algorithms.
In light of these advances, what are some countermeasures to avoid being identified in a public…
![](../../users/profiles/267363.webp)
CSLewis
- 1
- 1
0
votes
0 answers
How reliable is a mathematical model of a human fingerprint for identification?
How reliable is a mathematical model of a human fingerprint for identification?
I am looking for a way to uniquely identify individuals that is very reliable and easy to use that does not require storing actual biometric data. Storing the actual…
![](../../users/profiles/257541.webp)
polcott
- 93
- 6