Some systems today use keystroke dynamics to recognize an individual’s unique typing pattern to authenticate the user as he or she types in his or her username and password; other systems identify an individual via his or her voice, signature or gait.
The system matches the supplied biometric data with the biometric data that was stored in the database when individuals was enrolled in the systems and authenticates the individuals if the data matches.
To speed up the process, many biometric access systems require users to identify themselves first such as entering a username or swiping a smart card.
Biometrics offers a secure means of limiting access to sensitive facilities and computer and networking assets. Biometric access systems are used to control access to secure facilities such as corporate headquarters and prisons; to log users on the computers, networks and secure Web sites; to punch employees in and out work; and to confirm consumers’ identities at ATM machines and check-cashing services.
This biometric is preferred over traditional methods for primary two reasons:
*The person to be identified is required to be physically present at the point of identification.
*Identification based on biometric techniques obviates the need to remember a password or carry a token.
Biometric access systems