Biometrics includes a variety of approaches for safeguarding identity-based on physical or behavioral traits. Some of the typical biometric approaches include:
• Face topology
• Iris structure
• Hand geometry
• Vein structure
• Keystroke recognition.
In recent years, biometric security has seen a sharp growth; largely due to the fact that many mobile users have become comfortable using tools such as fingerprint identification for access. For example, the touch ID biometric is present on Apple’s iPhone 5s and generations following, along with the newer iPads.
Biometrics offers several advantages over identification cards, passwords and PINs’ the most significant advantages are the requirement that the person being identified is physically present and the elimination of the need to remember codes or passwords. Currently, fingerprint authentication is the most common used via mobile. One report forecasts that rising demand for smartphones, tablets and wearable mobile devices that incorporate biometrics will drive a global market of 2.5 billion users with nearly 4.8 billion biometric devices by 2020. Most significantly, it is forecasted that within three years, biometrics will become a standard feature on smartphones as well as other mobile devices.
In the future, biometrics can potentially be even more secure by including keystroke dynamics. Keystroke dynamics are a biometric approach that utilizes both physical and behavioral traits by measuring each person’s keystroke dwell time and flight time. This is an attractive approach because it is very accurate and yet not very intrusive for a user, which are the two biggest challenges with using biometrics.
Due the requirement of the users physical presence, biometrics is an effective way to prove the true identity of the individual user. Yet, the biggest advantage of biometrics is also the biggest drawback. Biometrics collects and stores data, but not just any data. It collects the data about the person that makes them unique. Many people find this intrusive, violating and do not what their unique data stored. With the growth of biometrics, at what point does security become so personalized that option of privacy is potentially compromised to ensure protection? Is the future foundation of security reliant upon consumers’ submission to biometrics?