Biometric authentication and identification processes
Contenido
En el proceso de autentificación (o verificación) los rasgos biométricos se comparan solamente con los de un patrón ya guardado, este proceso se conoce también como uno-para-uno ( 1:1 ). Este proceso implica conocer presuntamente la identidad del individuo a autentificar, por lo tanto, dicho individuo ha presentado algún tipo de credencial, que después del proceso de autentificación biométrica será validada o no.
En el proceso de identificación los rasgos biométricos se comparan con los de un conjunto de patrones ya guardados, este proceso se conoce también como uno-para-muchos ( 1:N ). Este proceso implica no conocer la identidad presunta del individuo, la nueva muestra de datos biométricos es tomada del usuario y comparada una a una con los patrones ya existentes en el banco de datos registrados. El resultado de este proceso es la identidad del individuo, mientras que en el proceso de autentificación es un valor verdadero o falso.
El proceso de autentificación o verificación biométrica es más rápido que el de identificación biométrica, sobre todo cuando el número de usuarios (N) es elevado. Esto se debe a que la necesidad de procesamiento y comparaciones es más reducido en el proceso de autentificación. Por esta razón, es habitual usar autentificación cuando se quiere validar la identidad de un individuo desde un sistema con capacidad de procesamiento limitada o se quiere un proceso muy rápido.
Un ejemplo de esto es la aplicación móvil OneID, diseñada para sistemas Single Sign-On, que utiliza la dactiloscopía.[2] Una coalición de empresas de hardware y software denominada Alianza Fido, se dedica al estudio de sistemas biométricos para reemplazar el uso de contraseñas, ya sea con lectores de huellas dactilares, faciales o identificadores de voz. Un ejemplo de su producción es YubiKey, producto de la empresa Yubico.[2].
iris recognition
The iris is a pigmented membrane suspended inside the eye, between the cornea and the lens. Regulates the size of the pupil to control the amount of light entering the eye. It acquires its pigmentation from melanin.
Before iris recognition occurs, the iris is located using landmark features. These landmark features and the distinct shape of the iris allow image digitization, feature isolation, and extraction. Iris localization is an important step in iris recognition because, if done incorrectly, the resulting noise (e.g., eyelashes, reflections, pupils, and eyelids) in the image can lead to poor performance.
Because infrared has insufficient energy to cause photochemical effects, the primary potential mode of damage is thermal. When NIR is produced using light-emitting diodes, the resulting light is incoherent. Any risk to eye safety is remote with a single LED source using today's LED technology. Multiple LED illuminators can, however, cause eye damage if not carefully designed and used.
2D and 3D facial recognition
The person's face is a physical characteristic that allows the identification of the person in a unique and stable way. There are devices that capture the 2D pattern (plane projection) and devices that capture the 3D pattern (volumetric description of the face).
The disadvantage of 2D equipment is that the system does not distinguish whether what it is capturing is really a face or a photograph of a face, so they do not offer a sufficient level of security in most access control applications.
Equipment with 3D facial biometric technology includes infrared technology combined with 3D, thus disabling the use of masks or photographs to falsify the face. Thanks to this, 3D facial biometrics allows contactless identification very quickly and safely, because it is possible to build a 3D pattern of the face of the identified person.
Therefore, 3D equipment offers much higher security since it requires a real face (not a photograph) to identify the user. For this reason, in access control and presence control applications it is advisable to use 3D facial recognition equipment.
Another important characteristic of facial recognition systems is the ability to identify the person without contact (normally on the order of tens of centimeters), making these systems much less intrusive than those based on fingerprint, iris or vascular biometrics. Apart from being less intrusive, this remote identification capacity makes them very well accepted for access control or presence control applications in environments where direct contact of the user with the terminal may represent problems (either for hygiene reasons or because users wear gloves).
Vascular recognition
In vascular biometry, the biometric pattern is extracted from the geometry of the finger vein tree. Unlike a fingerprint, the biometric pattern is internal, for this reason it does not leave a trace and can only be obtained in the presence of the person. Identity theft is therefore very difficult.
Due to these characteristics, it is especially suitable for high security environments, as well as in harsh environments, where the surface of the finger (and therefore the surface print) may be in poor condition, eroded or not very clean.
heart rate
Cryptographers at the University of Toronto developed a bracelet that, through the use of a voltmeter, detects heartbeats and uses the electrocardiogram as a biometric identification method. The bracelet can be used to remotely activate different devices that require identity verification, although it is still in the development phase. For scientist Karl Martin it is an effective method, because, unlike passwords, heart rate "cannot be broken."[2].