Biometrics and Biometric Data
Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. The most common examples of a biometric recognition system is the iPhone’s fingerprint and facial recognition technology. As an emerging technology, biometric systems can add great convenience by replacing passwords and helping law enforcement catch criminals. Biometric identifiers also act as access control in secure environments, both physical and digital. But the first question you should ask is: Is my biometric data secure from identity theft?
What are biometrics and what is biometric data used for?
Biometrics are a way to measure a person’s physical characteristics to verify their identity. These can include physiological traits, such as fingerprints and eyes, or behavioral characteristics, such as the unique way you’d complete a security-authentication puzzle. To be useful, biometric data must be unique, permanent and collectible. Once measured, the information is compared and matched in a database.
Every time you unlock a smartphone screen with a facial recognition, ask Siri for a weather update, or log in to your online bank account using your fingerprint, you’re using biometrics. You might use the technology every day to authenticate your identity or communicate with a personal device, but there are plenty of other uses for biometrics.
For example, police can collect DNA and fingerprints at crime scenes or may use video surveillance to analyze a suspect’s gait or voice. In medicine, wellness exams might include retinal scans or genetic tests. And when you use a credit card at a cash register, you’ll probably supply a signature, which can be analyzed if the issuer suspects forgery.
Biometric Data Types
Biometric data types vary. Here are six.
- Face recognition. Measures the unique patterns of a person’s face by comparing and analyzing facial contours. It’s used in security and law enforcement but also as a way to authenticate identity and unlock devices like smartphones and laptops.
- Iris recognition. Identifies the unique patterns of a person’s iris, which is the colorful area of the eye surrounding the pupil. Although widely used in security applications, it isn’t typically used in the consumer market.
- Fingerprint scanner. Captures the unique pattern of ridges and valleys on a finger. Many smartphones and some laptops use this technology as a type of password to unlock a screen.
- Voice recognition. Measures the unique sound waves in your voice as you speak to a device. Your bank may use voice recognition to verify your identity when calling about your account, or you’ll use it when giving instructions to a smart speaker like Amazon’s Alexa.
- Hand geometry. Measures and records the length, thickness, width, and surface area of a person’s hand. These devices date back to the 1980s and were typically used in security applications.
- Behavior characteristics. Analyzes the way you interact with a computerized system. Keystrokes, handwriting, the way you walk, how you use a mouse, and other movements can assess who you are or how familiar you are with the information you’re entering.
How Do Biometrics Work?
If you’ve ever put your fingerprint into a device, you have a vague idea of how biometrics work. Basically, you record your biometric information, in this case a fingerprint. The information is then stored, to be accessed later for comparison with “live” information. Anyone else in the world can put their finger on your device’s touch circle and it’s highly unlikely to open your phone.
Fingerprints are just one form of biometrics. One of the emerging forms of biometric technology is eye scanning. Usually the iris is scanned. Handwriting, voiceprints and the geometry of your veins are other biometrics that are uniquely yours and useful for security applications.
Are Biometrics Safe?
There are serious privacy concerns when it comes to biometrics. Some of the major issues identified with biometrics include these:
- Any collection of data could eventually get hacked. High-profile data may be an especially attractive target for hackers. The good news is that high-profile data tends to be secured on a stronger level. However, as biometrics become more common, your biometric information will likely be available in more places which may not employ the same level of secure storage.
- Biometrics may become so commonplace that people become complacent. They might not use the kind of common-sense security measures that they use today because they think that biometrics will solve all of their security problems.
- The data stored in a biometric database may be more vulnerable than any other kind of data. You can change passwords. You can’t change your fingerprint or iris scan. This means that once your biometric data has been compromised, it may no longer be in your control.
- Some pieces of your physical identity can be duplicated. For example, a criminal can take a high-resolution photo of your ear from afar or copy your fingerprints from a glass you leave at a cafe. This information could potentially be used to hack into your devices or accounts.
- Laws governing biometrics are a work in progress, meaning your rights might be different from state to state. However, federal lawmakers may eventually create a cohesive law to address biometric privacy.