Giesecke & Devrient GmbH BIOTOKEN Manual De Usuario

Descargar
Página de 38
Basics
General Introduction to Biometrics
4 of 33
Reference Manual StarSign® Bio Token 3.0/Edition 07.2005
ID No. 
30016576
1.1
General Introduction to Biometrics
Scope
Biometrics is the science of measuring physical or behavioral characteris-
tics unique to an individual such as face, voice or fingerprint to verify a 
person's identity. Biometric characteristics can be described as some-
thing we are. 
Biometrics and other 
Types of User 
Authentication
Unlike user authentication based on something the user knows, such as 
a PIN or password, or something he or she has, e.g. a smart card or other 
token, biometric systems work by relying on a biometric characteristic - 
something that is both unique and inseparably tied to the person. While 
PINs, passwords and keys can be forgotten, lost, lent or stolen, biomet-
rics cannot. The user himself becomes the means of identification, the bi-
ological password.
Biometric user authentication can elevate overall system security and en-
hance ease of use, as users no longer have to remember PINs and pass-
words.
Enrollment and 
Verification
Before biometric authentication can be used to verify the identity of a 
user, a biometric enrollment has to be performed beforehand. This 
means that the characteristic data of the biometric trait has to be cap-
tured and saved as a reference in a separate process in advance to verifi-
cation. During verification, the characteristic data of the biometric trait is 
captured again and compared to the previously stored reference data. If 
both data sets coincide to a sufficient level, access is granted.
Biometric Error Rates
In contrast to a PIN or password comparison, two different photos or 
characteristic data sets captured of the same biometric trait will always 
differ a bit due to positioning, background lighting, etc. Thus, biometric 
comparison returns a figure which represents a level of coincidence, i.e. 
the probability that two presented data sets belong to the same person. 
Depending on a threshold value, access is granted or denied. As a con-
sequence, a slight possibility remains that an unauthorized user be 
granted access to a protected system or that a legitimate user will be de-
nied access. The threshold value responsible for the error rates can be set 
by the system administrator. These error rates are characteristic for all bi-
ometric systems and are called false acceptance rates (FAR) and false re-
jection rates (FRR).
Fingerprint 
Verification
Fingerprint verification is not only the most prominent but also one of 
the most secure and well-understood biometric measures. Software con-
verts the image of a fingerprint into digital form and extracts a set of 
characteristics, i.e. a template, unique to the user's fingerprint. The char-
acteristic information from one fingerprint contains up to 60 key points. 
Crucial key points where finger-ridges end or split up are local features 
called minutiae. They provide unique, identifiable information.