“ …smartphones will eventually include sensors for face, iris, and fingerprint recognition—a rarity now. The cost isn’t that high for the hardware, he reasons, and perhaps you’d use them in different combinations for different transactions—the user might decide which they want to use, or for a big purchase on the phone a merchant might want you to use all three.”Anil Jain
According to Gartner, Biometric authentication methods use biometric characteristics or traits to verify users’ claimed identities when users access endpoint devices, networks, networked applications or Web applications. Across a wide range of use cases, any biometric authentication method may be used in one-to-one comparison mode (when the user enters a user ID), or one-to-many search mode (when the user simply presents his or her biometric characteristic, with no explicit claim of identity, and the system determines his or her user ID from a range of candidates).
Biometric sensors on mobile devices all work on the same basic principle: getting users to verify their identity using unique personal physical characteristics. Some of the techniques are: – Face recognition, Fingerprints, Voice prints, Retina scan, Iris scan, Hand geometry biometric. There are studies to go beyond these physical authentication techniques and include behavioral aspects into dynamic authentication.
Any biometric authentication should be fool-proof, secure and reliable. It should take into account user convenience, usage context, and user demographics. It should make customer journeys frictionless while ensuring security. Biometric authentication techniques continue to improve with advances in sensor technologies, and algorithms to reduce false acceptance rate.