Skip to main content
This content has been archived and is no longer being updated. Links may not function; however, this content may be relevant to outdated versions of the product.
LinkedIn
Copied!

Biometric Authentication

This presentation is part of the Authentication Overview Self-Study Course.

Transcript

Biometric authentication uses some characteristic of a person to prove their identity, such as their finger prints, the detail-rich intricate structures of a person’s iris, or the blood vessel patterns of their retina.  While suitable in limited application, biometric solutions may become unacceptably slow and comparatively expensive when a large number of users are involved.

Fooling a biometric system is surprisingly easy.  You can take a copy of a fingerprint with play dough and use it on the fingerprint scanner.  Biometric authentication is extremely vulnerable to replay attacks: once the information is compromised, it can easily be replayed unless the reader is completely secure and guarded.  If the biometric information has been compromised, there is no way to change it like you would a password.

And lastly, the owners of biometrically secured items may be in danger.  The value of the owner's finger is definitely greater than the value of the Mercedes it protects, at least to the individual whose finger it is.

Suggest Edit
Did you find this content helpful?

0% found this useful

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Ready to crush complexity?

Experience the benefits of Pega Community when you log in.

We'd prefer it if you saw us at our best.

Pega Community has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice
Contact us