This guidance outlines the security profiles of biometric recognition technologies, and how to build secure authentication systems which incorporate them. This document is concerned with biometric systems for the verification of individuals, and will cover only those modalities which are commercially available, and appropriate to the field of cyber security. These are: fingerprint, face, iris, vein pattern, and speaker recognition.
Leave a Reply
You must be logged in to post a comment.