Cashless payment at the unoccupied gas station, automatic check-in at the airport, ordering at the computer - today many transactions are possible even without personal contact. It is all the more important to make sure that the person is the person for whom he or she claims to be.
Prevent terrorist acts, secure online banking ...
Security and the identification of persons is hotly debated at least since the worldwide increasing terrorist actions. But even in everyday life, these aspects are important - who finally wants to find his account emptied because someone has gained access without permission. Or find out that another person bought a mobile phone at his own expense and phoned the world for weeks without paying the bills?
One solution promises methods based on biometry (from the Greek: bios = life, metrein = measure), ie the measurement of physiological or behavioral characteristics such as fingerprint, iris pattern or voice. This can either identify people (by comparing their characteristics with centrally stored data of a group of people, for example, fingerprints of criminals) or a person can use it to authenticate (also called verification).
For this purpose, the corresponding features of the individual are first stored encrypted as a machine-readable reference and compared with the data collected during each authentication process.
For example, the following applications are possible:
- Access to (encrypted) data, networks, electronic services, online banking, etc .; So far, biometrics are usually used instead of PIN and password authentication, and increasingly also the electronic signature
- Authorization to enter or access certain rooms (for example in high-security zones) (for example, safe)
- Biometric ID cards; In Germany, fingerprints, hand or facial features are legally allowed
- Time recording, automation of individual settings, for example in the car