Biometrics technologies are nowadays emerging thanks to their potential applications in many different fields. Some examples are represented by the use of the fingerprint for mobile and laptop authentication and similarly, face recognition and iris scanning. Some of the aforementioned applications are very recent while the others are in use from some years. However, what it is interesting is the evolving approach to the authentication process. Indeed, the most modern approaches do not focus on the single recognition event, but they focus on potential applications related to the data collected and therefore to insights that can be gained thanks to correlations established among them.
An example is constituted by home automation. In some university campus, the traditional keys have been substituted by fingerprint authorization, therefore overcoming problems related to potential loss or theft of them. Another interesting field in which biometrics technologies find application is the health and care one. In this framework, they can find application in providing access to hospital areas only to authorized staff members or, on the other side ER can benefit from a fast identification of patients. These two examples show how biometrics technologies can help in ensuring security both from the physical point of view (access to restricted areas) both to ensure about a safe access to patients’ data, therefore, helping in keeping the data privacy.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.