AT&T Developer
  • Products
  • Resources
  • Blog
  • Sign In

Technical Library

    Device Technologies
    • Biometrics
    • Device Detection
    • HTML5
    • Mobile Web Fundamentals
    • Mobile Web Standards
    • Multi Core Coding in Dalvik
    • Multi Thread Coding in Android
    • Near Field Communication
    • NFC Forum
    • NFC Use Cases
    • NFC Case Studies
    • NFC Tags
    • GlobalPlatform and NFC
    • User Identification
    • Native Code
    Security and Privacy
    • Application Privacy Guidelines
    • Downloading DRM Content in Android
    • IPv6
    • Likelihood of a Successful Attack
    • Messaging Privacy
    • Mobile Web Security
    • Network Security
    • Security Policy
    • Security at AT&T
    • Types of Security Threats
    • Wireless Application Security
    • Security Policy Enforcement
    UI Elements
    • Slider Controls for Android
    • Check Box for Android
    • Dropdown for Android
    • Image Button for Android
    • Toggle Button for Android
    • Radio Button for Android
    • Segmented Text Toggle Button for Android
    • Static Text Toggle Button for Android
    • Switch for Android
    • Text Fields for Android
    • Getting Started with AT&T UI
    • HTML5 UI Elements
    • HTML5 Checkboxes
    • HTML5 Dropdown
    • HTML5 Image Button
    • HTML5 Image Toggle Button
    • HTML5 Radio Button
    • HTML5 Segmented Toggle Button
    • HTML5 Slider
    • HTML5 Static Text Toggle Button
    • HTML5 Switch Control
    • HTML5 Text Fields
    Network Technologies
    • IP Addresses
    • Long Term Evolution (LTE)
    • Network Timers
    • Wi-Fi
  • Other AT&T Websites
  • Best Practices
    • Hackathon Best Practices
    • Mobile Best Practices
    • Seven Common Errors Around Creating Mobile User Experiences
toggle menu

Biometrics

 

Biometrics is the automated use of physiological or behavioral characteristics to recognize or verify a user's identity.

Physiological biometrics methods use uniquely identifiable physical factors such as fingerprints, iris scans, retina scans, hand geometry, or facial features.

Behavioral biometrics use individually identifiable actions and include time as a data dimension. Common methods include keystroke pattern scans, hand signature scans, and voice recognition. Note that behavioral biometrics also involve physiological attributes such as hand size (in a signature scan) or vocal chord shape (in voice recognition).

 

Process

 

All biometric systems follow the general three-step process of enrollment, comparison, and identification. First, each biometric component is enrolled to extract its unique identifying features. These form the baseline biometric template to which "candidate" actions are compared. An algorithm that incorporates feature extraction and template comparison can then identify a match within a fraction of a second.

 

Comparing Biometrics

 

Biometric technologies are often compared based on the following factors.

  • Universality
    How commonly a biometric characteristic is found in each individual.
  • Uniqueness
    How well the biometric matching process separates one individual from another.
  • Consistency
    How close the biometric measurements are to each other each time they are derived.
  • Permanence
    How well a biometric template resists aging.
  • Intrusiveness
    How easy it is to acquire a biometric sample for measurement with minimal user interaction.
  • Reliability
    Typically measured by the False Reject Rate (FRR), or the rate at which an enrolled user is not accurately identified.
  • Security
    Typically measured by the False Accept Rate (FAR), or the rate at which a different person is incorrectly matched to an enrolled individual.
  • Ease of Use (Convenience)
    Indicating the time, intuitiveness, ergonomics and general use model by an individual interacting with a biometric system (enrolling and verifying).
  • Circumvention
    The ability to fool or "spoof" a biometric system with a false biometric sample.
  • Integration
    The general factors involved with integrating a biometric technology, such as the following for the capture device:
    • size
    • cost
    • power requirements
    • aesthetics
    • durability
    • other physical or technical attributes

 

Uses:

 

While no single biometric technology is perfect for all situations, some are better- suited for specific applications based on factors such as security, ease of use and cost.

 

Security/Privacy

 

  • Fingerprint biometrics offer superior protection of information. Notably, this includes protecting money and banking data on M-commerce enabled mobile phones.
  • Signature-scan biometrics offer private and personal characteristics.
  • Face and voice recognition both have a high False Reject Rate due to appearance changes (e.g., haircut, glasses, illness). In addition, voice recognition can be overheard or recorded and facial recognition requires you to take a picture of yourself with your mobile phone.

 

Hardware/Costs

 

  • Fingerprint scanning requires the relatively low cost of adding a sensor on the device and is the most common hardware-add approach on mobiles. Over seven million phones have shipped with biometric fingerprint sensors.
  • Signature, face, and voice recognition cost less because they can be added to mobile devices using only software. A significant number of voice and face recognition phones have shipped in Japan.
  • Other biometric approaches such as iris scans or vein recognition are impractical for mobile application with the current size and cost of sensor technology.

 

Security:

 

The main reason to use biometric security on mobile devices is to protect the data on the device and to provide secure yet convenient data transfer with any connected network. Biometrics also serves as a theft deterrent since the device is useless to others when it is locked with biometric security.

 

Convenience:

 

Biometric security is more convenient than password-based security. Entering a password on a mobile device can be difficult. Also passwords can be guessed or "hacked" and may also be forgotten by the phone user. A biometric system provides a convenient way for users to unlock their device.

 

Personalization:

 

With Signature/Sign on screen-writable devices users can apply electronic signatures to electronic documents and gain the significant productivity associated with the use of electronic documents. By using different secret sign or fingerprint biometric samples, users can set up hot keys and speed dial numbers. Since each sample is unique, users can launch different frequently used applications without using the menu structure. For example, the right index finger can launch e-mail, while the left index finger launches the music player. This same concept can be applied to secure web sites and VPNs. Different biometric samples can be used to provide secure access and launch a pre-specified site. Biometric sensors provide another factor of authentication which is critically important for VPN, corporate access, intranet and mobile banking applications.

Finally, fun applications such as speed calling friends, showing favorite photos, and launching favorite songs can be delivered and personalized using different biometric samples.

 

Navigation:

 

Fingerprint sensors can also be used as a touch pad input device for the phone. Similar to the touchpad on a laptop PC, a fingerprint sensor detects finger motion across the surface and moves the cursor in response. This replaces mechanical buttons with a smooth fingertip control method. Because the finger is not fatigued by using buttons, this approach improves menu navigation and the mobile gaming experience. And other commands can be added such as tap, double tap, tap and hold and tap and drag which enables new functionality on mobile devices. Scrolling through long lists of contacts, e-mail, music, and pictures can be significantly improved. Features such as scrolling, turbo-scrolling and acceleration let you move through items either one at a time, or at various speeds. This type of navigation can also improve the Web browsing experience—especially when the amount of content for a specific Web page is larger than the device screen.

 

Vendors supporting Biometrics

 

Motorola
IBM
Intel
Fujitsu
BIO-key International
Unisys

Back To Top
  • APIS & TOOLS
    • AT&T Video Optimizer
  • APIS & TOOLS
    • Futurist Reports
    • Technical Library
  • SUPPORT
    • Contact Us
    • FAQs
    • Twitter
  • AT&T Developer Program on Github
  • AT&T Developer Program on Facebook
  • AT&T Developer Program on Twitter
AT&T Logo

Terms of Use   Privacy Policy   Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
©2025 AT&T Intellectual Property. All rights reserved

AT&T, the AT&T logo and all other AT&T marks contained herein are trademark of AT&T Intellectual Property and/or AT&T affiliated companies.

14100000
Session Expiring

Your session is about to expire in !

Stay Signed In
Session Expired

Sorry! Your session has expired.

Skip to content