top of page
  1.  Behavioral: A type of authentication capable of being streamlines into mobile technology that utilizes software that tracks physical behavioral characteristics of users. This tech uses gestures, activity, keystrokes, and interaction patterns with certain devices to create a profile unique to each user and can be used for authentication and verification.
    https://www.secureauth.com/products/secureauth-idp/behavioral-biometrics

  2. Fingerprint: Biometric scanning of the user's fingerprint used to unlock various devices. It is currently in the highest realm of use due to its easy implementation within mobile technology. Everything from safes to smart phones use finger verification nowadays, and the most commonplace is Apple’s fingerprint authentication on their iPhones.
    https://support.apple.com/en-us/HT204587

  3. Palm Vein Verification: This is another form of biometric scanning that's been around for a while and utilizes the veins within the palms of users. These veins are unique to each human being and software can track and create a 3 dimensional model of these veins for each user profile.
    https://www.hindawi.com/journals/tswj/2014/246083/

  4. Voice Recognition: Voice recognition has also been around for a long time but is just now becoming a more advanced technology with the introduction of in-home units such as Alexa from Amazon. This authentication creates a profile based off of the specific sound wave patterns of a user’s voice, something else highly unique to each personhttps://www.nuance.com/omni-channel-customer-engagement/security/multi-modal-biometrics/vocalpassword.htmlhttps://securityintelligence.com/the-evolution-of-voice-authentication-as-a-security-method/

bottom of page