Browse Definitions :
Definition

behavioral biometrics

Behavioral biometrics is the field of study related to the measure of uniquely identifying and  measurable patterns in human activities. The term contrasts with physical biometrics, which involves innate human characteristics such as fingerprints or iris patterns. 

Behavioral biometric verification methods include keystroke dynamics, gait analysis, voice ID, mouse use characteristics, signature analysis and cognitive biometrics. Behavioral biometrics are used for secure authentication in financial institutions, businesses, government facilities and retail point of sale (POS), as well as an increasing number of other environments. 

To increase security and prevent use of biometric credentials for identity theft, biometric data is typically encrypted during gathering and verification. After biometric data is gathered, a software application picks out specific points of data as match points. The match points in the database are processed using an algorithm that translates that information into a numeric value. The database value is compared with the biometric input the end user has entered and authentication is either approved or denied.

Unlike many types of physical biometrics, behavioral biometrics can often be gathered with existing hardware, needing only software for analysis. That capacity makes behavioral biometrics simpler and less costly to implement. 

This was last updated in March 2015

Continue Reading About behavioral biometrics

Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • crypto wallet (cryptocurrency wallet)

    A crypto wallet (cryptocurrency wallet) is software or hardware that enables users to store and use cryptocurrency.

  • zero-day (computer)

    A zero-day is a security flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching ...

  • backdoor (computing)

    A backdoor attack is a means to access a computer system or encrypted data that bypasses the system's customary security ...

CIO
  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

  • chief operating officer (COO)

    A chief operating officer (COO) is the corporate executive who oversees ongoing business operations within the company.

  • project management

    Project management is the discipline of using established principles, procedures and policies to guide a project from conception ...

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing...

  • marketing stack

    A marketing stack, also called a marketing technology stack, is a collection of technologies used by marketers to perform, ...

  • social media influence

    Social media influence is a marketing term that describes an individual's ability to affect other people's thinking in a social ...

Close