< Day Day Up > |
In the previous two chapters, we defined the different types of authentication and discussed the privacy concerns of using biometrics. This chapter deals directly with biometric technology. Biometric technology will be defined in terms of how the user interacts with the technology. Also, what makes a good biometric technology will be explored. Lastly, an understanding of what makes a good biometric for network access will be achieved. |
< Day Day Up > |