{"id":80,"date":"2016-03-22T12:54:56","date_gmt":"2016-03-22T12:54:56","guid":{"rendered":"http:\/\/www.starlinkindia.com\/blog\/?p=80"},"modified":"2023-04-25T11:45:52","modified_gmt":"2023-04-25T06:15:52","slug":"behavioural-biometrics-secureauth-ii","status":"publish","type":"post","link":"https:\/\/www.starlinkindia.com\/blog\/behavioural-biometrics-secureauth-ii\/","title":{"rendered":"Behavioural Biometrics &#038; SecureAuth &#8211; II"},"content":{"rendered":"<p>This blog post is second in the series of Behavioural Biometrics &amp; SecureAuth. To read the previous post, <a href=\"https:\/\/www.starlinkindia.com\/Blog\/behavioural-biometrics-secureauth\/\"><strong>click here<\/strong><\/a>.<br \/>\nThis truly is a next-generation technology. Craig Lund, CEO, SecureAuth, asks to think of the SecureAuth IdP as a bullet-resistant vest. He says that these multiple layers of protection act as a defensive wall against cyber attacks. This is because it is a lot harder to break several walls of<a href=\"https:\/\/www.starlinkindia.com\/blog\/use-of-biometric-authentication-in-mobile-phones-to-take-a-huge-leap-by-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\"> authentication than breaking just one.<\/a> One of these layers corresponds to behavioural biometrics, and hence, is next to impossible to break, since it is very difficult to replicate someone else\u2019s behaviour.<\/p>\n<p>As mentioned in the previous article, this multi-factor authentication is only initiated when the profile match is unsuccessful. Senior <a href=\"https:\/\/451research.com\/biography?eid=762\"><strong>Security Analyst Garrett Bekker<\/strong><\/a>, 451 Research, says that adding behavioural biometrics to authentication process provides differentiation compared to other step-up authentication vendors.<br \/>\nKeeping SecureAuth aside, not many people know that data collection for behavioural biometrics doesn\u2019t need any special hardware. The researchers behind this type of biometrics try to \u2018quantify\u2019 behavioural traits by users, and use them for profiles that help authenticate identity. <a href=\"https:\/\/www.starlinkindia.com\" target=\"_blank\" rel=\"noopener noreferrer\">Behavioural biometrics<\/a> can be divided into multiple subtypes, but that should be the topic of some other blog post.<\/p>\n<p>Not just behavioural biometrics, our writer has also written about <a href=\"http:\/\/ezinearticles.com\/?Different-Type-Of-Biometrics&amp;id=9061918\"><strong>the different type of biometrics<\/strong><\/a> , including fingerprint recognition, that is employed by Star Link in its biometric attendance software. Happy reading!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post is second in the series of Behavioural Biometrics &amp; SecureAuth. To read the previous post, click here. This truly is a next-generation technology. Craig Lund, CEO, SecureAuth, asks to think of the SecureAuth IdP as a bullet-resistant vest. He says that these multiple layers of protection act as a defensive wall against &hellip; <a href=\"https:\/\/www.starlinkindia.com\/blog\/behavioural-biometrics-secureauth-ii\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Behavioural Biometrics &#038; SecureAuth &#8211; II<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":81,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[8,9,10],"tags":[102,77,74,94,47,30,101,100,99,48,97,66],"class_list":["post-80","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-devices","category-biometric-security","category-biometric-technology","tag-access-control-systems","tag-biometric-access-control","tag-biometric-access-control-system","tag-biometric-attendance-machine","tag-biometric-attendance-system","tag-biometric-devices","tag-biometric-security-system","tag-biometric-time-attendance-system","tag-door-access-control-system","tag-fingerprint-attendance-system","tag-time-attendance-machine","tag-time-attendance-system"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/posts\/80","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/comments?post=80"}],"version-history":[{"count":3,"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/posts\/80\/revisions"}],"predecessor-version":[{"id":1152,"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/posts\/80\/revisions\/1152"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/media\/81"}],"wp:attachment":[{"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/media?parent=80"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/categories?post=80"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.starlinkindia.com\/blog\/wp-json\/wp\/v2\/tags?post=80"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}