{"id":6184,"date":"2024-03-11T14:49:28","date_gmt":"2024-03-11T12:49:28","guid":{"rendered":"https:\/\/security-robotics.de\/?p=6184"},"modified":"2024-04-24T11:11:40","modified_gmt":"2024-04-24T09:11:40","slug":"biometric-authentication","status":"publish","type":"post","link":"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication","title":{"rendered":"Biometric authentication"},"content":{"rendered":"\n<p><a rel=\"popover\" data-title=\"Biometric authentication\" data-post-id=\"6184\" class=\"sr-glossary-link\" aria-label=\"Biometric authentication\" href=\"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication\">Biometric authentication<\/a> refers to the method of identifying or verifying individuals based on unique physiological or behavioural characteristics. These include fingerprints, facial or iris recognition, voice analysis and other biological characteristics. The purpose is to secure access to systems, data or physical areas through the use of individual characteristics that are difficult to falsify.<\/p>","protected":false},"excerpt":{"rendered":"<p>Biometric authentication refers to the method of identifying or verifying individuals based on unique physiological or behavioural characteristics. These include fingerprints, facial or iris recognition, voice analysis and other biological characteristics. The purpose is to secure access to systems, data or physical areas through the use of individual characteristics that are difficult to falsify.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[388],"tags":[553],"class_list":["post-6184","post","type-post","status-publish","format-standard","hentry","category-glossary","tag-biometric-authentication"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometric authentication - Security Robotics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric authentication\" \/>\n<meta property=\"og:description\" content=\"Biometric authentication refers to the method of identifying or verifying individuals based on unique physiological or behavioural characteristics. These include fingerprints, facial or iris recognition, voice analysis and other biological characteristics. The purpose is to secure access to systems, data or physical areas through the use of individual characteristics that are difficult to falsify.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication\" \/>\n<meta property=\"og:site_name\" content=\"Security Robotics\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-11T12:49:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T09:11:40+00:00\" \/>\n<meta name=\"author\" content=\"Michael Engel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Engel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication\",\"url\":\"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication\",\"name\":\"Biometric authentication - Security Robotics\",\"isPartOf\":{\"@id\":\"https:\/\/security-robotics.de\/en#website\"},\"datePublished\":\"2024-03-11T12:49:28+00:00\",\"dateModified\":\"2024-04-24T09:11:40+00:00\",\"author\":{\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\"},\"breadcrumb\":{\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/security-robotics.de\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Biometric authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security-robotics.de\/en#website\",\"url\":\"https:\/\/security-robotics.de\/en\",\"name\":\"Security Robotics\",\"description\":\"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security-robotics.de\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\",\"name\":\"Michael Engel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"caption\":\"Michael Engel\"},\"url\":\"https:\/\/security-robotics.de\/en\/author\/m-engel\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Biometric authentication - Security Robotics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication","og_locale":"en_US","og_type":"article","og_title":"Biometric authentication","og_description":"Biometric authentication refers to the method of identifying or verifying individuals based on unique physiological or behavioural characteristics. These include fingerprints, facial or iris recognition, voice analysis and other biological characteristics. The purpose is to secure access to systems, data or physical areas through the use of individual characteristics that are difficult to falsify.","og_url":"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication","og_site_name":"Security Robotics","article_published_time":"2024-03-11T12:49:28+00:00","article_modified_time":"2024-04-24T09:11:40+00:00","author":"Michael Engel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Engel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication","url":"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication","name":"Biometric authentication - Security Robotics","isPartOf":{"@id":"https:\/\/security-robotics.de\/en#website"},"datePublished":"2024-03-11T12:49:28+00:00","dateModified":"2024-04-24T09:11:40+00:00","author":{"@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56"},"breadcrumb":{"@id":"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security-robotics.de\/en\/glossary\/biometric-authentication#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/security-robotics.de\/en"},{"@type":"ListItem","position":2,"name":"Biometric authentication"}]},{"@type":"WebSite","@id":"https:\/\/security-robotics.de\/en#website","url":"https:\/\/security-robotics.de\/en","name":"Security Robotics","description":"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security-robotics.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56","name":"Michael Engel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","caption":"Michael Engel"},"url":"https:\/\/security-robotics.de\/en\/author\/m-engel"}]}},"_links":{"self":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/comments?post=6184"}],"version-history":[{"count":1,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6184\/revisions"}],"predecessor-version":[{"id":6196,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6184\/revisions\/6196"}],"wp:attachment":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/media?parent=6184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/categories?post=6184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/tags?post=6184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}