FB pixel

Explainer: Verification vs. Identification Systems

Explainer: Verification vs. Identification Systems
 

Biometrics are typically applied to identify a person or verify a claimed identity. Identification and verification are different processes that play similar roles in different kinds of security systems. Though the two concepts overlap and are sometimes used interchangeably in public discourse, there are critical distinctions that must be noted.

Identification is the task of answering: “Who is this person?” It consists of receiving data about an unknown individual, such as a photo of their face, their voice biometrics or fingerprints, and comparing it to a larger database to uncover a potential match. Identification systems are described as a 1-to-n matching system (sometime written ‘1:N’), where n is the total number of biometrics in the database. Identification tends to take longer than verification, as the algorithm must compare the reference data against a larger set of subjects to find a match.

Forensics labs are one example of an identification operation, as they store large banks of biometric data ranging from fingerprints and DNA samples collected at a crime scene. That information is then compared to newly-provided samples to prove the presence of the suspect.

Verification asks “Is the person who they say they are?” A person identifies as a certain user, and must provide proof they can confirm their identity compared to already-stored data. Verification is a 1-to-1 (or ‘1:1’) matching system because it aims to match a specific individual, rather than cast a wide net to find similarities in the identification process. Also, verification usually works more rapidly than identification, as it filters for highly-specific parameters in a smaller database.

Authentication is another concept in biometric matching, closely aligned with verification. A similar process to that used in identity verification is applied to subsequent interactions to authenticate that the person is the same one whose identity has previously been verified.

Consumer technologies such as smartphones employ verification to unlock their use, often with the application of fingerprint scanners or facial recognition systems.

Click here for more explainers in the field of biometrics. Find identification and verification solutions in our biometrics service directory.

Article Topics

 |   |   |   | 

Latest Biometrics News

 

Pix adds NFC scanning, device biometrics to Brazilian digital payments platform

Brazil’s pioneering instant payment system, Pix, is taking a step forward with the introduction of Pix by Approximation, a feature…

 

ROC is the top U.S. firm for age estimation in latest NIST ranking

Colorado-based ROC has broken back into the top tier in the recent NIST Face Analysis Technology Evaluation (FATE) for Age…

 

UK Home Office to test remote fingerprint enrolment via smartphone for entry

A notice from the UK government says the Home Office will conduct trials of remote and in person biometric fingerprint…

 

Austroads preps to scale Digital Trust Service after mDL testing success

Austroads has declared its Digital Trust Service (DTS) to enable the use of mobile driver’s licenses (mDLs) for attribute and…

 

UK Biometrics Commissioner’s report highlights vacancy in key regulatory role

The biometrics work of UK police continues, overseen by a vacant office which has published a formal report written by…

 

Facial recognition search engine claims 50K new photos of missing people

FaceCheck.ID has supposedly added 50,000 photos to its database. At the time of writing, the website has more than 920,000…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events