FB pixel

Explainer: Verification vs. Identification Systems

Explainer: Verification vs. Identification Systems
 

Biometrics are typically applied to identify a person or verify a claimed identity. Identification and verification are different processes that play similar roles in different kinds of security systems. Though the two concepts overlap and are sometimes used interchangeably in public discourse, there are critical distinctions that must be noted.

Identification is the task of answering: “Who is this person?” It consists of receiving data about an unknown individual, such as a photo of their face, their voice biometrics or fingerprints, and comparing it to a larger database to uncover a potential match. Identification systems are described as a 1-to-n matching system (sometime written ‘1:N’), where n is the total number of biometrics in the database. Identification tends to take longer than verification, as the algorithm must compare the reference data against a larger set of subjects to find a match.

Forensics labs are one example of an identification operation, as they store large banks of biometric data ranging from fingerprints and DNA samples collected at a crime scene. That information is then compared to newly-provided samples to prove the presence of the suspect.

Verification asks “Is the person who they say they are?” A person identifies as a certain user, and must provide proof they can confirm their identity compared to already-stored data. Verification is a 1-to-1 (or ‘1:1’) matching system because it aims to match a specific individual, rather than cast a wide net to find similarities in the identification process. Also, verification usually works more rapidly than identification, as it filters for highly-specific parameters in a smaller database.

Authentication is another concept in biometric matching, closely aligned with verification. A similar process to that used in identity verification is applied to subsequent interactions to authenticate that the person is the same one whose identity has previously been verified.

Consumer technologies such as smartphones employ verification to unlock their use, often with the application of fingerprint scanners or facial recognition systems.

Click here for more explainers in the field of biometrics. Find identification and verification solutions in our biometrics service directory.

Article Topics

 |   |   |   | 

Latest Biometrics News

 

Privacy doesn’t have to cost us great online services

By Andrew Black, Managing Director ConnectID and Sujeet Rana, Chief Digital Officer NAB For years, we accepted an implicit trade-off…

 

Alan Turing Institute reveals digital identity and DPI risks in Cyber Threats Observatory Workshop

Digital identity systems are showing growing vulnerabilities with commensurate risks for the development of DPI. The Alan Turing Institute launched…

 

Biometric identity verification gets caught up in great expectations and politics

The next generation of biometric identity verification collides with the politics of digital identity in the most-read articles of the…

 

Todd Morris named NEC NSS President as Dr. Kathleen Kiernan retires

Todd Morris is the new President of NEC National Security Systems (NEC NSS). Morris succeeds Dr. Kathleen Kiernan, who is retiring…

 

ISO’s mDL standard can’t guarantee issuer trustworthiness

The fear that the server retrieval capability supported by the ISO/IEC 18013 standard for mobile driver’s licenses (mDLs) could be…

 

One app, two app, three app, four: DECTA study shows users have ‘wallet fatigue’

While some see the concept of a “15-minute city” as sinister, advocates say they just don’t want to go very…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events