Technology Primers

ABIS & Deduplication

Automated Biometric Identification Systems perform large-scale 1:N searches to resolve identities an...

Read more →

Age Assurance (Verification & Estimation)

Processes that verify age via trusted documents or estimate age from signals like face or behavior f...

Read more →

Behavioral Biometrics

Behavioral biometrics analyzes patterns in user interactions—such as typing rhythm, mouse movement, ...

Read more →

Biometric Border Control

Biometric border control uses face or fingerprint recognition at checkpoints to verify travelers and...

Read more →

Biometric ID Cards

Biometric ID cards embed fingerprints or facial data on a chip for secure identity verification in t...

Read more →

Biometric Template Protection

Techniques like cancellable biometrics and encryption safeguard stored biometric templates from misu...

Read more →

Contactless Fingerprinting

Touch-free fingerprint capture using cameras or scanners, enabling mobile or hygienic enrollment.

Read more →

Digital ID

Digital ID represents electronic identity credentials that can be used to authenticate individuals a...

Read more →

Document Verification & NFC e-Chip Reading (eMRTD / ICAO 9303)

How modern ID documents are verified using optical checks, NFC chip reading, and PKI validation per ...

Read more →

Ear Recognition

Identifies people by the unique shape and texture of the outer ear, often for surveillance or forens...

Read more →

Facial Recognition

Facial recognition matches a photo of a face to an identity.

Read more →

Finger Vein Recognition

Near-infrared imaging of vascular patterns inside fingers provides high liveness assurance for authe...

Read more →

Fingerprint Recognition

Fingerprint recognition identifies individuals by analyzing unique patterns of ridges and valleys on...

Read more →

Gait Recognition

Gait recognition identifies individuals by analyzing their unique walking style and body movements f...

Read more →

Hand Biometrics

Hand biometrics identifies people using characteristics of the entire hand, such as geometry, vein p...

Read more →

Iris Recognition

Iris recognition uses the unique patterns in the colored ring surrounding the pupil to verify identi...

Read more →

Keystroke Dynamics

Authenticates users by timing patterns in how they type on a keyboard or touchscreen.

Read more →

Mobile ID

Mobile ID leverages smartphones to store and present digital identity credentials securely, often us...

Read more →

Multimodal Biometrics (Fusion)

Combining two or more biometric signals (e.g., face + fingerprint) to boost accuracy, resilience, an...

Read more →

National e-ID

National e-ID programs issue electronic identity credentials tied to biometrics for secure access to...

Read more →

Online Signature Verification (Dynamic)

Analyzes pen dynamics such as pressure, speed, and trajectory to authenticate handwritten signatures...

Read more →

Palm Vein Recognition

Palm vein recognition uses near-infrared light to capture the unique vascular patterns beneath the s...

Read more →

Palmprint Recognition

Uses dermal ridge patterns across the palm for identification, distinct from vein-based methods.

Read more →

Passkeys / FIDO2 / WebAuthn

Passwordless authentication based on public-key cryptography, delivered through WebAuthn (W3C) and C...

Read more →

Periocular / Sclera / Retina Recognition

Biometrics based on eye-adjacent regions—periocular texture, scleral patterns, or retinal vasculatur...

Read more →

Physiological Biometrics

Physiological biometrics refers to verifying identity based on unique physical characteristics such ...

Read more →

Presentation Attack Detection (Liveness / PAD)

Techniques and tests that detect spoofed biometric samples (e.g., masks, replays, synthetics) to ens...

Read more →

Verifiable Credentials & Identity Wallets (W3C VC 2.0)

Cryptographically verifiable claims issued by trusted parties and presented via identity wallets, en...

Read more →

Voice Recognition

Voice recognition authenticates individuals based on their unique vocal characteristics like pitch, ...

Read more →