{"id":767,"date":"2020-05-11T11:29:00","date_gmt":"2020-05-11T15:29:00","guid":{"rendered":"https:\/\/techbtc.com\/es\/?p=767"},"modified":"2023-10-19T06:52:43","modified_gmt":"2023-10-19T10:52:43","slug":"biometry-basics-knowledge-beggin-now","status":"publish","type":"post","link":"https:\/\/techbtc.com\/es\/biometry-basics-knowledge-beggin-now\/","title":{"rendered":"Biometry Basics knowledge. Begin Now."},"content":{"rendered":"\n<p>Nowadays, talking about biometry this is more common than we can imagine. It came here to stay, it is present in our daily life; and when we say daily life, we mean our mobile devices. Smartphones with fingerprint readers are very fashionable for the basic functionality of locking and unlocking the cell phone.<\/p>\n\n\n\n<p>Many people talk about biometry, but what is biometry?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What it is?<\/h2>\n\n\n\n<p>We are talking about applying mathematical and statistical methods to the study of biological phenomena in people, with the aim of measuring them accurately. In other words, it calculates, analyzes, and recognizes the unique characteristics of each individual. Namely, physiological patterns and behavioral patterns. When we speak of physiological patterns, we refer to DNA, iris, face, fingerprint, palm print. Behavioral patterns include gait recognition, usage habits, how the person interacts with different devices: keyboard, mouse, touch screen.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Relevance<\/h2>\n\n\n\n<p>Its relevance is global in these times, where the digital transformation is advancing rapidly in such critical areas as data security. Traditional forms of authentication\/identification with user and password should be replaced; they no longer represent an element of protection. It is imperative that the identification of individuals is made unequivocally in an unambiguous way to ensure or minimize risks of theft of sensitive information; therefore, we use biometry.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Uses of biometrics<\/h2>\n\n\n\n<p>Applications are infinite, but the main focus is the unmistakable and unavoidable identification of the human being. Basis of the use of biometrics is that you can identify someone without that person being able to pretend to be someone else. Commonly biometrics is used to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access control to restricted physical spaces.<\/li>\n\n\n\n<li>Automatic Teller Machines (ATMs)<\/li>\n\n\n\n<li>Authentication in applications<\/li>\n\n\n\n<li>Electronic payments<\/li>\n\n\n\n<li>Accessing personal devices (computer, smart phones)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What are the benefits of biometrics?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It is safe, based on the principle of recognition of unique patterns in each individual. Whoever accesses a service or a restricted space is duly authorized.<\/li>\n\n\n\n<li>Easy to use. It is used in a simple way, it is not necessary that the users have great knowledge.<\/li>\n\n\n\n<li>Agility. People do not have to memorize many passwords and delay doing the authentication. With biometrics the authentication is done in seconds.<\/li>\n\n\n\n<li>Whant to Check out brands?  Click <a href=\"https:\/\/techbtc.com\/line-card\/surveillance\/\">here <\/a>for some great ones.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-css-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Su opini\u00f3n es importante para nosotros, valore nuestro contenido<\/em><\/h4>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><em>Entradas relacionadas<\/em><\/strong><\/h4>\n\n\n<p class=\"wp-block-tag-cloud\"><a href=\"https:\/\/techbtc.com\/es\/tag\/alarmas\/\" class=\"tag-cloud-link tag-link-93 tag-link-position-1\" style=\"font-size: 8pt;\" aria-label=\"alarmas (1 elemento)\">alarmas<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/analitica-de-video\/\" class=\"tag-cloud-link tag-link-112 tag-link-position-2\" style=\"font-size: 12.581818181818pt;\" aria-label=\"analitica de video (2 elementos)\">analitica de video<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/asesoria-en-seguridad\/\" class=\"tag-cloud-link tag-link-102 tag-link-position-3\" style=\"font-size: 8pt;\" aria-label=\"asesor\u00eda en seguridad (1 elemento)\">asesor\u00eda en seguridad<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/biometria\/\" class=\"tag-cloud-link tag-link-67 tag-link-position-4\" style=\"font-size: 20.218181818182pt;\" aria-label=\"Biometr\u00eda (5 elementos)\">Biometr\u00eda<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/bodycams\/\" class=\"tag-cloud-link tag-link-130 tag-link-position-5\" style=\"font-size: 8pt;\" aria-label=\"BodyCams (1 elemento)\">BodyCams<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/cerradura-electronica\/\" class=\"tag-cloud-link tag-link-86 tag-link-position-6\" style=\"font-size: 8pt;\" aria-label=\"Cerradura electronica (1 elemento)\">Cerradura electronica<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/conteo-de-personas\/\" class=\"tag-cloud-link tag-link-90 tag-link-position-7\" style=\"font-size: 12.581818181818pt;\" aria-label=\"conteo de personas (2 elementos)\">conteo de personas<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/control-de-acceso\/\" class=\"tag-cloud-link tag-link-66 tag-link-position-8\" style=\"font-size: 22pt;\" aria-label=\"Control de Acceso (6 elementos)\">Control de Acceso<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/control-de-aforo\/\" class=\"tag-cloud-link tag-link-89 tag-link-position-9\" style=\"font-size: 8pt;\" aria-label=\"Control de aforo (1 elemento)\">Control de aforo<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/control-de-incendios\/\" class=\"tag-cloud-link tag-link-91 tag-link-position-10\" style=\"font-size: 8pt;\" aria-label=\"control de incendios (1 elemento)\">control de incendios<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/camaras-corporales\/\" class=\"tag-cloud-link tag-link-131 tag-link-position-11\" style=\"font-size: 8pt;\" aria-label=\"C\u00e1maras Corporales (1 elemento)\">C\u00e1maras Corporales<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/deep-learning\/\" class=\"tag-cloud-link tag-link-113 tag-link-position-12\" style=\"font-size: 12.581818181818pt;\" aria-label=\"deep learning (2 elementos)\">deep learning<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/deteccion-de-distancia-social\/\" class=\"tag-cloud-link tag-link-111 tag-link-position-13\" style=\"font-size: 8pt;\" aria-label=\"deteccion de distancia social (1 elemento)\">deteccion de distancia social<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/deteccion-de-temperatura\/\" class=\"tag-cloud-link tag-link-110 tag-link-position-14\" style=\"font-size: 8pt;\" aria-label=\"deteccion de temperatura (1 elemento)\">deteccion de temperatura<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/deteccion-de-fuego\/\" class=\"tag-cloud-link tag-link-94 tag-link-position-15\" style=\"font-size: 8pt;\" aria-label=\"detecci\u00f3n de fuego (1 elemento)\">detecci\u00f3n de fuego<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/deteccion-de-incendios\/\" class=\"tag-cloud-link tag-link-92 tag-link-position-16\" style=\"font-size: 8pt;\" aria-label=\"detecci\u00f3n de incendios (1 elemento)\">detecci\u00f3n de incendios<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/deteccion-y-control-de-fuego\/\" class=\"tag-cloud-link tag-link-97 tag-link-position-17\" style=\"font-size: 8pt;\" aria-label=\"detecci\u00f3n y control de fuego (1 elemento)\">detecci\u00f3n y control de fuego<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/detectores\/\" class=\"tag-cloud-link tag-link-96 tag-link-position-18\" style=\"font-size: 8pt;\" aria-label=\"detectores (1 elemento)\">detectores<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/diseno-de-proyectos\/\" class=\"tag-cloud-link tag-link-104 tag-link-position-19\" style=\"font-size: 8pt;\" aria-label=\"dise\u00f1o de proyectos (1 elemento)\">dise\u00f1o de proyectos<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/etraining\/\" class=\"tag-cloud-link tag-link-41 tag-link-position-20\" style=\"font-size: 20.218181818182pt;\" aria-label=\"eTraining (5 elementos)\">eTraining<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/evacuacion\/\" class=\"tag-cloud-link tag-link-132 tag-link-position-21\" style=\"font-size: 20.218181818182pt;\" aria-label=\"Evacuaci\u00f3n (5 elementos)\">Evacuaci\u00f3n<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/extintores\/\" class=\"tag-cloud-link tag-link-95 tag-link-position-22\" style=\"font-size: 8pt;\" aria-label=\"extintores (1 elemento)\">extintores<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/fire-detection\/\" class=\"tag-cloud-link tag-link-25 tag-link-position-23\" style=\"font-size: 12.581818181818pt;\" aria-label=\"fire detection (2 elementos)\">fire detection<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/gestion-de-video\/\" class=\"tag-cloud-link tag-link-56 tag-link-position-24\" style=\"font-size: 15.636363636364pt;\" aria-label=\"Gesti\u00f3n de V\u00eddeo (3 elementos)\">Gesti\u00f3n de V\u00eddeo<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/identificacion\/\" class=\"tag-cloud-link tag-link-118 tag-link-position-25\" style=\"font-size: 8pt;\" aria-label=\"identificaci\u00f3n (1 elemento)\">identificaci\u00f3n<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/infraestructura\/\" class=\"tag-cloud-link tag-link-117 tag-link-position-26\" style=\"font-size: 8pt;\" aria-label=\"infraestructura (1 elemento)\">infraestructura<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/inteligencia-artificial\/\" class=\"tag-cloud-link tag-link-88 tag-link-position-27\" style=\"font-size: 18.181818181818pt;\" aria-label=\"Inteligencia Artificial (4 elementos)\">Inteligencia Artificial<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/lectores-de-rfid\/\" class=\"tag-cloud-link tag-link-87 tag-link-position-28\" style=\"font-size: 8pt;\" aria-label=\"Lectores de RFID (1 elemento)\">Lectores de RFID<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/milestone\/\" class=\"tag-cloud-link tag-link-55 tag-link-position-29\" style=\"font-size: 20.218181818182pt;\" aria-label=\"Milestone (5 elementos)\">Milestone<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/proteccion-sobretension\/\" class=\"tag-cloud-link tag-link-116 tag-link-position-30\" style=\"font-size: 8pt;\" aria-label=\"protecci\u00f3n sobretensi\u00f3n (1 elemento)\">protecci\u00f3n sobretensi\u00f3n<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/proyectos-de-seguridad\/\" class=\"tag-cloud-link tag-link-99 tag-link-position-31\" style=\"font-size: 8pt;\" aria-label=\"proyectos de seguridad (1 elemento)\">proyectos de seguridad<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/proyectos-de-tecnologia\/\" class=\"tag-cloud-link tag-link-100 tag-link-position-32\" style=\"font-size: 8pt;\" aria-label=\"proyectos de tecnolog\u00eda (1 elemento)\">proyectos de tecnolog\u00eda<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/reconocimiento-de-matriculas\/\" class=\"tag-cloud-link tag-link-108 tag-link-position-33\" style=\"font-size: 8pt;\" aria-label=\"reconocimiento de matriculas (1 elemento)\">reconocimiento de matriculas<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/reconocimiento-facial\/\" class=\"tag-cloud-link tag-link-105 tag-link-position-34\" style=\"font-size: 12.581818181818pt;\" aria-label=\"Reconocimiento facial (2 elementos)\">Reconocimiento facial<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/seguridad\/\" class=\"tag-cloud-link tag-link-74 tag-link-position-35\" style=\"font-size: 12.581818181818pt;\" aria-label=\"seguridad (2 elementos)\">seguridad<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/telemetria\/\" class=\"tag-cloud-link tag-link-64 tag-link-position-36\" style=\"font-size: 8pt;\" aria-label=\"Telemetr\u00eda (1 elemento)\">Telemetr\u00eda<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/training\/\" class=\"tag-cloud-link tag-link-26 tag-link-position-37\" style=\"font-size: 18.181818181818pt;\" aria-label=\"training (4 elementos)\">training<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/vaidio\/\" class=\"tag-cloud-link tag-link-114 tag-link-position-38\" style=\"font-size: 8pt;\" aria-label=\"vaidio (1 elemento)\">vaidio<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/videotec\/\" class=\"tag-cloud-link tag-link-58 tag-link-position-39\" style=\"font-size: 20.218181818182pt;\" aria-label=\"Videotec (5 elementos)\">Videotec<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/videovigilancia\/\" class=\"tag-cloud-link tag-link-119 tag-link-position-40\" style=\"font-size: 20.218181818182pt;\" aria-label=\"videovigilancia (5 elementos)\">videovigilancia<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/video-vigilancia\/\" class=\"tag-cloud-link tag-link-71 tag-link-position-41\" style=\"font-size: 12.581818181818pt;\" aria-label=\"video vigilancia (2 elementos)\">video vigilancia<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/vigilancia\/\" class=\"tag-cloud-link tag-link-59 tag-link-position-42\" style=\"font-size: 12.581818181818pt;\" aria-label=\"Vigilancia (2 elementos)\">Vigilancia<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/visonic\/\" class=\"tag-cloud-link tag-link-48 tag-link-position-43\" style=\"font-size: 20.218181818182pt;\" aria-label=\"Visonic (5 elementos)\">Visonic<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/vms\/\" class=\"tag-cloud-link tag-link-50 tag-link-position-44\" style=\"font-size: 12.581818181818pt;\" aria-label=\"VMS (2 elementos)\">VMS<\/a>\n<a href=\"https:\/\/techbtc.com\/es\/tag\/webinar\/\" class=\"tag-cloud-link tag-link-44 tag-link-position-45\" style=\"font-size: 15.636363636364pt;\" aria-label=\"webinar (3 elementos)\">webinar<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Nowadays, talking about biometry this is more common than we can imagine. It came here to stay, it is present in our daily life; and when we say daily life, &#8230;<\/p>\n","protected":false},"author":1,"featured_media":772,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[13],"tags":[67],"class_list":["post-767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-control-acceso","tag-biometria"],"_links":{"self":[{"href":"https:\/\/techbtc.com\/es\/wp-json\/wp\/v2\/posts\/767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techbtc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techbtc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techbtc.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techbtc.com\/es\/wp-json\/wp\/v2\/comments?post=767"}],"version-history":[{"count":0,"href":"https:\/\/techbtc.com\/es\/wp-json\/wp\/v2\/posts\/767\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techbtc.com\/es\/wp-json\/wp\/v2\/media\/772"}],"wp:attachment":[{"href":"https:\/\/techbtc.com\/es\/wp-json\/wp\/v2\/media?parent=767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techbtc.com\/es\/wp-json\/wp\/v2\/categories?post=767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techbtc.com\/es\/wp-json\/wp\/v2\/tags?post=767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}