• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Alarm Reviews HomepageAlarm Reviews

Home Security made EASY!

About Us

We have worked with, alongside and against home security companies for over a decade.  We publish the raw data and let you decide whom is best for your home alarm system.

  • Best Home Security Systems
    • #1 Abode
    • #2 Frontpoint
    • #3 ADT
    • #4 Vivint
    • #5 Protect America
    • #6 Link Interactive
  • Company Reviews
    • A – C
      • Abode
      • Ackerman Security
      • ADS Security
      • AMP
      • ASG
      • AT&T Digital Life
      • Atronic Alarms
      • Bay Alarm
      • Brinks
      • Central Security
      • Cox Homelife
      • CPI Security
    • D – R
      • DSC
      • Guardian
      • LifeShield
      • LiveWatch
      • Moni
      • Night Owl
      • Monitronics
      • Protection One
      • Ring Protect Review
    • S – X
      • SAFE
      • SafeGuard
      • Safeguard B2B
      • Security Networks
      • Sentry Safe
      • SpotCrime
      • Swann
      • Time Warner
      • Vector
      • XFINITY Home
  • Product Reviews
    • Top 10 Lists
      • 10 Best Deadbolt Models For Your Home
      • 10 Best Smart Locks for Your Home
      • 10 Best Wi-Fi Security Camera Models
      • 10 Best Wired Security Camera Systems
      • 11 Best Fireproof Safes
    • 2 Way Over Voice Reviews
    • 5 Best Driveway Alarm Systems
    • 5 Best Water Leak Detector
    • 7 Best Motion Detector Lights
    • 7 Best Outdoor Motion Sensor Lights for Homes
    • 8 Best Glass Break Sensor
    • 8 Best Self Monitored Home Security Systems
    • 9 Best Baby Monitor Models
    • 9 Best Nanny Cam Models
  • Compare
  • Other
    • Doorbell Cameras
    • DIY Systems
      • Best DIY Security Systems
      • Abode Home Security
      • 2gig
      • Alarm.com
      • Canary
      • Cocoon
      • First Alert
      • GE
      • Honeywell
      • Insteon
      • Kidde
      • iSmartAlarm
      • Piper
      • Nest
      • NextAlarm
      • Scout Alarm
      • SimpliSafe
      • SkyLink
      • SmartThings
    • Versus
      • ADT vs Lifeshield
      • ADT vs Protect America
      • ADT vs FrontPoint
      • LiveWatch vs Frontpoint
      • LiveWatch vs SimpliSafe
      • Monitronics VS ADT
      • Protect America vs FrontPoint
      • Simplisafe VS ADT
      • SimpliSafe vs Frontpoint
      • Vivint vs ADT
    • Home Security Tips
      • Cancelling Your Contract
      • Cheap Alternatives
      • Fake Security Signs
      • Home Invasions
      • Security Mistakes
      • Holiday Tips
      • Intelligent Homes
      • Amber Alerts
      • Dangerous Cities
      • Neighborhood Watch
      • Outdated Alarms
      • Security Apps
      • Saw Crime?
      • Upgrading Systems
      • Window Sensors
      • Why NOT to buy an Alarm
You are here: Home / Home Security Systems / Biometric Security: How Security Systems Will Work in the 21st Century

11/05/2022 by William Eames Leave a Comment

Biometric Security: How Security Systems Will Work in the 21st Century

Since the dawn of the computer age, systems have been secured by typing in a user name and a password. Security systems were most often armed and disarmed via a numeric code. But in the 21st century, more sophistication is needed to thwart computer cracking and to make security systems harder to defeat. One way to improve security systems is by using biometric security.


retina scan biometric security
Image from Pixabay

This article will cover the topic of biometric security systems and explain why they are essential in the increasingly dangerous world of the 21st century. We will also discuss the privacy concerns that these systems and their use entails.

What Is Biometric Security?

Biometric security is security based on the physical characteristics of an individual. The word itself is a combination of two Greek words: bio, which means ‘life,’ and metric, which means ‘to measure.’

When Did It Originate?

Using key biologic markers to identify individuals goes back thousands of years. As far back as 500BC, we have evidence that Babylonian clay tablets used for business transactions included fingerprints.

1800s Biometrics

Alphonse Bertillon, a Persian anthropologist and French police officer in the late 19th century, developed a method of identification based on physical characteristics. He used an anthropological technique called anthropometry,

Bertillon went on to codify his system, which came to be known as the Bertillon System. It was defined by an individual’s physical characteristics such as height, trunk measurement, front and side photographs, scars, birthmarks and other metrics. It was used for decades in both in Europe and the United States until fingerprint identification supplanted it.

No products found.

Biometric Scanner Limitations

Types of Biometric Security

https://www.youtube.com/watch?v=PyQsGxSUlfE

Current biometric security systems operate using different physical measurements. Here are some of the more common types:

Fingerprint Identification


 

Image from Pixabay

While using fingerprints for identification began in theearly 20th century, the first automated fingerprint identification systems didn’t start to be used until the 1970s. Today, fingerprint scanners are available on many security systems, as well as on many smart phones.

Retinal Scanning

Your retina is a circle of tissue on the back side of your eye. It contains the rods and cones that translate the focused light from your eye’s lens into neural signals that your optic nerve passes to your brain.

There are many tiny blood vessels feeding the cells of your retina. Those blood vessels form a pattern that is unique to each individual. Retinal scanners can map those blood vessels and store them in a data base for recall.


retinal scanning

 

Image from Pixabay

Other Ocular Scans

There are two other types of ocular (eye) scans that are separate and distinct from retinal scans. They are iris scans and scleral vein recognition.

Iris Scans

Iris scans map the unique pattern of an individual’s iris, which is the colored area of the eye behind the cornea that contains the pupil. The advantage of the iris scan is that it can be performed from up to ten feet away and is as simple as taking a high-resolution photo.

Scleral Vein Scans

Scleral vein scanning is a recent technology. Scleral veins are the veins found in the whites of your eyes. They also have a unique pattern based on each individual’s eye structure. It uses the Y-shaped branches of veins which are multi-layered in the sclera to provide a high degree of recognition accuracy.

Voice Recognition


 

Image from Pixabay

Voice recognition systems are computer programs that parse the human voice. They break down speech into its component parts, including timbre, modulation, tone and cadence to identify one individual from another.

There is some doubt how secure this identification is, however. One reporter used his identical twin to fool a banking system into thinking his twin was him. The best estimate of current voice recognition systems is that they are around 90% accurate.

Sale
EZVIZ 4MP Indoor Camera, Pan/Tilt Baby Pet Monitor with AI Human and...
EZVIZ 4MP Indoor Camera, Pan/Tilt Baby Pet Monitor with AI Human and...
  • ✔【Impressive video quality in 2K⁺】The C6 camera excels at seeing everything clearly and vividly. It renders...
  • ✔【Smart enough to detect, zoom, and follow】The camera can automatically zoom in up to 4 times to follow a moving...
  • ✔【Powerful and intelligent】AI-Powered Human & Pet Detection helps the C6 camera notifies you when you’re needed....
Amazon Prime
View on Amazon

Hand Geometry

Hand geometry recognition is a refinement of Bertillon’s system. They measure the length, surface area, thickness and width of a user’s hand. A limitation of hand geometry security systems is that they cannot perform one-to-many comparisons but are limited to one-to-one verification.

Facial Recognition

Facial recognition systems use relationships between various facial features to identify one face from another. The distance between the eyes, or the distance from the chin to the tip of the nose are captured and stored in a data base.

Facial recognition systems are used in many security systems today, as they have the advantage of being able to be used at a considerable distance from the subject, making them valuable where large numbers of people are in attendance, such as airports or sporting events.

Smart Phone Facial Recognition

https://www.youtube.com/watch?v=uQHqZNyXoBQ

Many smart phones use facial recognition as one method of unlocking the phone to allow user access. For example, Apple’s iPhone X uses an infrared projector to send 30,000 dots onto the face of the user and uses pattern matching to unlock the phone.

The LG V30 smart phone combines facial, voice and fingerprint information to provide increased phone security. Using multiple security devices to prevent unauthorized access is becoming more common in today’s security systems.

Biometric Scanner Limitations

These scanners are not without limitations. Numerous successful attempts to fool biometric sensors have been successful.

3D Head Models

Some University of North Carolina (UNC) researchers were able to fool four out of five security systems that depended on facial recognition. They took photographs of people’s facial features and used them to produce 3D models of those individual’s heads.

Fingerprint Spoofing

Many fingerprint recognition systems have been spoofed by techniques as simple as creating a latex finger complete with a fingerprint. An early iPhone could be unlocked when a picture of a fingerprint was transferred to glass.

Today’s more sophisticated fingerprint scanners include other sensors to verify that the fingerprint is actually attached to a living finger. These include temperature and moisture sensors and have proven to be much harder to fool.

Is There a Need for Biometric Security?


question mark

 

Image from Pixabay

Yes, with limits. While today’s increasingly complex world makes security systems unavoidable, there are also privacy concerns that also must be addressed.

Fourth Amendment Protections

In the United States, the fourth amendment to the Constitution protects us from unreasonable search and seizure, It also protects us from warrantless searches. The fourth amendment protection against warrantless searches was a response to the British colonial practice of judges granting ‘Writs of Assistance’ to British soldiers.

Those writs were unspecified about what was being searched for as well as the people or area that could be searched. In effect, judges were telling soldiers that they could just go into a township and search everyone for everything. These Writs of Assistance were one of the key factors that caused the colonists to revolt.

Patel v. Facebook

Many privacy advocates opine that the use of surveillance systems violate fourth amendment protections. In a recent decision by the Ninth Circuit Court of Appeals, Patel v. Facebook, the court ruled that Facebook had violated the Illinois Biometric Information Privacy Act (BIPA) because they used face recognition technology on the users’ photographs without the users’ knowledge and consent.

How Biometric Security Systems Will Work in the 21st Century

As we move further into the 21st century, we anticipate that Closed Circuit Television Cameras (CCTV) will continue to proliferate throughout our cities, airports and sporting venues. Court cases will challenge the fourth amendment ramifications of these cameras and their use to gather metadata.

Security systems will become increasingly multi-sensored, combining various biometric recognition factors such as fingerprint, retinal scans and voice recognition systems. We anticipate this increasingly multi-layered approach to biometric security systems will continue as even more unique biometric identifiers become available.

Conclusion

From smart phones to airports and from sporting events to strolling down the street to your favorite restaurant, biometric surveillance and security are here to stay. At the same time, privacy concerns and constitutional protections need to be considered and enforced.

How this will all work out? That’s the big question that tomorrow’s ethicists and courts will have to answer.

Featured Image from Pixabay

Latest Posts

  • 3 Ways to know your Alarm System is Outdated
  • Vivint vs ADT
  • 7 Best Outdoor Motion Sensor Lights for Homes
  • Top Home Security Systems in Atlanta, GA
  • How to Cancel Your Alarm Contract
William Eames Alarm-reviews.net
William Eames

William is a tech buff and former corporate security officer turned cybercrime analyst. Computers have few secrets left for him, but home security and alarm systems… Well, those have plenty of secrets for their users, which William is now uncovering and explaining. His articles on home security helped many people take the matter seriously, invest in highly performing systems, and avoid becoming victims of burglaries.

Last update on 2025-11-25 at 07:04 / Affiliate links / Images from Amazon Product Advertising API

Filed Under: Home Security Systems, Home Security Tips, Smart Home Devices

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Home Security Review Winners 2025

#1: Abode

Review - Visit Site
(650) 446-7078

#2: FrontPoint

Review - Visit Site
(833) 606-4477

#3: ADT Monitoring

Review - Visit Site
(855) 497-8573

#4: Vivint

Review - Visit Site
(877) 805-6733

Ideal Security Products

Abode Iota All-in-One Security Kit with Integrated Camera, Alarm, Key...
Abode Iota All-in-One Security Kit with Integrated Camera, Alarm, Key...
Amazon Prime
View on Amazon
Sale Kasa Indoor Pan/Tilt Smart Security Camera, 1080p HD Dog-Camera,2.4GHz...
Kasa Indoor Pan/Tilt Smart Security Camera, 1080p HD Dog-Camera,2.4GHz...
Amazon Prime
View on Amazon
Blink Whole Home Bundle | Video Doorbell System, Outdoor camera, and...
Blink Whole Home Bundle | Video Doorbell System, Outdoor camera, and...
Amazon Prime
View on Amazon
Sale Arlo Essential Spotlight Camera - 3 Pack - Wireless Security, 1080p...
Arlo Essential Spotlight Camera - 3 Pack - Wireless Security, 1080p...
View on Amazon
Top

The unbiased rankings and reviews are opinion of Alarm-Reviews.net and are subject to change. In order to keep this valuable data for consumers free, we generate advertising revenue from a few of the companies featured on this site. Learn more from our affiliate disclosure or Compare Top 5

Vivint vs ADT

Vivint vs ADT

What happens when the two largest home security companies collide?   We stacked up these two security giants dozens of ways for you to decide who the right company is for you and your home.  Ultimately what you are deciding between is a: good vs rocky history, good vs luxury price and basic vs advanced. […]

best outdoor motion sensor lights

7 Best Outdoor Motion Sensor Lights for Homes

Blind the Bad Guys with these Bright LED Security Motion Lights We may never know all that creeps in the dark around our homes while we sleep. One way to be sure that anything wandering around is aware of you, though, is with best outdoor motion sensor lights. Nothing scares off a prowler quicker than […]

Top Home Security Systems in Atlanta, GA

Real southern comfort and peace. Atlanta Georgia & surrounding counties – Home to over  half a million people with diverse historical background. The need to be security conscious stems from the latest Forbes ranking of Atlanta as the sixth most dangerous city in the US. This stems from the over  1,427 violent crime rate per […]

Categories

  • Alarm Systems
  • Baby Monitor
  • Deadbolts
  • Doorbell Cameras
  • Fireproof Safes
  • GPS Trackers
  • Guard Dogs
  • Home Security Company Comparison
  • Home Security News
  • Home Security Reviews
  • Home Security Systems
  • Home Security Tips
  • LED Lights
  • Local Home Security Directory
  • Mobile Applications
  • Motion Detector Lights
  • Motion Sensors
  • Phone Security Applications
  • Security Cameras
  • Self Monitored Security Systems
  • Smart Home Devices
  • Smart Locks
  • Smoke Detectors
  • Thermostat
  • Water Leak Detector
  • Wireless Dog Fence

Footer

ABOUT US

We have worked with, alongside and against home security companies for over a decade. We publish the raw data and let you decide whom is best for your home alarm system.

  • Affiliate Disclosure
  • Contact Us
  • Privacy Policy
  • Sitemap

Copyright © 2025