Different authentication methods of a person are analyzed: verification and identification and authentication technologies: by fingerprints, by the pattern of the iris, by a face (2D and 3D recognition), by the veins of hands, by the retina, by the geometry of hands. The advantages and disadvantages of each technology are listed in the article. In conclusion comparative characteristics of biometric systems of monitoring attendance, working on different technologies and recommendations for the selection of technologies for enterprises with different number of employees and safety requirements are presented.
biometrics, verification, identification, recognition
"Yssledovanye modelei y metodov byometrycheskoho kontrolia poseshchaemosty" [Research models and methods of biometric control traffic],
Information Processing Systems,