Abstract
Considers biometric methods of information protection. The comparative analysis of technologies to protect the information using „fuzzy extractors“ and high dimensional neural network converters biometrics code. A description of threats of biometrics systems, neural network authentication. The aim of the article is the analysis of identity authentication methods on the basis of three basic methods: by ownership of knowledge and biometrics. It is also considered the separation of biometrics on the physiological and behavioral resorting to their basic properties – universality, uniqueness, consistency and measurability. Given these factors make the analysis of identity authentication methods and systems using these parameters. The following provides an overview of the technology of information security and personal identification. The last part of the article focused on the analysis of some of the threats to the biometric authentication systems. The article is an analysis of the current status and new opportunities for the development of information security systems.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright (c) 2015 International Journal of Information Technology Applications