What is retina scan? - Definition from WhatIs.com
Part of the Authentication glossary:

Retina scanning is a biometric verification technology that uses an image of an individual’s retinal blood vessel pattern as a unique identifying trait for access to secure installations.

Biometric verification technologies are based on ways in which individuals can be uniquely identified through one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, voice waves, DNA and signatures. 

Retina scanners are in use in many military bases, nuclear reactors and other high-security locations due to their strength as a security measure. Retina scans are nearly impossible to fake. Furthermore, because the retina decays so quickly after death, a scan can only be accessed from a living human.

Although some smartphone apps claim to be based on retina scanning they are usually based on iris scanning, a method of identifying people based on unique patterns within the ring-shaped region surrounding the pupil of the eye. Retinas scans are about 70 times more accurate than iris scans and 20,000 times more accurate than fingerprint-based methods. However, a retina scan does require the subject to focus on a single point for the entire 15-second duration.

Retina scanning goes back as far as 1935 in conception, by Doctors Carleton Simon and Isadore Goldstein. Commercialized use goes back to 1984 with the company Eyedentity, which pioneered the first devices that used retina scanning technology.

This was last updated in July 2014
Contributor(s): Matthew Haughn
Posted by: Margaret Rouse

Related Terms

Definitions

  • grid authentication

    - Grid authentication is a method of ensuring that an end user is who he claims to be by requiring him to enter values from specific cells in a grid whose content should be only accessible to him and... (WhatIs.com)

  • universal authentication

    - Universal authentication is a network identity-verification method that allows users to move from site to site securely without having to enter identifying information multiple times. (WhatIs.com)

  • soft token

    - A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for... (WhatIs.com)

Glossaries

  • Authentication

    - Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question
  • Biometric based secuity system

    Hi, I've done alot of contracting for the MOD and USAF on bases in the UK. To put it bluntly, dont use the above methods if high security is needed; all can be bypassed. Certainly do not opt ...

  • Need opinions on severity of security risk from vulnerability scan

    Item #2 is your answer. Why be concerned if you don't have to be compliant? I would also ask EEye what the report means on this specific vulnerability. In a way it may be saying just turn off opt...

  • Change copier FTP anonymous access

    Yes they can. we currently use Savin copiers and we have an account setup on our domain that we setup on the copier with password to scan to folders on the domain through an SMB connection.

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.