Identity Verification is the process of authenticating users before being granted access to corporate and organizational information and resources. In the past the use of passwords (single factor authentication) was prevalent, however, it is now recognized that this simple approach is just "not" enough. To provide added assurance, a second layer of security was needed. From this evolved what is now called a "two factor authentication"
What is "two factor identification"
Simply put, it is a verification system that puts together "what you know" and "what you have" in combination to form as a valid and reliable credential for authentication.
Identification Verification Partners
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body.
Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.
More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information.
(excerpt from Wikipedia.com)