Objectives: The aim of this paper is to analyze current state of use of biometrics in computer security.
Methods: This paper provides an overview of the most commonly used anatomical-physiological and behavioral biometric identification methods.
Results: The result of the work will be a new set of methods, which allows reliable identification of the user in the most comfortable way.
Conclusions: These new principles of data security will be used to enhance the protection of specialized health record. This will contribute to expansion of generally conceived EHR MUDR concept to other application areas.