5 Technologies That Are Making Fingerprint Biometrics More Secure

Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn

It common knowledge that biometrics technology is the most secure protocol for identity authentication across a wide variety of industries.

For example, in consumer markets, the Apple Touch ID technology helps keep the iPhone secure. Here’s how it works. First, Touch ID uses a detection ring to sense that the user’s finger is on the scanner, which turns the system on. By only turning on when it’s needed, the touch-to-wake function helps preserve the device’s battery life. The sensor scans the user’s fingerprint through the embedded crystal-clear Sapphire Lens. Fingerprint data is stored securely on the A7 processor within the iPhone 5S — encrypted and safely stored away from the hard drive. It never leaves the phone and never gets stored in its flash memory. If the fingerprint scanned matches the template set, the A7 chip allows the phone to be unlocked. If not, an error message appears and the phone remains locked1.

Apple’s newer innovation — Face ID — works in a similar way. It provides intuitive and secure authentication enabled by the state-of-the-art TrueDepth camera system with advanced technologies to accurately map the geometry of the user’s face2. The TrueDepth camera captures accurate face data by projecting and analyzing over 30,000 invisible dots to create a depth map of the user’s face. It also captures an infrared image of the face. A portion of the neural engine of the A11, A12 Bionic and A12X Bionic chip — protected within the Secure Enclave — transforms the depth map and infrared image into a mathematical representation and compares that representation to the enrolled facial data3.

Biometrics technology is white-hot. In the U.S. alone, biometrics tech is a $5bn industry — and growing4. Consumer acceptance of biometric security enhancement features is at an all-time high. People not only accept that they may need to use their fingertips, irises, faces, voices or palms to secure their transactions — but they understand that doing so makes things safer and easier. That level of comfort and trust are invaluable.

These are a few of the biometric security protocols in business and commerce that people participate in daily:

  • Touch ID & Face ID: Apple’s security measures, as well as comparable features on competitor smartphone and tablet brands, add an additional layer of security to our personal devices
  • Voice authentication: Airlines, financial institutions and other businesses are increasingly relying on spoken passphrases
  • Palm identification: By securing payment terminals with sensors to read vein patterns, credit card issuers and other financial institutions have created a security system that is virtually infallible

And now, in the cryptocurrency cold wallet market, ITBiometrics has launched the revolutionary ITBx Cold Wallet — a leading cold storage solution for cryptocurrency holders with state-of-the-art thermal signature authentication technology5.

The following are the top five breakthroughs that are making integration of biometrics in platforms more secure.

Breakthrough 1: Smartphones Can Be Used as Biometric Sensors

Because most people carry a sophisticated mini-computer (i.e., a smartphone) with them at all times, there’s tremendous potential for on-the-go, sophisticated biometrics.

Industry innovators have created ingenious solutions to correct issues such as variation in on-the-go environments. For example, Iraq uses an automated border control system using more than 100 mobile biometric checkpoints serving more than one million registrants using an ABIS biometric identification system6.

Breakthrough 2: Combining Two or More Biometric Security Features for Added Security

So-called multimodal biometric authentication systems7 provide a great way to capture reliable and foolproof confirmation of a person’s identity. For example, Mass Contracting Co. WLL is a manufacturing and construction company in Bahrain. In order to confirm attendance of workers onsite, the company uses a “multimodal solution with both a fingerprint and finger vein modality.”8 This controls for any read errors due to the construction workers’ dry, cut or damaged fingers9.

Breakthrough 3: The Cloud Provides Portability and Remote Access

Using cloud-based biometric systems helps save the cost of maintaining a physical server. This allows for increased agility and speed in scaling.

Breakthrough 4: Companies Offering Biometric Security Measures Are Increasingly Handling Workflow with a Top-Down Solution

Many components go into the creation, maintenance and successful operation of a biometric security system. That’s why many companies in the industry are turning to vertical specialized systems that integrate data collection, privacy protection and other services, in addition to basic biometric authentication10.

Breakthrough 5: Biometric Single Sign On (SSO) is Fast Overtaking Passwords as the Preferred Security Measure

Hackers, data breaches, brute force attacks.

Many companies have realized that the old way of doing things — securing sensitive info with passwords — is too vulnerable. Passwords can be overheard, forgotten or guessed.

Biometric authentication measures can’t.

That’s why SSO is so attractive — it’s more secure, more sophisticated and it provides for a much more seamless sign-in experience.


This article was published by ITBiometrics, Inc. a leading biometric hardware and software technology company that provides user-authentication services to consumers, businesses, and governments. The ITBiometrics Platform enables developers to build high-security software solutions using the trusted ITBiometrics fingerprint reader and hardware SDK. To learn more, visit www.ITBiometrics.com.

  1. https://www.apple.com/iphone/#video-touch
  2. https://support.apple.com/en-us/HT208108
  3. https://support.apple.com/en-us/HT208108
  4. http://www.m2sys.com/blog/guest-blog-posts/5-ways-biometric-technology-is-used-in-todays-business-world/
  5. https://itbiometrics.com/
  6. http://www.m2sys.com/biometric-fingerprint-software-case-studies-iraqi-border-control/?utm_source=recent%20trends%20biometric&utm_medium=blog%20post&utm_campaign=blog
  7. http://www.m2sys.com/blog/mobile-biometrics-2/5-recent-trends-in-biometric-technology/
  8. http://www.m2sys.com/blog/mobile-biometrics-2/5-recent-trends-in-biometric-technology/
  9. http://www.m2sys.com/blog/mobile-biometrics-2/5-recent-trends-in-biometric-technology/
  10. http://www.m2sys.com/financial-services-biometric-identification-solution-certisid/?utm_source=recent%20trends%20biometric&utm_medium=blog%20post&utm_campaign=blog

More to explore