Skip to main content

Misinformation about Biometric Technology Continues to Fuel Functionality Misconceptions

Today, we came across the following blog post from Guy Huntington at Infosec Island:
In the post, the author discusses the inherent dangers of opting into a biometric identification system by providing your fingerprint and the possible negative privacy and identity theft consequences if a user does not make sure that their biometric template is deleted from the system if they leave or opt-out.
Our take: While we are always pleased to see biometric technology pop up in the news or through blog postings, we often cringe when we see these types of articles that essentially do not accurately depict biometric technology, and leave readers with ill-conceived perceptions about how the technology actually works.
Anyone who works in the biometric industry can attest to the fact that there is never an image of a user’s fingerprint stored. The truth of the matter is that biometric enrollment templates stored on a server are not actually an image of the fingerprint at all. They are a mathematical representation of the data points that a biometric algorithm extracts from the scanned fingerprint. The algorithm then uses the template to positively identify a user during subsequent fingerprint scans. No image of the fingerprint is ever stored or transmitted across a network. In addition, the algorithm is “one way” which means that the template that is extracted is nearly impossible to be used to recreate the original fingerprint image. In other words, it is nearly impossible to reverse engineer the data that is sent to positively identify a user and successfully “steal” their biometric identity.
After understanding the truth behind the technology, this leaves us with the question, “Where is the fear of identity theft?  Privacy issues?”  Furthermore, we can’t seem to make a connection with the logic in this blog post about what exactly a criminal would do with a fingerprint image (if they could ever possibly re-create it which is nearly impossible) if they were to obtain it?  9.9 times out of 10 biometric systems do not associate names with a biometric template so how would the criminal/hacker know whose biometric information it actually is?
We continue working tirelessly to vociferate with the technology media and pundits to please make sure that you understand the science behind biometric technology before writing these types of articles.  The only objective that a posting like this achieves is fueling misconceptions and falsehoods about biometrics and how the technology works.  In addition, we stand behind our software as being secure and protecting an individual’s privacy and the potential for identity theft.  We hope that our words and actions will have an impact on spreading the truth about biometric technology and its benefits.

Comments

Popular posts from this blog

Biometric Authentication to Stop Money Laundering in Pakistan

Recently The State Bank of Pakistan has mandated all of its banks to start verifying all of their account holders using biometric technology. The goal of this exercise is to stop money laundering in Pakistan. In the past; opening a bank account only requires the account holder’s details in printed/written form along with their id cards. However, after this current announcement, to open a bank account in Pakistan, one has to provide biometric data using an e-registration system. This procedure is also applicable for those who have registered before without biometric verification process. Many private banks throughout the globe have already deployed biometric identification solution to reduce fraud at their banks. Biometric technology help banks to know their customers better and revolutionize their KYC process. After implementing the biometric solution from M2SYS for customer identification in the microcredit loan process, this helped Grupo Monge (Costa Rican Capital Corpor...

Enterprises to Adopt Biometric Middleware Solutions in Next 10 Years

According to a recent report by FactMR, the biometric middleware solution market is likely to see more demand in the coming years. This kind of solution facilitates enterprises to rapidly deploy biometrics solutions without any development hassles within a very affordable budget and the demand is rising dramatically. What is Biometric Middleware? Biometric middleware is a ready software solution that facilitates biometric identification (1:N) or authentication (1:1) functions for desktop or web applications with the help of a biometric scanner and a biometric matching engine. When using biometric middleware, it’s just a matter of hours to deploy a full-fledged biometric system. Some middleware solutions, like Hybrid Biometric Platform by M2SYS, even comes with support for multiple biometric modalities like the fingerprint, finger vein, iris, and facial recognition. Market Scenario Research conducted by Fact.MR disclosed their report on the market size of biometric middlewa...

Iris Recognition vs. Retina Scanning – What are the Differences?

In biometrics, iris and retinal scanning are known as “ocular-based” identification technologies, meaning they rely on unique physiological characteristics of the eye to identify an individual. Even though they both share part of the eye for identification purposes, these biometric modalities are quite different in how they work. Let’s take a closer look at both and then explain the similarities and differences in detail: Retinal Scanning:  The human retina is a thin tissue composed of neural cells that are located in the posterior portion of the eye. Because of the complex structure of the capillaries that supply the retina with blood, each person’s retina is unique. The network of blood vessels in the retina is so complex that even identical twins do not share a similar pattern. Although retinal patterns may be altered in cases of diabetes, glaucoma or retinal degenerative disorders, the retina typically remains unchanged from birth until death. (Source: Wikipedia) ...