In recent years, biometrics they have rapidly expanded to consumer applications such as the financial market for customer authentication to payment services and the extraction of cash from ATMs in high fraud markets. However, its adoption as an additional authentication factor for physics access Control systems (PACS) and other business applications have not been as fast. But this is changing.
Biometrics offers numerous benefits at the door and throughout the company. With the advent of new anti-phishing capabilities and their integration into trusted secure platforms that protect privacy and support a variety of RFID credentialing technologies, biometric authentication is ready to offer a much better and better match rate. general performance
This will dramatically improve the security of an organization while improving the user's convenience.
Biometrics fuses comfort and security by validating "true identity" versus the identity associated with owning a I.D card. As an example, biometrics prevents a user from taking another person's card and gaining access to privileged resources.
This adds the human element to traditional authentication methods, strengthening security by combining something that the user "is" with something that the user "has" or "knows".
According to the firm ABI Research in its study of May 2018. Biometric technologies and applications, it is estimated that the total shipments of fingerprint sensors for the entire consumer market "will reach 1,200 million worldwide by 2018, thus ensuring its dominance in the market."
Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its wider adoption in the company. While price has been a major obstacle, historically there have also been other reasons for its slower-than-expected growth.
First, many technologies remain vulnerable to counterfeiting and hacking. It has been too easy for scammers to create a fake fingerprint and present it to a reader. Equally problematic, older products have not been able to move users through doors as quickly as a simple identification card and reader.
In general, all fingerprint capture technologies are not equal among previous products, and there may be significant differences in performance.
The newest solutions are overcoming these security and convenience obstacles to help realize the full potential of biometrics. Its development has focused on three key areas:
1) how fingerprint images are captured (if the image can not be captured correctly, the rest of the process fails);
2) the implementation of life detection to improve confidence (even if the image is captured correctly, if it is false, the system can not be trusted); Y
3) Optimize performance through a combination of new technology and algorithms while ensuring interoperability for reliable performance.
The quality of the captured image is critical in all types of fingerprints and environments. Many customers choose sensors that use multispectral images because they collect information from inside the finger to increase the available fingerprint data. The skin is illuminated at different depths to provide much richer data on the surface and the surface characteristics of the fingerprint.
In addition, the sensor collects data from the finger, even if the skin has poor contact with the sensor due to environmental conditions such as contamination with water or fingers. Multispectral sensors work for the widest range of people with normal, wet, dry or damaged fingers, in the widest range of conditions of use, from lotions or grease to sunlight and humid or cold conditions.
The sensors also resist the damage of aggressive cleaning products and the contamination of dirt and sunlight.
Vitality detection is the ability to determine that the biometric data captured by the fingerprint reader comes from a real person, not from a fake plastic or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, life detection is critical to preserve confidence in the integrity of biometric authentication. At the same time, it should not impede performance or result in excessive false rejections of users.
The most reliable multispectral fingerprint sensors with vitality detection provide a real-time determination that biometric captures are genuine and are being presented by the rightful owner, rather than personified. This capability takes advantage of the image capture approach of using different colors or light spectrum to measure the surface and subsoil data within a fingerprint.
In addition to this optical system, the biometric sensor has several core components, including an integrated processor that analyzes the raw image data to ensure that the sample being taken is a genuine human finger instead of an artificial or false material. Advanced machine learning techniques are used so that the solution can adapt and respond to new threats and counterfeits as they are identified.
While life detection and underlying capture technology optimize performance, it is also important to ensure that this performance is reliable. This requires adequate testing to ensure interoperability with template matching algorithms.
The highest performance solutions capture biometric data usable on the first attempt for each user. They also accelerate the process of determining that biometric data are not false, and quickly perform template comparison to reject impostors and legitimate users. However, to rely on this performance, the focus must be elsewhere: on interoperability with template matching algorithms.
Extensive interoperability testing should be performed by independent and independent third parties such as the National Institute of Standards and Technology (NIST) so that performance data can be reliably available in all matching modes, and not simply a claim from the provider.
Integration of physical access control
The first requirement to incorporate biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment.
The platform should take advantage of credential technology that employs encryption and a software-based infrastructure to ensure reliable identities in any form factor for physical access control, access to IT networks and more.
Cryptography prevents man attacks in the middle and also protects the biometric database. This system should also cover the remote administration of all readers and users, covering all the activities of incorporation, loading of templates and registration for the accepted authentication modes.
Other important areas of focus include configuration and administration, in addition to all records, reports and monitoring. It should be possible to manage biometric readers as groups or individually through the network, and tools should be available to allow system administrators to manage all configuration settings from the moment and data to language, security and synchronization.
The system should enable continuous real-time monitoring of authentication, alerts and system status, and provide a broad set of associated reporting tools.
You should also make back-end implementation decisions, including how a biometric authentication system will seamlessly integrate into third-party systems. This is another important point of the pain of biometric technology. To simplify implementation, application programming interfaces (APIs) must be available for the direct integration of the biometric authentication solution with the access control infrastructure.
Properly implemented biometric solutions with life detection also protect privacy: if you can not use a false finger, even if you obtained someone's fingerprint information, it does not make sense. Robust, up-to-date life protection is critical if biometrics should eliminate the need to use PINs or passwords.
Biometric data should be handled like all confidential and identifying information, and properly designed systems designs will always consider and protect against internal and external threats and attacks.
New systems architectures and data models have been created to protect personal information and maintain user privacy.
Beyond the encryption of the data itself, there are now many good alternatives available to create highly secure and well-protected systems, including the use of multifactor and even multimodal authentication to maintain security, even if some identification data is compromised.
Today's modern fingerprint authentication solutions are on a fast track to offer a unique combination of ease of use, availability and convenience, and increased security for physical access control systems. With its latest improvements in life detection, system architectures, performance and capacity to easily join access control solutions, they perfectly combine security and convenience to make them a viable option when accessing facilities, networks and services. .
These solutions provide greater confidence of "who" is being admitted through the main door of the building, where it really matters.
By Wayne Pak, Director of Product Marketing with HID Global.