Different fingerprint identification authentication technologies are not “born equal”

The phrase "Everyone is born equal" has become a famous saying by the reference of the third President of the United States, Thomas Jefferson, in the Declaration of Independence. This concept of equality, although historically long, may not be applicable to biometric security technologies, as not all fingerprinting authentication technologies are “born and equal”.

In the field of biometrics, fingerprint identification authentication technology is used to protect the security of data accessed by devices and devices and to ensure transaction security. Although fingerprint recognition technology has been widely used in the above fields, the similarity of different fingerprint recognition technologies is limited to this. Fingerprint identification authentication techniques vary and the level of security that can be provided is different.

In order to fully understand the differences between fingerprinting authentication technologies, let us introduce a little background.

The advantage of using biometrics to identify a user's identity is that the user authentication process is more secure and the verification process is more convenient because no password is required. To date, fingerprint recognition technology is the easiest and most affordable biometric technology available.

Fingerprint recognition technology is easy to use and inherently deterministic, so it is the core technology used by mobile devices for user identification and verification. In addition, in point-of-sale transactions, fingerprinting technology has also played an increasingly important role, such as retail stores, banks, and facilities.

The basic requirement of fingerprint recognition technology is to compare with a known image representing the user's fingerprint. The sensor is used to store the fingerprint image during the initial "entry" process. This initial image is a known image representing the user's fingerprint and will be used for each subsequent visit and authentication. Please note: To ensure user privacy, the best practice is to store the encrypted proprietary fingerprint image template instead of storing the actual fingerprint image.

At present, in the fingerprint identification authentication, the host matching technology is often adopted. At this time, the fingerprint identification module acquires the fingerprint image and sends the image data to the main processor or other external processor for processing. Although host matching technology is currently popular among many smartphone manufacturers, even in a trusted environment, host matching technology is vulnerable to malware and other attacks against host systems. Therefore, host matching technology simply cannot be compared to a new technology called Match-in-Sensor.

In terms of device security threats, on-chip matching significantly improves the level of protection. Chip internal matching uses a custom, packaged, single-chip system (SoC) architecture that isolates fingerprint registration, fingerprint pattern storage, and biometric matching from the host system, all within the device's fingerprint sensor. In contrast, host matching techniques have neither processing power nor memory to perform these operations, so the host (or a separate processing unit) must be relied upon to perform the matching function.

On the one hand, mobile payments are increasingly relying on fingerprint-based authentication. On the other hand, smartphone manufacturers and users are paying more and more attention to security risks and threats. Therefore, in response to these security threats, chip internal matching technology has become more important.

SynapTIcs is the industry's first solution for fingerprinting and matching in the overall packaged hardware, and is the only company in the industry to offer such solutions. This solution enables customers to offer significantly enhanced protection in their products. The on-chip matching solution stores the collected and managed data in the sensor, completely isolated from the host system, thus avoiding the host system's vulnerability to hackers. These sensors also do not store real fingerprint images, but instead create a template encrypted with 256-bit AES technology. This encryption algorithm cannot be reconstructed. Even if the host system encounters a security threat, the biometric data is still safe because the data is always within the fingerprint sensor module.

The chip internal matching technology can provide strong security protection for many applications, such as smart phones, tablets, personal computers, computer mice and keyboards, docking stations, cars, etc., and the security is higher than the host matching technology. At present, in order to protect the security of e-commerce, financial transactions and medical records, relevant legislative work is underway, so companies need to use chip internal matching technology to meet strict legal and regulatory requirements.

SynapTIcs offers sensors that use this new chip internal matching technology, enabling SynapTIcs to take a significant lead in biometric data security. As our new in-chip mating solutions become more widely used, it will become increasingly clear that although different biometric matching technologies look similar, not all fingerprinting authentication technologies are available. It is "born and equal".
This article is selected from the electronic enthusiast "Security Technology Special Issue", more quality content, download now

Plant Protection Machine Battery

Langrui Energy (Shenzhen) Co.,Ltd , https://www.langruienergy.com