SMART Access & identity 2024
BIOMETRICS
CDVI looks at some of the most common misconceptions about biometrics.
Five common misconceptions about biometric access control Source: CDVI I n 2022, the digital identity solutions market was valued at US$28 billion. By 2027, this is expected to rise to more than US$70 billion 1 . Biometrics are everywhere now; 80% of smartphones have biometric identify and repel spoofed or cloned credentials. For example, ievo fingerprint readers are
certified ISOPAD Level 1 compliant. This means that they successfully identify and deny access to fake fingerprints. In addition, ievo readers have liveness detection built in. This technology identifies whether the finger presented to the reader is real skin with live blood flow before granting or denying access. Biometric information can be copied. It cannot be stolen. 2. Facial recognition is an infringement on my privacy There are two types of facial recognition systems: one-to-one and public. This distinction is essential for breaking down this widespread misconception. Public facial recognition systems are those used in places such as casinos and airports. They are generally used for surveillance purposes. Large numbers of faces are scanned and analysed constantly to identify and flag any known individuals. Many people believe public facial recognition systems infringe on their right to privacy. This is where the myth kicks in. While public facial recognition remains controversial, one to-one facial recognition is an entirely different matter. These are the kinds of systems used for access control purposes. One-to-one facial recognition does not scan crowds of unknown people and pick out individuals. They do not have access to any other database besides their own internal system. Therefore, the only faces it recognises are people who manually registered their faces onto the system. Registering your face on a one-to-one facial recognition access control system does not infringe on your privacy. The database of
authentication enabled. This technology is used in banks, law enforcement, airports, healthcare, and daily interactions, but how much do you know about it? For a topic that is so frequently a source of debate in the access control field, it is surprising how many myths about biometrics persist. CDVI looks at some of the most common misconceptions. 1. Biometric information can be stolen Biometric technology uses measurable human characteristics to determine and authenticate identity. It uses physiological factors to distinguish between people. The characteristics that are commonly used for biometrics include: • Fingerprint patterns • Facial features • Voice sounds • Iris patterns • DNA make-up • Hand markings One of the most significant plus points for biometrics is its inherent higher level of security. An access control system that uses cards, tags, or keypad codes is subject to added risks. Cards can be stolen, tags can be lost, and keypad codes can be forgotten or misplaced. Despite the above very prevalent misconception, your biometrics cannot be stolen. Someone cannot physically steal your fingerprints, voice, or iris patterns. These factors can be cloned, but not stolen. Any decent biometric security system will have features to
faces cannot be sold or stolen, and no other unconnected device will be able to recognise your face as a result. If you are still uncomfortable registering your face, many facial recognition systems, such as the ievo iface, offer traditional card-swiping technology. 3. My data is at risk in biometric systems Many people believe that biometric security systems are risky. If your fingerprint image was stolen or hacked, you cannot just replace it like you can a swipe card or keypad code. It is an understandable fear. But fortunately, it is not one you need to worry about. Every security system is different, so we cannot speak for all of them, but we can tell you that your data is safe with ievo biometric solutions.
Continued on page 48
46
www.securitysa.com
access & iden i y 2024
Made with FlippingBook Digital Proposal Maker