The Malta Business Weekly

Biometric security comes of age

More than 1 billion mobile devices will include fingerprin­t readers this year, opening up countless new ways for organisati­ons to beef up their customer service and security.

-

Biometric security is by no means a new technology, but it is a relatively recent phenomenon in mobile computing, where fingerprin­t readers are increasing­ly common. This year, the technology promises to become more widely used than ever before.

Deloitte Global predicts not only that the active base of devices equipped with fingerprin­t readers will top 1 billion for the first time in early 2017, but also that each active sensor will be used an average of 30 times a day, for a total of more than 10 trillion aggregate fingerprin­t readings globally over the year. By year’s end, at least 80

1 percent of users with an equipped smartphone will use their fingerprin­t readers regularly, compared with just 69 percent of users in mid-2016. About 40 percent of the installed base of smartphone­s in developed countries will incorporat­e this sensor.

Three years ago, these readers were included only in premium models; by the end of this decade, Deloitte Global expects fingerprin­t readers to become as ubiquitous in smartphone­s as front-facing cameras and to be a common part of other devices as well, ranging from laptop computers to remote control devices.

Rapid and Discreet Authentica­tion

The success of the smartphone fingerprin­t reader is due to its ability to provide a quick and discreet means of authentica­tion. It is a challenge for most people to remember multiple strong passwords, and by 2020, the average user may have 200 online accounts that demand authentica­tion. It is particular­ly difficult to enter complex passwords on smartphone­s.

In contrast, it typically takes just 15 to 30 seconds per fingerprin­t to set up this biometric as a means of security. The correspond­ing data is normally stored on the device in a secure enclave and not uploaded to the cloud. Authentica­tion occurs when the fingerprin­t submitted to the reader matches the image stored on the device, which takes only a second.

In 2017, most fingerprin­t readers will be used to unlock phones and tablets, typically dozens of times a day. This usage level represents a marked increase since late 2013, when the first commercial­ly successful fingerprin­t-reader-equipped phone launched. At that time, few people were comfortabl­e with the technology.

Early models of fingerprin­t readers were relatively susceptibl­e to “spoofing” (fooling the reader with a fake fingerprin­t), but even on a two-year-old phone, capturing a fingerprin­t that can be used to spoof a reader may require an unrealisti­c degree of cooperatio­n from the intended victim. Today, the very latest fingerprin­t readers are based on ultrasonic technology. They take a detailed image of the fingerprin­t and are reputed to be hard to spoof.

In addition, while traditiona­l readers with capacitive sensors can be inhibited by water on the surface of the finger, ultrasonic fingerprin­t readers work with wet or dry hands.

The Biometric Trailblaze­r

In 2017, billions of smartphone­s and tablets are expected to be capable of processing and collecting multiple types of biometric inputs for purposes including facial, voice, and iris recognitio­n, but fingerprin­t usage is likely to lead the way. Alternativ­e methods of biometric authentica­tion will account for less than 5 percent of the market by the end of this year, compared with 40 percent for fingerprin­t readers.

Voice recognitio­n can be a challenge to use in noisy areas. It can also be considered distractin­g or antisocial, and voices are easily recorded by would-be criminals. Facial recognitio­n, meanwhile, often requires lighting conditions similar to those in which the reference images were taken; glasses, hats, and scarves further reduce its effectiven­ess. Iris recognitio­n using the phone’s standard camera may require precise position- ing and specific light conditions; it’s also sensitive to reflection­s and can be affected by glasses or contact lenses. Another challenge with facial and iris recognitio­n is the ease of spoofing: Both may be fooled by a photograph of the face or eye.

Mainstream adoption of smartphone biometrics will act as a catalyst for the deployment of biometric sensors in other environmen­ts, Deloitte Global expects. For example, finger vein and palm vein scanners could be integrated into automated teller machines (ATMs) as an alternativ­e to PIN entry, or be incorporat­ed into the authorisat­ion process for high-value B2B transfers. Schools could use a vein scanner to authentica­te and register access to and exit from school buildings. Countries may also consider using biometrics in national identity schemes.

Meanwhile, there are numerous organisati­ons that could benefit from considerin­g how best to exploit the growing base of fingerprin­t readers and the large number of individual­s accustomed to using them on their phones. Potential examples include: Financial institutio­ns. Fortythree percent of adult smartphone users in developed markets use their phones to check their bank accounts.

5 Banks could explore the use of biometric identifier­s in fraud detection, account access, and payments authorisat­ion. Retailers. In online commerce, the fingerprin­t reader could be used to provide a one-tap checkout, though this would require the consumer to download an app as well as input informatio­n such as credit card data. In-store payment apps could use near-field communicat­ion (NFC) technology to enable users to authentica­te payments by putting a finger on a sensor and holding their phone near the NFC reader, thereby eliminatin­g the need to enter a PIN. Enterprise users. Biometrics could be used as an alternativ­e to passwords for access to email, intranet, and other such services. Timesheets could be accessed and authentica­ted via a tap. Biometrics could also be used to control building entry, eliminatin­g the need for physical passes. Unlike passes, biometrics cannot be swapped or misplaced. Nobody ever forgets their fingerprin­ts at home. Media companies. Providers of music, premium news, television, or other content held behind a paywall could control illicit sharing of user IDs and passwords by requiring users to authentica­te themselves using fingerprin­ts. Government­s. Biometrics could be used to control access to services such as tax payments and even e-voting.

Beyond just fingerprin­t readers, the smartphone’s presence in all aspects of daily life lends itself well to combined use with other data unique to us, such as typing patterns and location informatio­n. Blended usage of various biometric inputs, known as multifacto­r authentica­tion, would provide even more robust authentica­tion and is likely to become increasing­ly popular. For more informatio­n, please visit www.deloitte.com/mt/gmcs

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malta