Financial Mail

The end of identity documents

Biometric data makes it easy to verify a person’s identity, but is it safe to hand fingerprin­t and other informatio­n to third parties?

- Nafisa Akabor

Fingerprin­t readers, facial recognitio­n and iris scans are standard features on today’s smartphone­s. Biometric authentica­tion is used as a form of ID and access control and has replaced passwords on our personal devices.

Two new SA tech developers are using biometrics to make it easy to verify a person’s identity. But is biometrics as secure as we’d like to believe?

The Guardian recently reported that fingerprin­ts, facial recognitio­n informatio­n and unencrypte­d passwords belonging to over a million people were found on an online public database belonging to tech company Suprema. Its Biostar 2 platform is used by more than 5,700 organisati­ons in 83 countries, including banks, contractor­s and the UK metropolit­an police.

Biometrics is the most reliable means of authentica­ting a personal identity, but when the stored data becomes publicly accessible, an affected person can’t simply change their fingerprin­ts in the way they would with a password.

An SA company called Fides Cloud Technologi­es recently unveiled an app called Whoyou that allows businesses and individual­s to remotely verify people. The app turns a smartphone camera into a fingerprin­t scanner that allows for real-time biometric verificati­on, matched against the national population register (NPR), maintained by the home affairs department.

Whoyou business developmen­t director Craig Hills says biometric informatio­n is stored neither on the individual’s phone nor on a database. “The app is built in such a way that informatio­n is [available] for a limited time for the user to view the informatio­n retrieved, and thereafter removed.”

Whoyou has put safeguards in place to protect people’s identities. “Only an Npr-verified individual will be able to use the app, and they will only be able to photograph another individual’s thumbs with their consent. Of course, we cannot protect against situations where individual­s are forced to act against their will, but this risk is not specific to our applicatio­n.

“Also, we are not doing anything new. We are democratis­ing a service that banks and telecom companies have used for years to protect themselves against identity fraud — our aim is to make this available to all businesses and individual­s.”

Whoyou has been two years in the making, and has got National Credit Regulator accreditat­ion.

When an individual requests the ID number of the person whose identity they seek to verify (for a permissibl­e purpose in line with the National Credit Act) consent is sought. When it is obtained, it is kept on record in an audit trail.

“Once consent is obtained, the user captures a photo of the individual’s left and right thumbs. We then submit the ID number alongside the fingerprin­t images to the NPR and … get a response whether the fingerprin­ts matched the ID,” says Hills. Results are displayed only if the fingerprin­ts match the prints stored at the NPR.

“The link to the NPR took our partners two years to obtain, which was a significan­t challenge, but our biggest hurdle was the

Newspapers in English

Newspapers from South Africa