Biometrics: Your body is your password

Is face recognition the future of biometric security technology? Or is it too early for this technology to be used in the mass market? Also, after a while, the fingerprint verification mechanism will be related to this field?

In just a few years, biometrics (biometrics) have changed from the original niche security technology to the deployment of every modern smartphone model. Part of this can be attributed to Apple's Touch ID's introduction of fingerprint verification to the mass market, which has led to the current wave of biometrics for the mainstream device security features.

Apple's new iPhone X features a new face recognition function based on infrared (IR) sensors. So, is face recognition the future of biometric security technology? Or is it too early for this technology to be used in the mass market? In addition, on the contrary, will the fingerprint verification mechanism still be relevant to this field after a period of time?

Easy and convenient security verification

Passwords have been used in computer systems for verification operations for decades. Why should biometrics be used instead? The simplest answer is for convenience. Whether it is a biometric system using fingerprints, iris scans or facial recognition, it is much more convenient than passwords, and it actually helps to improve security.

Although the complete passwords of the constituent elements—namely long strings containing random characters and numbers—can be constructed as extremely secure forms of authentication, in fact, such types of secure passwords are hard to remember except for setting difficulties. Therefore, people often set passwords like “abc123” that are easy to guess, or store passwords in a convenient location, which is tantamount to violating the intent of setting passwords.

The iPhone X's Face ID can be used to unlock the mobile biometric security technology using human genetic features as a method of identification, in other words, this password will not be lost or forgotten for a lifetime. Biometrics does not require us to enter a long list of characters. It requires only a simple scan to deliver unique features (eyes, fingerprints, or faces) on the body. At present, the default locking method used by smartphones is biometrics.

However, biometrics are not fool-proof, and it is actually much simpler to steal someone’s fingerprints than to get the passwords they remember. However, the convenience it brings makes it easier for users to use biometric authentication devices and systems to meet user needs, and thus to improve overall average security.

Fingerprint and face recognition

At present, the two most common biometric systems are fingerprint scanning and face recognition, each with its own advantages and disadvantages, and they each play an excellent role in the latest smartphones and consumer devices. Fingerprint Scanner - When Apple introduced the iPhone 5s in 2013, it introduced a fingerprint-based, easy-to-use Touch ID biometric system, but many people did not use passwords on their smartphones at that time. Even with passwords, many people use simple patterns or use up to a short 4-digit PIN. Since the introduction of fast and easy-to-use fingerprint scanning, Apple has launched a revolution in biometrics.

Fingerprint scanners use optical or capacitive elements most often. The optical fingerprint sensor basically takes a fingerprint and then compares it with the fingerprint in the file. Convenient integration is an advantage, but this technique is prone to identification difficulties due to dust, oil, and contaminants, and it is also more misleading than capacitive sensors (like fingerprints).

Capacitive fingerprint scanning is to measure the current, to find out the fingerprint's concave and convex lines. Because it must actually put a finger, it is not easy to get through. In addition, these sensors are more resistant to dust and contaminants, but water can also hinder the identification process. We must admit that capacitive touch sensors are more prone to wear over long periods of time than non-contact type optical sensors unless special measures (such as protective coating, etc.) are taken. Most handheld devices such as smart phones, including the Apple iPhone, use capacitive touch sensors to identify fingerprints.

How special is the fingerprint? The answer seems more complicated than it seems. Each ridge and valley on the fingerprint forms a unique combination. However, once the 3D shape is transmitted to the 2D plane, errors may occur.

Especially for fingerprint scanners, errors are more likely to be amplified. Squeezing your fingers on a small area of ​​the 2D plane can cause serious fingerprint distortion. In addition, the fingerprint scanner on the consumer device must incorporate the function of tolerance, so that the device can be unlocked with some slight sweat or fingers with a deviating angle. Apple estimates that there is a 50,000 chance that the iPhone's fingerprint verification will match someone else's mistake.

In addition, criminals who commit crimes are likely to steal fingerprints, such as stealing directly from a smartphone, creating a model of a finger, and then entering the fingerprint encryption system with the model. Despite this loophole, the fingerprint scanner cannot be used as a security verification method for enterprise, industrial or mission-critical systems, but the convenience of fingerprint verification is still adequate for most consumer applications. In addition, fingerprint scanners can be combined with passwords and other methods to create highly secure two- or three-factor authentication systems for use in enterprise systems and other applications that require high levels of security.

Face Recognition: Apple introduced a new face recognition system in the newly released iPhone X, which uses an IR sensor and is more secure. The new system uses depth sensing technology. The goal is to overcome the challenges that existed in the face recognition, such as disguising adults' faces with photos.

In fact, Android smartphones have used face recognition as one of the verification options for some time, but due to security issues, it has not been widely promoted as a key feature. Android face recognition uses a front-facing camera to take a picture of the user's face, and then uses Google's face recognition algorithm to determine whether it matches.

Samsung added an iris scan to newer Android smartphones to improve facial recognition. This further enhances the specificity of facial recognition because even the genetically identical twins have two iris patterns. It will not be the same. Unlike the face, the iris does not change due to age or health, nor is it affected by hair or make-up, even after a long period of time.

Faces and irises are unique, but image-based biometrics can be deceived by high-resolution photos and can be affected by ambient light conditions. However, it can still be used in environments where environmental lighting, such as airport clearance counters, is controlled and users are monitored and cannot be forged, but it is not suitable for use on mobile devices such as smart phones.

Intel RealSense 400 (Source: Intel) In order to overcome most problems, the latest iPhone X's Face ID uses IR depth sensing technology similar to that used in Intel's RealSense cameras. The latest iPhone's face recognition uses IR sensors and light to obtain 3D images of the face. It is first flooded with IR light on the face, and the IR dot matrix projector projects 30,000 points on the subject’s face, followed by IR. The camera captures IR images and compares them with face recognition data stored on the device.

This type of face recognition system using IR depth sensing is more accurate than a simple appearance-based face recognition system. The system uses depth sensing, so it will not be fooled by photos. In addition, Apple claims that Touch ID's face misjudgment rate is one in 50,000, and Face ID is as low as one in one million. In addition, the IR light is not in the visible light spectrum, so it is not affected by sudden ambient light conditions such as low light sources or bright daylight.

Face ID really foolproof? Although Face ID won’t be fooled by photos, even facial masks such as Hollywood's movie effects grades can't fool it, but according to Vietnamese researchers, they have used 3D printing combined with real-life imitations. Precision process, made a mask that can fool the system.

Even if this system is not absolutely impossible to deceive, but the precise operations and techniques involved in forging Face ID can be seen, facial recognition using IR depth sensing technology is indeed an effective biometric verification method that can be used for consumption. The application brings balanced convenience and security.

Biometric system design

To create a safe biometric system, in addition to selecting a safe biometric method, the storage and retrieval of biometric information must also be encrypted and preferably isolated from the rest of the system.

Apple Touch ID's approach is to achieve this goal through its so-called "Secure Enclave" built-in proprietary flash memory storage space and ARM-based coprocessors. The fingerprint information is processed through a one-way hash function, and the fingerprint is then stored in a memory that is isolated from other elements of the system. After the fingerprint is hashed, it is almost impossible to reverse engineer the fingerprint from memory. In addition, after the fingerprint information storage and processing operations are isolated, even if the smartphone is compromised, the fingerprint authentication system will not be invaded, except that the fingerprint data will not be leaked.

Similarly, Android-enabled handheld devices store encrypted fingerprint data in a secure location within the system called the Trusted Execution Environment (TEE). TEE is isolated from other system components and does not directly interact with user-installed applications.

Choose the right biometric technology

The fingerprint and face recognition capabilities of the new smartphone products have greatly increased the usage of these technologies and promoted their implementation in other consumer devices. Especially for wearable devices and mobile/handheld devices, biometrics is a way to quickly and easily increase security by using an easy-to-use authentication method.

When biometrics is used alone, although it cannot exceed the complete password of the constituent elements in terms of security, its convenience can indeed improve the overall security under practical applications. In addition, it can also be used to improve the two-factor or three-factor verification of existing safety systems.

New Energy Cable

New Energy Cable,4P Closed Wire,Computer Fan Connection Cable,Silicone Wire New Energy Cable

Dongguan ZhiChuangXing Electronics Co., LTD , https://www.zcxelectronics.com