What's true and what's not when it comes to fingerprint sensors and multifactor authentication on mobile devices?
It seems a day can't go by without a story in the news about hacking. As more and more of our personal and business lives are transacted online, the internet has become the attack vector of choice for many criminals and other bad actors attempting to steal valuable personal information or company IP. This increase in hacking makes smartphones and PCs highly attractive targets for cybercrime. This, in turn, has led to the use of fingerprint sensors as a means to properly identify a device's legitimate user.
However, lots of misinformation swirls about the fallibility of fingerprint sensors. As a result, it's come time to examine the facts about fingerprint sensors and the erroneous belief that they can be easily hacked.
Not true. Despite what you see in the movies or in security demos, spoofing a fingerprint by taking a high-resolution photo or recovering a latent print is very difficult. This method is called an "attack spoof" and is logistically challenging. Very few criminals would use this method, and typically only on an extremely high-value target, not your average consumer.
One reason this #1 myth persists is that creating a spoof is easy to demonstrate if the target is a willing participant. With practice and patience, you can create a spoof of your own fingerprint by carefully creating a mold from a number of substances, such as glue and clay. But even that isn't trivial, and new anti-spoofing algorithms constantly make it more challenging.
Not true. A smartphone or PC that observes basic privacy and security principles never stores a complete image of your biometric information. It converts the information into a "template," where certain parameters are retained and the rest are thrown away. The template is then encrypted when the abstracted data is stored.
Since the template contains only certain details about the scanned image, but not the image itself, recreating a fingerprint from the template data isn't possible. So even if the fingerprint template is somehow extracted, decrypted and read, the data is useless for recreating the original fingerprint image. This basic principle applies to both optical and capacitive implementations.
Not true. As stated in Myth #2, no fingerprint image will be stored in your PC or phone. Because fingerprint images aren't stored, they can't be stolen from your device.
Partially true. The easy part is that many mobile devices already have fingerprint sensors and front-facing cameras, so expect to soon see the ramp up of multi-factor authentication based on your fingerprint and face (Figure 1). Other combinations, including iris and voice recognition, will likely follow.
|Figure 1.||This smartphone features support for biometric-based
The hard part is that combining multiple biometric factors into a single trust score is a complex mix of science and art, and the algorithms to do so need to be thoroughly verified. However, expect to see it become available later this year. Eventually we will see a robust ecosystem in place to support a ubiquitous, multi-factor authentication experience across different platforms and applications.
True, but… it should say that contextual factors "alone" aren't enough to secure a mobile device. In combination with biometric authentication, they can be part of an overall very strong and user-friendly solution. For instance, today's smartwatches can stay unlocked until you take them off. In the future, your device will be able to use contextual factors such as location, proximity, room monitoring, etc. to stay unlocked as long as you are in your office, or to authorize transactions without additional authentication.
Not true. Fingerprint sensors are available in a broad range of form factors, including slim sensors that fit within the power button on the side of a phone. New sensors also work under the cover glass and detect fingerprints so that the physical home button can be eliminated, enabling edge-to-edge infinity displays. Looking forward, we will see solutions where the entire display can effectively scan a fingerprint from anywhere on the screen. (Note the smartphone in Figure 2 uses an under-glass fingerprint sensor).
|Figure 2.||Multifactor authentication support can unlock a smartphone in
situations where access to fingerprints isn't available.
Not true. Once a user's identity is established, there are myriad ways that information can be put to productive use. For example, it can be used to customize the user experience, or to select preferences. Here's a driving example: scanning fingerprint on start button sets seat, mirrors, and infotainment options to match the user (or even identify who's driving the car so that data can be used by the insurance provider/rental car provider, etc.). In a smart home, scanning your fingerprint could unlock a door, start preferred lighting and mood music settings, and restrict access to certain home features or locations (for time-shares or AirBnB rentals).
Not true. Technology advances have now made optical sensors small and efficient enough to be used in mobile devices, and they will be shipping in volume in the near future. Better still, some optical sensors generate a more in-depth fingerprint image, allowing for more details about a fingerprint to be used in the fingerprint template.
Not true. Fingerprint-sensor providers offer distinctly different solutions spanning different technologies (e.g., capacitive vs. optical), varying security levels, form-factor options, power consumption, durability, and notably software solutions.
It isn't just about a hardware-based fingerprint sensor. It's a two-prong solution: hardware and software working together, and both elements need to incorporate security features. Going the cheap route could expose liability to phone makers or someone in the mobile payment ecosystem down the line if proper security measures aren't implemented.
Not true. Fingerprint solutions are more secure than typical username/password configurations in enterprise environments. They also eliminate cumbersome password resets and IT support calls, making them easier to maintain and support. In today's cloud-based business world, where devices can connect to corporate networks from anywhere in the world, this is critical. Furthermore, legacy PCs without a biometric solution can easily be retrofitted with one via a peripheral USB dongle-based fingerprint sensor or a mouse with embedded fingerprint sensor.
Not true. The purpose of encryption is to protect the template file while it's being stored, generally in a small amount of non-volatile RAM (NVRAM). However, many occasions arise when the template must be decrypted, most notably during the test for a match. It must also be protected during these operations.
A range of security architectures will tradeoff between security and cost. These solutions include:
You may have to register before you can post comments and get full access to forum.