{"id":841,"date":"2015-11-13T14:39:32","date_gmt":"2015-11-13T11:39:32","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=841"},"modified":"2019-06-10T18:25:20","modified_gmt":"2019-06-10T15:25:20","slug":"biometric-authentication-pros-and-cons","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/biometric-authentication-pros-and-cons\/","title":{"rendered":"Biometric Authentication Pros and Cons"},"content":{"rendered":"<blockquote><p>If someone steals your password, you can change it. But if someone steals your thumbprint, you can\u2019t get a new thumb. The failure modes are very different.<br \/>\n\u2013 <a href=\"https:\/\/www.schneier.com\/blog\/about\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Bruce Schneier<\/a><\/p><\/blockquote>\n<p>The popularity and availability of information technologies are constantly increasing. And at the same time increases the number of threats associated with their use. The main one is the danger of critical information leakage &#8211; both personal and corporate. Thus, today data protection is the most important area of computer security experts\u2019 work.<\/p>\n<div id=\"attachment_4777\" style=\"width: 360px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4777\" class=\"wp-image-4777\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/fingerprint-authentication1-2.jpg\" alt=\"Biometric authentication by fingerprints\" width=\"350\" height=\"350\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/fingerprint-authentication1-2.jpg 721w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/fingerprint-authentication1-2-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/fingerprint-authentication1-2-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/fingerprint-authentication1-2-610x610.jpg 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/fingerprint-authentication1-2-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/fingerprint-authentication1-2-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/fingerprint-authentication1-2-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/fingerprint-authentication1-2-184x184.jpg 184w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><p id=\"caption-attachment-4777\" class=\"wp-caption-text\">Fingerprint authentication<\/p><\/div>\n<p>The first and foremost method to prevent unauthorized access to any confidential information is to keep a wary eye on the legitimacy of users who have an access to it. The modern level of technology development allows solving this problem quite efficiently.<\/p>\n<p>More and more often different companies introduce <a href=\"https:\/\/www.protectimus.com\/\">two-factor authentication<\/a>. In 2FA entering the login and password is just the first step. The additional step of authentication is the use of the one-time password. But to put an insurmountable barrier for hackers, we need one more obligatory component: the users\u2019 desire to apply the experts\u2019 achievements and to follow their recommendations. Yet, modern users want authentication to be not only reliable but also easy. That is why they not always activate 2FA on their accounts.<\/p>\n<p><strong>Biometric authentication<\/strong> has become one of these easy \u2018magic\u2019 tools, which can make 2-factor authentication more popular. It seems what could be easier and more reliable? Each person has unique fingerprints, voice, facial features. They are always with us, we cannot lose them. And modern gadgets are advanced enough to read and analyze these identifiers.<\/p>\n<p>Not only ordinary people but also serious organizations fall for biometric magic. British banks have introduced biometric fingerprints for customer\u2019s login. This technology has long been used to unlock the Apple&#8217;s smartphones. Now, this feature is being introduced into new Android smartphones models. Master Card is working hard to introduce selfies as the authentication method. Among other popular biometric authentication methods are the retina or iris scanning, authentication by a finger or palm venous patterns, by voice, pulse or even <a href=\"https:\/\/www.protectimus.com\/blog\/selfie-based-authentication\/\">selfie<\/a>.<\/p>\n<p>Is it convenient? Yes. Is it reliable? Well, this needs further investigation.<\/p>\n<h2>What dangers can we meet using biometric authentication?<\/h2>\n<div id=\"attachment_4778\" style=\"width: 360px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4778\" class=\"wp-image-4778\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/selfie-based-authentication-1.jpg\" alt=\"Biometric authentication by selfie\" width=\"350\" height=\"350\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/selfie-based-authentication-1.jpg 721w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/selfie-based-authentication-1-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/selfie-based-authentication-1-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/selfie-based-authentication-1-610x610.jpg 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/selfie-based-authentication-1-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/selfie-based-authentication-1-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/selfie-based-authentication-1-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/selfie-based-authentication-1-184x184.jpg 184w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><p id=\"caption-attachment-4778\" class=\"wp-caption-text\">Selfie-based authentication<\/p><\/div>\n<ol>\n<li><strong>Imperfect equipment<\/strong>. Since any biometric parameters are usually checked with average smartphones, which differ in quality, there is a probability of false negative result. For example, the system may consider the fingerprint suspicious because of a simple cut on a finger. Thus, it may refuse to recognize the authenticity of the owner of the account. In the case when the system uses multifactor authentication, and biometric data is just one of its components, the identification can be realized by an OTP (one-time password). But when biometric authentication is used as the second factor of 2FA (two-factor authentication) there is no possibility of one-time password check. The user will never be able to sign in because of this false alarm.<\/li>\n<li><strong>Not only law-abiding citizens use the fruits of technical progress<\/strong>. Attackers quickly become aware of the latest technological innovations. For example, several years ago there was a program that allowed you to add to a video a virtual replica of the person\u2019s photo in real time. Today hackers can use such program to cheat the face scanner. They can show the dynamic moving video clone of the person, whose account they are trying to compromise. The same trouble is with fingerprints. They may be faked easily by a three-dimensional latex mold or glove. Even a high-resolution photo of a potential victim\u2019s palm is enough for the initial sample.<\/li>\n<li><strong>It\u2019s difficult to recover the compromised data<\/strong>. If the password is intercepted, you can change it in a couple of minutes. The recovering of a stolen credit card or hardware OTP token takes a bit more time, but it\u2019s still possible. But in the case when the biometric parameters, which belong to the person from his or her birth, are compromised de facto the identity stealing takes place. The biometric parameters cannot be changed as easily as the password or electronic card.<\/li>\n<\/ol>\n<h2>Is it worth to use biometrics for authentication?<\/h2>\n<p>As an extra option for multifactor authentication, or in cases not connected with the access to especially important information, the use of biometrics is appropriate. For example, if the fingerprint acts as a pass in a gym, it is quite convenient. There is no need to carry a membership card all the time.<\/p>\n<p>When it is not a gym, but a bank account, it is more reliable to use other authentication methods. Such proven tools like tokens or OTP passwords delivered via SMS will protect important information much better than newfangled retina scan.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>If someone steals your password, you can change it. But if someone steals your thumbprint, you can\u2019t get a new thumb. The failure modes are very different. \u2013 Bruce Schneier The popularity and availability of information technologies are constantly increasing. And at the same time increases the number of threats associated with their use. The [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":4519,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3],"tags":[16,101,118,120,99],"class_list":["post-841","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering","tag-2fa","tag-biometric-authentication","tag-data-protection","tag-multifactor-authentication","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=841"}],"version-history":[{"count":11,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/841\/revisions"}],"predecessor-version":[{"id":4779,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/841\/revisions\/4779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4519"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}