FB pixel

Synaptics executive compares fingerprint authentication methods

 

In a report in Electronic Design, Synaptics’ VP of marketing Anthony Gioeli addresses the two common fingerprint authentication methods — Match-on-Host and Match-in-Sensor — and ultimately makes a convincing argument for the latter technique.

Match-on-Host technology, which is the industry standard, comprises of the fingerprint sensor reading the biometric fingerprint data and sending it to the host processor or other external processor for processing.

This architecture divides the functional requirements between the sensor IC that captures the fingerprint data and a separate controller IC (typically the application processor on a mobile device) that is used to operate the software to make the fingerprint match.

In this fingerprint authentication technique, all of the processing and matching work is done on the host platform itself.

This architecture offers the advantages of being affordable and having short design-in time, enabling fingerprint sensing to be integrated into devices a fairly rapid and cost-effective manner.

These benefits of Match-on-Host have led to innovations in related areas, such as the Fast Identity Online (FIDO) Alliance’s formation of the Universal Authentication Framework (UAF).

Despite this, the Match-on-Host technique is far less secure than the Match-in-Sensor architecture.

Match-in-Sensor technology is a fully encapsulated system-on-a-chip (SoC) architecture in which the fingerprint matching and other biometric management functions (fingerprint enrollment and pattern storage) are directly integrated into the sensor IC.

The architecture offers an advanced level of security that protects both the system and a user’s unique biometric data.

The fingerprint data is completely protected by several key practices: the data is processed only within the sensor’s on-chip CPU and storage, the enrollment templates are encrypted and signed by the sensor, and finally, they are stored in the private flash memory.

If the system is ever successfully breached by an attack, the hacker will be unable to steal any of the user’s biometric data.

In the end, Synaptics’ Gioeli makes a strong case for the use of Match-in-Sensor fingerprint technique as it does not require biometric data to be shared between the fingerprint module and the host device, which reduces the chance of biometric data being stolen in the case of a successful breach.

Article Topics

 |   |   |   | 

Latest Biometrics News

 

Opinions on UK Online Safety Act emphasize importance of enforcement

Online safety legislation is making headlines around the world. But in places where laws have taken effect, are they proving…

 

UK Home Office raises estimate for passport contract to 12 years, £576M

The UK Home Office has opened a third round of market engagement for its next major passport manufacturing and personalization…

 

US lawmakers move to restrict AI chatbots used by kids

A bipartisan pair of House and Senate bills would impose new federal restrictions on AI chatbots, including a ban on…

 

Utah age assurance law for VPN users takes effect this week

Privacy advocates and virtual private network (VPN) providers are up in arms over Utah’s Senate Bill 73 (SB 73), “Online…

 

CLR Labs wins ISO 17025 accreditation for biometrics testing across EU

Cabinet Louis Reynaud (CLR Labs) has been accredited for ISO/IEC 17025, the international standard for testing and calibration laboratories, in…

 

Leidos, Idemia PS advance checkpoint modernization with biometrics, CAT-2 systems

Leidos and Idemia Public Security have formed a strategic partnership to deploy biometric‑enabled eGates and integrated Credential Authentication Technology (CAT-2)…

Comments

8 Replies to “Synaptics executive compares fingerprint authentication methods”

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events