FB pixel

Synaptics executive compares fingerprint authentication methods

 

In a report in Electronic Design, Synaptics’ VP of marketing Anthony Gioeli addresses the two common fingerprint authentication methods — Match-on-Host and Match-in-Sensor — and ultimately makes a convincing argument for the latter technique.

Match-on-Host technology, which is the industry standard, comprises of the fingerprint sensor reading the biometric fingerprint data and sending it to the host processor or other external processor for processing.

This architecture divides the functional requirements between the sensor IC that captures the fingerprint data and a separate controller IC (typically the application processor on a mobile device) that is used to operate the software to make the fingerprint match.

In this fingerprint authentication technique, all of the processing and matching work is done on the host platform itself.

This architecture offers the advantages of being affordable and having short design-in time, enabling fingerprint sensing to be integrated into devices a fairly rapid and cost-effective manner.

These benefits of Match-on-Host have led to innovations in related areas, such as the Fast Identity Online (FIDO) Alliance’s formation of the Universal Authentication Framework (UAF).

Despite this, the Match-on-Host technique is far less secure than the Match-in-Sensor architecture.

Match-in-Sensor technology is a fully encapsulated system-on-a-chip (SoC) architecture in which the fingerprint matching and other biometric management functions (fingerprint enrollment and pattern storage) are directly integrated into the sensor IC.

The architecture offers an advanced level of security that protects both the system and a user’s unique biometric data.

The fingerprint data is completely protected by several key practices: the data is processed only within the sensor’s on-chip CPU and storage, the enrollment templates are encrypted and signed by the sensor, and finally, they are stored in the private flash memory.

If the system is ever successfully breached by an attack, the hacker will be unable to steal any of the user’s biometric data.

In the end, Synaptics’ Gioeli makes a strong case for the use of Match-in-Sensor fingerprint technique as it does not require biometric data to be shared between the fingerprint module and the host device, which reduces the chance of biometric data being stolen in the case of a successful breach.

Article Topics

 |   |   |   | 

Latest Biometrics News

 

Somalia makes biometric digital ID mandatory for inter-state travel

Somalians flying domestically will have to show their biometric ID cards in a new development. The measure was introduced on…

 

AVPA, academics, advocacy groups trade letters over age assurance tech

New rifts have opened up in the debate over the safety and privacy status of age assurance technology. An open…

 

What happens to your accounts when you die? OpenID calls for digital estate action

When people die, the fate of their digital accounts depends on a series of fragmented policies and legal systems rife…

 

Incode says account recovery deepfake fraud soft spot in expanded attack surface

Deepfakes take center stage in a webinar presented by Incode and hosted by Maxine Most, founder of the Prism Project…

 

Iran’s authorities using NtechLab’s live facial recognition to crush dissent

Images of masked protestors emerging from Iran during the country’s recent brutal crackdown on dissent illustrate their fear of the…

 

Idemia Public Security, Proof partner on single portable digital credential

Idemia Public Security and Proof have formed a strategic partnership to enable a “trusted, broadly usable, privacy-preserving identity experience through…

Comments

8 Replies to “Synaptics executive compares fingerprint authentication methods”

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events