FB pixel

Test shows Infinity Optics True Biometric Hash enables face recognition to meet privacy standards

Categories Biometric R&D  |  Biometrics News
Test shows Infinity Optics True Biometric Hash enables face recognition to meet privacy standards
 

An independent test by Horangi Cyber Security reports that Infinity Optics’ technology creates no detectable biometric information in the outcoming codes that can be reversed, which Infinity says effectively eliminates privacy security risks from the process.

The test shows that QuantumCrypt’s True Biometric Hash technology enables face recognition systems to operate without the need to collect and store biometric information to verify a person’s identity, according to the announcement. Further, the technology does not depend on images or recorded features, and therefore has no bias towards characteristics like race, age, or gender.

With companies struggling to deal with increasingly strict privacy regulations, the company says navigating the complex policies in data management regulation would clear a path for broader adoption of biometric solutions, products and services.

“Unlike the traditional methods of capturing the face image in an enrollment and applying a cryptographic formula to hide any sensitive information, Infinity’s technology extracts featured vectors from the face that creates repeatable and random structured biometric codes to generate a one-way hash,” Infinity writes in the announcement. “This hash can be directly the seed of a symmetric or asymmetric pair of cryptographic keys for verification and further security applications.”

Horangi Cyber Security is a Singapore-based and CREST-accredited company backed by a team of global cybersecurity experts.

“In comparison with traditional face recognition systems, there is no tokenization needed following a match on a biometric template,” according to Infinity. “The True Biometric Hash is the secured token that does not exist anywhere in the system before being dynamically generated when the person’s face is presented during verification. The traditional matching works with biometric templates or codes. This bears no resemblance to how traditional matching works with biometric templates or codes. These typical templates or codes must be decrypted to make the match possible. That process adds complexities and costs in an attempt to protect sensitive biometric information, but most have not eliminated backdoor access which has remained open to hackers.”

Infinity also produced a white paper to explain how its QuantumCrypt biometric hash technology works earlier this year.

Article Topics

 |   |   |   |   |   |   |   |   | 

Latest Biometrics News

 

Age verification comes to social media as age of unregulated use nears an end

If trends continue, social media is set to follow in the path of cigarettes: an activity benefitting early from lax…

 

AI can save UK govt £40B annually, transform public services: Blair Institute

AI will soon be used to pre-check applications for correct information, triage cases by calculating complexity and routing them appropriately,…

 

Papua New Guinea completes national data protection and governance policy

The Ministry of Information and Communications Technology has announced the completion of the national data protection and governance policy, marking…

 

Interpol issues call for biometrics firm to provide mobile data collection devices

Interpol has issued a tender for mobile ​​biometric collection (MBC) devices for collecting fingerprints and facial images. Specifically, the project…

 

ICE, CBP sued for details on migrant data sharing agreements

Digital rights advocacy group Access Now is suing the U.S. Customs and Border Protection (CBP) and Immigration and Customs Enforcement…

 

French travel minister joins UK lawmakers in floating EES postponement

The European Union’s biometrics-based travel scheme is raising concern in France with the local transport minister not excluding postponement. Minister…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events