FB pixel

Test shows Infinity Optics True Biometric Hash enables face recognition to meet privacy standards

Categories Biometric R&D  |  Biometrics News
Test shows Infinity Optics True Biometric Hash enables face recognition to meet privacy standards

An independent test by Horangi Cyber Security reports that Infinity Optics’ technology creates no detectable biometric information in the outcoming codes that can be reversed, which Infinity says effectively eliminates privacy security risks from the process.

The test shows that QuantumCrypt’s True Biometric Hash technology enables face recognition systems to operate without the need to collect and store biometric information to verify a person’s identity, according to the announcement. Further, the technology does not depend on images or recorded features, and therefore has no bias towards characteristics like race, age, or gender.

With companies struggling to deal with increasingly strict privacy regulations, the company says navigating the complex policies in data management regulation would clear a path for broader adoption of biometric solutions, products and services.

“Unlike the traditional methods of capturing the face image in an enrollment and applying a cryptographic formula to hide any sensitive information, Infinity’s technology extracts featured vectors from the face that creates repeatable and random structured biometric codes to generate a one-way hash,” Infinity writes in the announcement. “This hash can be directly the seed of a symmetric or asymmetric pair of cryptographic keys for verification and further security applications.”

Horangi Cyber Security is a Singapore-based and CREST-accredited company backed by a team of global cybersecurity experts.

“In comparison with traditional face recognition systems, there is no tokenization needed following a match on a biometric template,” according to Infinity. “The True Biometric Hash is the secured token that does not exist anywhere in the system before being dynamically generated when the person’s face is presented during verification. The traditional matching works with biometric templates or codes. This bears no resemblance to how traditional matching works with biometric templates or codes. These typical templates or codes must be decrypted to make the match possible. That process adds complexities and costs in an attempt to protect sensitive biometric information, but most have not eliminated backdoor access which has remained open to hackers.”

Infinity also produced a white paper to explain how its QuantumCrypt biometric hash technology works earlier this year.

Related Posts

Article Topics

 |   |   |   |   |   |   |   |   | 

Latest Biometrics News


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read This Week

Featured Company

Biometrics Research

Biometrics White Papers

Biometrics Events

Explaining Biometrics