FB pixel

Infinity Optics to use Rank One facial recognition algorithms in True Biometric Hash technology


biometric facial recognition

Rank One Computing and Infinity Optics have formed a partnership under which Rank One’s facial recognition algorithms will be used in the development of Infinity’s QuantumCrypt biometric face verification solution.

The companies note the increase in enterprise phishing attacks during the pandemic in the announcement.

Current biometric and cryptographic solutions typically operate separately, utilizing traditional method of collecting, shrinking, and encrypting biometric templates with algorithms and tokenizing them to generate cryptographic keys, Infinity says in the press release. The company argues that while this approach may seem not to expose any sensitive data, it does not ensure data integrity, or secure sensitive biometric data against more advanced attack vectors. Infinity says other companies try to address this security issue by compressing and decentralizing the stored digital template.

The company’s biometric cryptographic technology gathers many stable and repeatable feature vectors directly from the biometric device to generate a True Biometric Hash code, which is used as input for cryptographic authentication keys that can be used for digital signatures or secure access to private data. Verification with the QuantumCrypt platform is not based on stored images or encrypted templates, and feature extraction from the biometric data does not involve distance calculation.

QuantumCrypt produces a stable binary code, registration is revocable, and the platform is device-agnostic.

Rank One’s facial recognition algorithms show a balance of accuracy, speed and efficiency in NIST benchmarking, and the company says it was the first to release periocular biometrics in response to COVID-19. Rank One also provides passive liveness based on a single uncompressed frame and a patent-pending homomorphic encryption solution.

“This partnership with Rank One will start a disruptive trend for any biometric based identity verification in addressing biometric security and privacy at the heart. We have simplified the process using an advanced biometric cryptographic solution to personalize cryptographic keys so you do not have to rely on complex and costly protocols to protect sensitive biometric data, no tokenization process required to produce cryptographic keys. Our True Biometric Hash technology enables this in a single step without the need to collect nor store any fragments of biometric data or digital templates, no encoding decoding of templates required. We remove the risks of large-scale attacks completely while significantly enhancing the security and privacy of the system, whether in a trusted secured environment or a virtual secured environment,” says Alfred Chan, CEO of Infinity.

Infinity says it is also developing more advanced and zero-trust verification capabilities with biometrics and IDaaS partners to serve enterprise and healthcare markets and build mobile applications for digital KYC, AML and fraud prevention in fintech and government services.

Article Topics

 |   |   |   |   |   |   |   |   |   |   | 

Latest Biometrics News


Biometrics deployments expand protection against fraud and lying about your age

Biometrics are protecting against false claims of all sorts in several of the most-read articles of the past week on…


UN says law enforcement should not use biometrics to surveil protestors

Law enforcement agencies should not use biometric technology to categorize, profile or remotely identify individuals during protests, the United Nations…


How to explain the EUDI Wallet? Industry and citizens discuss Europe’s digital ID

The European Digital Identity (EUDI) Wallet is well on its way towards becoming a reality. To explain the major impact…


Decentralize face authentication for control, stronger protection: Youverse

The implementation method of biometric face authentication has become increasingly important in recent years due to the limitations of traditional…


Researchers develop display screens with biometric sensor capabilities

Traditional display screens like those built into smartphones require extra sensors for touch control, ambient light, and fingerprint sensing. These…


Meta, porn industry and Kansas governor weigh in on age verification

As Europe mulls how to restrict access to certain content for minors, Meta offers its own solution. Meanwhile, U.S. states…


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read From This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events