FB pixel

Infinity Optics to use Rank One facial recognition algorithms in True Biometric Hash technology


biometric facial recognition

Rank One Computing and Infinity Optics have formed a partnership under which Rank One’s facial recognition algorithms will be used in the development of Infinity’s QuantumCrypt biometric face verification solution.

The companies note the increase in enterprise phishing attacks during the pandemic in the announcement.

Current biometric and cryptographic solutions typically operate separately, utilizing traditional method of collecting, shrinking, and encrypting biometric templates with algorithms and tokenizing them to generate cryptographic keys, Infinity says in the press release. The company argues that while this approach may seem not to expose any sensitive data, it does not ensure data integrity, or secure sensitive biometric data against more advanced attack vectors. Infinity says other companies try to address this security issue by compressing and decentralizing the stored digital template.

The company’s biometric cryptographic technology gathers many stable and repeatable feature vectors directly from the biometric device to generate a True Biometric Hash code, which is used as input for cryptographic authentication keys that can be used for digital signatures or secure access to private data. Verification with the QuantumCrypt platform is not based on stored images or encrypted templates, and feature extraction from the biometric data does not involve distance calculation.

QuantumCrypt produces a stable binary code, registration is revocable, and the platform is device-agnostic.

Rank One’s facial recognition algorithms show a balance of accuracy, speed and efficiency in NIST benchmarking, and the company says it was the first to release periocular biometrics in response to COVID-19. Rank One also provides passive liveness based on a single uncompressed frame and a patent-pending homomorphic encryption solution.

“This partnership with Rank One will start a disruptive trend for any biometric based identity verification in addressing biometric security and privacy at the heart. We have simplified the process using an advanced biometric cryptographic solution to personalize cryptographic keys so you do not have to rely on complex and costly protocols to protect sensitive biometric data, no tokenization process required to produce cryptographic keys. Our True Biometric Hash technology enables this in a single step without the need to collect nor store any fragments of biometric data or digital templates, no encoding decoding of templates required. We remove the risks of large-scale attacks completely while significantly enhancing the security and privacy of the system, whether in a trusted secured environment or a virtual secured environment,” says Alfred Chan, CEO of Infinity.

Infinity says it is also developing more advanced and zero-trust verification capabilities with biometrics and IDaaS partners to serve enterprise and healthcare markets and build mobile applications for digital KYC, AML and fraud prevention in fintech and government services.

Related Posts

Article Topics

 |   |   |   |   |   |   |   |   |   |   | 

Latest Biometrics News


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read This Week

Featured Company

Biometrics Research

Biometrics White Papers

Biometrics Events

Explaining Biometrics