FB pixel

Add a biometric basket for your authentication eggs, says vendor

Add a biometric basket for your authentication eggs, says vendor
 

Identity management is failing because it focuses on effectively authenticating devices without biometrically authenticating the person operating an accepted device, according to a veteran industry executive.

Jay Meier, recently hired as one of FaceTec‘s regional senior vice presidents, is pushing for a system that “binds a privilege to an actual, legal identity rather than to a device that we presume to trust is being held by (the person with) that legal identity.”

FaceTec claims to collect from two-dimensional images the kind of data found in 3D facial recognition and liveness. Adding liveness-confirmed biometric ID proofing, enrolling and user authenticating processes, according to Meier, to current steps is required to avoid theft and fraud.

He was speaking about identity management as part of a video interview posted by Scytáles, which develops mobile driving licenses.

Identity managers and CEOs know that it is not enough to be certain about devices seeking access because there typically is no way to be certain about who holds the device.

But, Meier said, deterministic decisions are binary. The device is or is not entitled to access resources, or system privileges. If device authentication is doing its job, there is 100 percent certainty in the decision.

Hearing 100 percent certainty is attractive to CEOs who prefer to think of any decision that is not strategic be binary whenever possible.

Biometrics is a probabilistic matter. Getting to 100 percent certainty through machine vision, for example, is not a realistic expectation.

Binding a privilege to a legal identity rather than, or at least in combination with, device authentication is the best way today to secure systems and data, particularly remotely, he said.

Biometric Update last week published a post by Meier making this point.

In it, he cited a Verizon survey indicating that weak authentication of people resulted in 85 percent of all breaches last year.

Meier used an example that is hard to ignore — the SolarWinds attack. Criminals executed remote access trojan malware in a supply chain exploit that succeeded despite strong device authentication. The hackers exploited weaker user authentication to great success.

Article Topics

 |   |   |   |   |   |   |   |   | 

Latest Biometrics News

 

Growing role of biometrics in everyday life demands urgent deepfake response

Biometrics are becoming more entrenched a couple of market segments, though not as fast as some would like. The top…

 

PNG expands mandatory digital ID to businesses taking gov’t contracts

The government of Papua New Guinea is making its national digital ID a mandatory form of authentication for all business…

 

Imply reaches face biometrics milestone at tech-forward Arena da Baixada

Imply Tecnologia’s facial recognition model has enabled more than 1 million accesses at Arena da Baixada, the home of Club…

 

Following IPO, ROC is investing in homegrown security for US market

In February, Colorado-based biometrics and vision AI provider ROC closed the first big biometrics IPO of 2026, raising just over…

 

Jumio expanding biometric reusable digital identity across LatAm

Following a launch in Brazil last year, U.S.-based Jumio is expanding its face biometrics-based reusable digital identity product, selfie.DONE, across…

 

Denmark imposes age checks to restrict social media to kids under 15

Welcome two more Europeans nations to the global age assurance legislation party. The Danish government is moving ahead with an…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events