YOU ARE AT:OpinionReality Check: The evolution of biometrics for mobile devices

Reality Check: The evolution of biometrics for mobile devices

The use of biometrics for security by the mobile industry is growing, but partnerships are key to ensure continued development and deployment.

In today’s digital world, we rely on our mobile devices to save copious amounts of personal information. With the emergence of applications that make banking and shopping as easy as a swiping your finger, mobile devices continually collect and secure highly sensitive data.

To keep this information safe from potential hackers, wireless companies are installing biometric technologies into mobile devices. Popular devices, including the Apple iPhone and Samsung Galaxy Note 7, already contain biometric capabilities. Due to the increasing demand of this technology, studies show the prevalence of biometrics in mobile phones and tablets will continue to grow exponentially. A new research report suggests the mobile biometrics industry will expand to $49.33 billion by 2022.

As individuals use biometrics to mitigate the risk of identity theft, it is critical to understand how this mode of technology can be used to help increase security measures across mobile devices.

Tips and tricks for employing biometrics

While the commercial trend of using biometrics in cellphones and tablets is a fairly recent development, the federal government has utilized automated biometric systems for over a decade. Since 2004, federal agencies have mandated the use of Homeland Security Presidential Directive 12 identification cards and fingerprinting, which easily distinguish government employees and authorized independent contractors.

Additionally, the federal government is well equipped in handling automated biometric technologies, spanning from the Transportation Security Administration in airport security lines to screening visitors to the Pentagon, agencies use state-of-the-art capture device tools on a daily basis.

The capture device is a biometric technology that serves as a gatekeeper, enabling individuals and government employees to access pieces of information with the scan of an iris or fingerprint. Although the federal government uses multimillion-dollar capture devices, mobile companies, like Apple, opted to create lower cost tools that have improved over time and have matured to the point they can now capture highly accurate fingerprint scans.

For example, when an individual buys a new iPhone they are required to scan their fingers multiple times. This quick procedure enables the iPhone to accurately capture all aspects of the fingerprint and is saved on the phone as a future safeguard.

Automated capture devices significantly reduce the amount of time it takes to collect the data needed to authenticate and track a person’s identity. Whether it’s the federal government monitoring border patrol or a consumer hoping to strengthen the security settings on their iPhone, biometric technologies are highly resourceful tools for identity verification.

Two biometrics are better than one

Despite the proven success of automated biometric technologies, it is important to acknowledge that using two-factor authentication can provide greater security for mobile devices.

Fingerprinting is currently the most common mode of biometrics used to secure these devices and applications; however, there are many other types of biometrics that can or will eventually help improve the verification process.

Pattern recognitions, such as a four- to six-digit passcode, are biometrics that can typically be used in conjunction with fingerprint scans. The two-factor authentication, commonly referred to as “multimodal biometrics,” helps improve the overall accuracy of each safeguard.

Adversaries have attempted to hack mobile devices by duplicating fingerprint scans and even breaking passcodes. By establishing the two-factor authentication process, it poses even greater challenges for hackers to break into an individual’s mobile device and breach sensitive data stored on mobile applications.

The future of biometrics

As we move forward through the evolution of biometrics, it is critical that commercial and federal agencies work together to ensure the technology is meeting the needs of consumers and officials alike. There are several existing modes of biometrics that continue to mature, such as voice recognition, infrared iris scans and capacity scans. These are potentially the next wave of biometrics that will serve to identify people and protect valuable information.

The key to ensure these new forms of biometrics are successfully is through testing, appropriate funding and collaboration between the private and public sectors. With the help of proven biometric technology, everyone will able to reduce the risk of potential threats and further unlock the potential of mobile devices for modernizing the federal government.

J. Kevin Reid joined the KeyLogic team in June 2016, after a 30-plus year career with the FBI, where he most recently served as the assistant director of the Information Technology Infrastructure Division.

Editor’s Note: The RCR Wireless News Reality Check section is where C-level executives and advisory firms from across the mobile industry share unique insights and experiences.

ABOUT AUTHOR

Reality Check
Reality Checkhttps://www.rcrwireless.com
Subject to editorial review and copy edit, RCR Wireless News accepts bylined thought leadership articles, up to 1000 words, from industry executives. Submitted articles become property of RCR Wireless News. Submit articles to [email protected] with "Reality Check" in subject line.