Using Biometric to prove identity in an era where our identity is easily stolen

by time news

How do you set up unlocking your smartphone and various applications on your device these days? Actually, quite believe that since different brands of smartphones have a function “unlock with fingerprint scanning” or “unlock by scanning the face”

Many people also choose to use their own method of scanning these organs to unlock their personal phones. Rather than having to remember passwords, remember pin codes, or even remember drawing patterns, scanning is much easier and faster. We can enter the phone screen in just a fraction of a second. and do not have to remember any codes unless the system is locked from the scanning method. This was due to an error trying to unlock multiple times. To have to remember the nation what the machine password is.

This is just one example of the closest use of biometric technology in our daily life. Today, this technology is widely used. To help secure in many ways besides the unlock function of the smartphone The technology is also being used in other areas, one of which is very close to the company’s HR (fingerprint attendance) and payroll programming.

What is Biometric Technology?

In terms of terminology, the word biometric is made up of the words bio, meaning living organisms, and metric, which refers to attributes that can be measured or quantified. Refers to the technology to use certain attributes or behaviors in organisms that are unique. and can compare, measure or count to be combined with statistical principles for the benefit of distinguishing, remembering, confirming and identifying the individual It has more than 20 unique identifiers. which can be broadly divided into two types:

  • Physical characteristics such as fingerprints, palm veins, palm, retina, iris, face, DNA and smell.
  • Behavioral traits such as sounds, signatures, and typography

Biometric data is a person’s physical characteristics such as fingerprints, facial features, iris, voice, as well as behavior that is unique to the individual. make this present We make use of Biometric as a technology to verify or authenticate a person. By taking physical characteristics such as fingerprints, pupils and facial structure. or individual behaviors such as walking style Hand movements and speech sounds are used for classification. By examining physical characteristics and computer technology together.

the uniqueness of the information Therefore, it is unique that no human being has the same. Even identical twins have their own traits that the other twin doesn’t, such as fingerprints and iris. Twins are not the same to consider with the eyes Seeing that the external appearance is so similar that they are almost identical, but they are not actually the same. Biometrics are separable, making Biometric a highly secure system. difficult to counterfeit anti lost and with high accuracy Therefore, it is widely used to protect data or assets that require high security.

However, there was once a case of a famous mobile phone brand. Which uses Face ID technology to unlock faces, but Face ID creates a story because “inseparable twins” allow another twin who is not registered with Face ID to unlock the device to use. Even though reality shouldn’t be like that

It is therefore interesting how much Face ID can actually tell the difference between similar faces if the Face ID system is unable to differentiate the faces of the twins. Does that mean the security of Face ID technology may be less than other biometric security systems like fingerprint scanning or iris scanning?

Biometric data is not that personal.

Today, we find that biometric technology is widely used. especially the benefits of authentication/identification and the protection of information or assets that require high security As we have commonly used in everyday life. Such as unlocking various electronic devices and logging into financial transactions. Because it is information that reduces the risk of being hacked and forged. Currently, biometric technology is being developed to be more accurate. reduce errors

However, one thing to be aware of is that biometric data is not that personal. In other words, most of us upload our own “face” selfies to social media. When reviewing various attractions, they also take a clip that they see. In addition, throughout our lifetimes we have hundreds of documents with our “signatures.” In fact, these biometric data may be accessed. It’s very easy and accessible from anywhere. Because we are the ones who created these identities in the online world (virtual world) by ourselves.

With ordinary people, there might not be much to do with this information. But for all cybercriminals It is not certain. Our existence on the Internet All our physical properties may be accessible to criminals through photos and videos uploaded by us. And the hacker level may be able to take our most obvious facial image data to scan into some system. or a 2-inch photo if the hacker zooms in and sees our fingerprints clearly may be able to bring our fingerprints to scan into the system anywhere as well In this case, there has been a warning recently.

Since the introduction of facial recognition or face scanning technology The past period may be improved to be more efficient. Reduce spoofing vulnerabilities It’s like you can’t use a photo or an animation from a video to scan to unlock. but in reality Hackers are no less knowledgeable about these technologies than those trying to block vulnerabilities from spoofing. Good or bad may be the same person. It’s the same way with a joke from a long time ago. that the person who created the computer virus and the person who created the antivirus program may be the same person. It’s the person who made the virus come up. and then create their own antiviral drugs Once infected with the virus, they will come for treatment and buy medicines.

For example, the former Face ID technology from a famous mobile phone brand. It was once guaranteed that this technology is very secure, with only a 1 in 1,000,000 chance of error. Even if users wear hats, wigs, glasses, makeup, and beards, they can still be scanned with facial recognition technology that already recognizes our faces. And can’t use photos or videos to scan to unlock, while the Touch ID system has a chance of error up to 1 in 50,000. However, the worst mistake that has ever happened to Face ID is separating the faces of the twins. It’s not out yet!

Therefore, a skilled hacker may try to break the defenses. “Can’t use photos or videos to scan to unlock” and then use photos or videos with our faces to scan to unlock later. It shouldn’t be difficult for cybercriminals. We may own fingerprints, faces, or voices. But we are not the only ones who have access to those unique personal elements. Since we are the ones who upload part of our identity to the internet by ourselves!

So, think carefully before choosing biometric data, because unlike hacked passwords where we can change them when corrupted, but biometric data we can’t change for life. if stolen It’s like we’ve been stolen for the rest of our lives. It is a lifelong damage that cannot be recovered.

Convenient but really safe?

Biometric is considered a type of sensitive information. “Biodata” means “personal data generated by technology in connection with the adoption of a person’s physical or behavioral characteristics enabling the identification of that individual as opposed to any other person”, Article 26. Personal Data Act The law therefore provides special protection because it is a truly personal identity. if disclosed incorrectly There is a risk of being treated unfairly, including identity theft. The law therefore clearly states that it is “forbidden” to collect without the “express” consent of the data subject.

In the early days, biometric technology was widely used. Many people already understand that it is the safest technology. because only we have a face like this have this iris There’s a fingerprint like this. There’s DNA like this that can be scanned or verified to unlock, login, or anything else. It’s very personal.

But when it actually works We are beginning to see that there are still a lot of vulnerabilities. that requires both improving and developing technology to fill the loopholes in order to use it more efficiently. Also in the matter of law to protect these data. that may be smuggled and used without permission and causing damage

Take, for example, using your fingerprint or face to unlock your phone, which often contains our personal data. It seems to be safe because only we can use our own organs to scan and unlock our personal phones. But what we may have seen in dramas or movies is When a character is in a deep sleep or is knocked unconscious. An evil character can grab the owner’s finger and scan it to unlock that phone in just a fraction of a second. Or forced to make a straight face, put the phone in front of your face. The device has been unlocked.

on the contrary If it’s a simple password lock set or a way to draw a pattern and never tell anyone what the unlock code is. It wouldn’t be easy to unlock that phone in a split second. Random guessing and entering the wrong code more than once. may cause the device to lock Access is restricted for a long time.

However, if the bad guys don’t have our biometrics, it also helps us to be very safe from remote systems or remote device control. In case of hacked access to banking apps, scammers control our device by sending us strange links, which may contain spyware or requests for permission to open the remote attached, the use of password or pin or pattern will be intercepted. caught through spying But we can’t work via biometric because only one of us can scan our own organs through the device we set up.

It is true that the biometric data that we use to open the app and unlock the device It is very secure in most cases. Because it is very private. However, our identity on the Internet is subject to hacking. And these methods get more complicated over time, so it might be better for us to compromise a bit. Then turn on two-step authentication, using Biometric with a strong password. Code is something we can change whenever we want. especially when you feel unsafe. Focus on creating strong, strong passwords to enhance security.

You may also like

Leave a Comment