Questions tagged [biometrics]

Biometrics is a set of methods related to unique identification of people based on physiological or behavioural traits

136 questions
0
votes
2 answers

How/What to prompt user for fingerprint login using smartcard?

We are using a PIV smartcard that has biometric information (fingerprint) of the user encoded on the card to login into our application. We have the capability to read the fingerprint from a reader and extract and build the minutiae data from it for…
0
votes
0 answers

Does mobile biometric authentication count as Knowledge, Possession, or Inherence authentication

Apple claims in this year's WWDC that Face ID and Touch ID count for both Possession and Inherence identity factors, because they are using Biometrics (Inherence) to access the secure element on your phone (Possession) to retrieve a unique key. See…
0
votes
2 answers

Should password reset disable biometric sign in until the user signs in with username and password again?

Background: My team's mobile apps have biometric sign in (Touch ID, Face ID, fingerprint). You can enable and disable biometric sign in when you are signed in. You always have the option to sign in with username and password (and have to in many…
Aaron B
  • 103
  • 3
0
votes
1 answer

Biometric authentication against server

I'm working on an iOS app whose login system does not seem entirely secure but I don't know enough to be sure. Skipping account creation, the first time the user logs in they send their user and hashed pass to the server to acquire a token with…
nscan
  • 1
  • 1
0
votes
1 answer

Does the device you are logging into count as one of the factors for MFA when you are using device biometrics?

Yes it does because I 'have' the physical device I 'am' the owner of the fingerprint But no it doesn't because 1=>2 : If you have my device the fingerprint is now something you can get. Which makes me unwilling to install banking or payment apps…
0
votes
1 answer

What implementations of Biometrics Encryption exist now?

As I was studying a paper authored by Anna Romanou with title "The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise" I came across Ann Cavoukian's proposal that states on how to use biometrics.…
Dimitrios Desyllas
  • 381
  • 1
  • 2
  • 13
0
votes
1 answer

How much more secure is fingerprint compared to text passwords?

Mathematically, how much more secure is fingerprint compared to textual passwords? Like is there any detailed mathematical analysis?
0
votes
1 answer

Biometric Match Threshold

I'm a beginner to security, and I had a question about biometric match thresholds. Does a higher threshold signify that the system follows a strict(er) policy? Also, suppose I have a threshold of 0.5; does it mean that the sample must be at least a…
Yash Chowdhary
  • 121
  • 1
  • 5
0
votes
0 answers

Is there software available for two-factor, biometric authentication to the OS?

Many fingerprint readers and other biometric authentication devices come with software for single-factor authentication to the OS. Is there any third-party software (F/OSS or otherwise) available for making OS authentication a two-factor process,…
Iszi
  • 26,997
  • 18
  • 98
  • 163
0
votes
1 answer

Is signature an universal biometric trait?

Where "universal" stands for "The trait must be owned by any person (except for rare exceptions ...)"? (Notice: this is a question related to biometric systems, hopefully this is the right stackexchange site).
0
votes
4 answers

Would allowing the user to login via a set of IPs with face recognition be a secure enough alternative?

I'm trying to figure out how face recognition would be considered a valid and secure enough option of logging into an account. The way how I see this works is as followed, the user logs into their account via password and enables logging into this…
Yates
  • 111
  • 3
0
votes
2 answers

What are the technical specifications for the Apple iPhone 7 fingerprint reader?

I'm looking for technical material that describes the quality of the iPhone 7 fingerprint reader, and ideally previous models as well. My hope, is that the specification is more in alignment with NIST/FBI requirements.
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
-1
votes
1 answer

Why computers accept biometrics as first authentication but not phones

After powering on laptops and desktop computers, you are allowed to use biometrics for login. But, as far as I know, biometrics are not allowed for unlocking phones after powering them on. You are only allowed to use biometrics after you've first…
Charitoo
  • 99
  • 1
-1
votes
2 answers

Authentication under the constraints: only public information

What are some systems of identity verification that fits these sort of constraints: Doesn't require the subject know a specific piece of information (e.g. always know a password or birthday) The authenticator isn't guaranteed to have a specific…
Maggie
  • 99
  • 2
-1
votes
1 answer

How does reducing the False Match Rate (FMR) in a biometric system can cause human factor vulnerabilities?

How is this vulnerability possible? How is FMR linked with human factor vulnerabiltiy? If there is a vulnerability what are ways to safeguard or mitigate such issues?
user162334
  • 11
  • 2
1 2 3
9
10