The Strength and Weaknesses of Biometrics

We seem to take for granted how our devices identify us for authentication.  What started from passwords and pin numbers has now turned into fingerprints and advanced face mapping technology that makes unlocking your smartphone almost magical.

Until recently, biometrics were an item of science fiction. Today, significant advances in the technology have now made it truly a viable and secure alternative to traditional forms of security. Biometric authentication uses a person’s individual biological traits to verify their identity. This data is almost impossible to guess and is completely unique to a single person. This make biometric systems extremely hard to compromise, unlike Personal Identification Numbers (PIN) and passwords.

But like all passwords and forms of authentication, each have their limit.  Biometric authentication is also extremely new and not very cost effective enough for widespread adoption, but we can expect to see more and more of it in the near future. So, let’s look at some of the current biometric methods and their strengths and weaknesses.

The Passwords on Your Fingertips

The most frequently used and established form of authentication is your fingerprint. What can be more secure and unique than a series of pattern on the tips of your fingers that not one other human shares?

The main issue with fingerprint scanning is that we leave those passwords (our fingerprints) everywhere. You wouldn’t just write your pin down on a napkin and give it to your waiter, but you will hand over your glass, which is basically the same concept.  Fingerprints also present the challenge that we only have as many passwords as we do fingers.

However, despite the weakness fingerprints still remain much harder to guess than a password and their low-cost and high convenience makes them one of the most common authentication methods.

From fingerprint scanning evolved finger vein or hand vein scanning.  This method scans the vascular patterns beneath the skin’s surface, that are not left on the things we touch. However, this technology is very pricey and not commonly used.

Its All In The Eyes

Eye scanning has also seen an uprising in adoption. The security of iris scanners are very reliable, with a very low chance of false positives because of the high detail they need in order to work.

Despite this reliability, the concern of iris scanning is that of hygiene and convenience. If scanning equipment is shared and requires people to place their eye on surfaces used by others, we could quickly see the hygiene issue. To sterilize the equipment, it would have to be done with substances like alcohol which would cause the eye irritation.  We could also see issues where if the eye scanner is static, it may be difficult for people of different heights to use it.

Say the Magic Words

Voice recognition is one option that is widespread and relatively cheap from a technology stand point. The downside to voice is that it is getting beaten out by the other forms of authentication because it is the easiest biometric method to mimic. A recording on a good microphone could defeat a system, which makes this highly insecure for highly confidential items.

Look In the Mirror to Find the Answer

Facial recognition is somewhat the baby to the biometric authentication world.  The biggest launch on the market is Apple’s Face ID system which maps out the structure and movement of the face to prevent someone with a picture to access it. This technology has seen some false positives so there is likely to be more advancement required in facial recognition. However, if the technology becomes more established it may sweep the market from the other alternatives.

What started from the science fiction movies, has now ended up being real life. Biometric passwords have come a long way and there is still much more advancement required before we can say these methods are truly unique and secure. As of today, two factor authentication is still the best way to go. Combining a biometric factor with a strong password is the safest way to protect your online information when each password can rely on each other as a failsafe form of verifying you.