Biometric authentication and identification is the use of fingerprint recognition, facial recognition, iris scanning, voice recognition, and vein pattern recognition for access control, security and people monitoring. The biometrics most in use commercially are fingerprint and facial recognition due to their accuracy, speed, and cost-effectiveness. Tensor provides systems for both fingerprint and facial recognition access control, security and staff management, offering secure entry solutions that are ideal for modern workplaces.
The use of biometrics for identification has been around for centuries (see our history of fingerprinting blog for more) and the technology for fingerprint and facial recognition has been increasingly popularised and trusted over the last several decades, most significantly since 2013, when Apple introduced their fingerprint authentication for iPhones, and then in 2017 they introduce facial recognition with Face ID.
But there are still some frequent beliefs about the technology that are no longer true — if they even ever were. Here are some of the most common, and why they are incorrect.
Biometric data isn't secure and my face scan can be stolen
One of the main concerns about biometric identification is that 'hackers can steal my face!'
Firstly, of course, nobody can actually steal your face — it's attached to your head, and your fingerprints are on the end of your fingers. This is unlike other forms of identification — cards, passwords, keys etc — which can be stolen. In that instance you wouldn't need to be present for them to be used, so anyone could use your password or your access card or key. With biometrics there would need to be a person there with your face or fingerprints for them to work.
The other aspect of biometric data being stolen is that the data is not actually an image of your face or fingerprint. The data is stored as an encrypted code, called a biometric template, with no identifying information, which means that even if the data is hacked, it's not a face or fingerprint that is accessed, so it would be useless to acquire.
Reputable providers of biometric authentication and identification — including Tensor — will have attained ISO 27001, the world's leading standard for information security management systems, which means they manage risks related to the security of data owned or handled by the company to protect sensitive data, reduce cyber threats, and ensure the confidentiality, integrity, and availability of the information.