Biometric identification functionality is becoming ubiquitous on smartphones.
The following guest post was submitted by IndianAppDevelopers.com
Android fingerprint API launched with Android 6.0 will offer a bevy of useful features to integrate new authentication technology for app developers with the apps. To implement this API in your new Android app you need to get the Android SDK first. The SDK Manager then will allow you to download the SDK platform for Android 6.0 and introduce necessary steps. As part of the launching process, Android has also come up with new sample to demonstrate and guide the developers in integrating the API with the fingerprint readers in various devices.
Addressing security concerns
Beating the so called security concerns over the use of fingerprint technology in mobile transaction Android has revealed how the new API offers protective measures for maintaining privacy. The new API as revealed will protect the critical fingerprint features by keeping them in the secure device hardware.
Authentication and security measures with the new API
Android also expressed future plans to come with measures that can help identifying fingerprint of users just before allowing access to critical resources and data. These identification measures would help protecting against all malicious intrusions and tampered applications by ensuring cryptographic level security for all types of transactions and access to offline data and online interactions. This hardware level protection of critical data offers full proof protection against all malicious actions and security threats making it safe for the users to use their fingerprints.
As soon as any user turns on the fingerprint reader in the device, the cryptographic vault in the device hardware containing the secure information gets unlocked. Now developers can choose among diverse information to be stored in that vault. Last month Google also regulated the minimum device level requirements that manufacturers must comply with to integrate fingerprint sensors in devices running on Android OS.
Use of symmetric and asymmetric Keys
Developers can use both symmetric and asymmetric keys as per their type of files and priority of protective measures.
Symmetric keys: These keys are more like passwords that help encrypting local device data to regulate access to specific files and data. For protecting offline files and databases this provides a good security measure.
Asymmetric keys: This key comprises a pair of keys, respectively a private and a public key While the public can be stored on the remote server and can be accessed in times of need via the internet the private device stored key is used as the secondary verification in conjunction with the public key. Thus a signature or fingerprint stored in the device can be verified by the public key before allowing access. This makes security measures less prone to device specific security vulnerabilities. Asymmetric keys can be used for authentication and signing in for network services and transaction channels. Asymmetric keys can also be used to encrypt device data to allow access after verifying with the public key in conjunction with the device stored private key. In the present context of authenticating with Google fingerprint API developers can utilise asymmetric key to the highest advantage as a security protocol.
As mobile payment is continuing to be popular the developers will find an array of ways to integrate new Android fingerprint API with mobile apps performing transactions and containing critical data.
Juned Ahmed is an IT consultant and blogger at IndianAppDevelopers.com; leading Android app development company, He enjoys writing on mobile technologies at various blog & magazines.
Governments around the world are testing facial recognition biometrics for stronger border control.
Due to recent terrorist attacks, governments all around the world are looking for ways to tighten the security of their borders. They are experimenting with new technology solutions to ensure strong national security, and one of these technologies is biometric facial recognition. This powerful, versatile human identification technology has a strong chance of becoming the future default security platform for border control all across the world. Continue reading →
Airports around the world are using biometric identification management technology to increase safety and security.
The following guest post comes from Air Charter Network Australia, who provides a superior level of privacy, safety, service and reliability for private air charter both domestically and internationally.
Those interested in chartering aircraft or airplane charter will be delighted to hear that the Canadian Air Transport Security Authority has announced that the dual biometric airport identification system in the world is now fully operational at 29 of the largest airports in Canada. The smart card authentication system, known as the Restricted Area Identity Card, has been issued to more than 90,000 workers at the airport who have access to restricted areas in the airport. The president and Chief Executive Officer of the Canadian Air Transport Security Authority expressed pleasure at the exciting new biometric security solutions. “In partnership with Transport Canada and the airport authorities, we have created an innovative biometric program that leads the world in airport security for non-passengers,” he said in an interview. Continue reading →
Answers to our 2nd biometric quiz on Facebook with detailed explanations.
Back by popular demand, we have launched the 2nd edition of our biometric quiz series on Facebook! If you are reading this post and haven’t taken the quiz yet, click on this link to take the quiz and then come back here to our blog for a detailed explanation of the answers.
We have designed this quiz to test your knowledge of biometrics and clear up any misconceptions you might have about biometric technology. Continue reading →
Voice biometrics are playing an important role in the design and development of today’s smart homes.
This guest post is written by a writer of Urban Outsource Pty Ltd, an Australia’s leading marketplace for on-demand home services.
In today’s modern homes, voice recognition devices at home allow you to control electronics with the use of a tablet or other smart device. An app allows family members to fine-tune everything from any electronic device with an Internet connection. House cleaning is made easier with automatic vacuum cleaners like the ones professional cleaning services use. These smart systems allow you to control the thermostat, security systems, lights, appliances and even a home theater system.
How It Works
Smart home technology works by sending infrared messages to various electronics and works with voice recognition. Some electronic systems use speech recognition software to control computers, Wi-Fi networks and more. Manufacturers know that homeowners will purchase these systems because they are easy to use. Continue reading →
More educational institutions around the world are replacing passwords with body language biometrics for accurate online class student identification. (Image courtesy of Pixabay: http://bit.ly/1RCTQib)
This post comes from the writing team at National Real Estate Learning who provides real estate online courses. They have developed online and resource material to help people every step of the online training when they are looking to commence a real estate career.
As reports of stolen ID codes like social security and credit card numbers show, relying on combinations of letters and numbers to secure online accounts is not entirely foolproof. The situation is no different when it comes to online education. With this form of schooling, stronger online identity verification is needed to counteract academic deception and hamper the added problem of financial fraud. To meet these demands, biometric technology is being increasingly deployed to thwart the threats. Continue reading →
Technavio’s report on the “key players” in emerging biometrics technology included M2SYS Technology. (photo courtesy of Pixabay http://bit.ly/1NI2T1t)
Thank you to the team at TechNavio for naming M2SYS as a “key player” in the emerging biometric technology field for our multi-modal biometrics software platform that supports biometric modalities including: DNA, fingerprint, finger vein, palm vein, iris, and facial recognition.
The Technvaio report prognosticates a bright future for the global emerging biometrics technologies market, predicting a market currently valued at $555 million to quickly double in the next four years to $1.04 billion. Fueling the growth for these emerging biometric technologies is growth of the industry in: government, gaming, and healthcare. Continue reading →
Biometric verification of SIM cards creates ownership accountability and helps to prevent crime
Biometric subscriber identity module (SIM) verification has gained rapid momentum recently due to the widespread adoption of mobile phones. It is defined as the process of verifying the personal details of a subscriber by utilizing their biometric attributes. The practice of using biometrics for SIM card verification not only works as a proof of ownership credential, but it also creates a sense of accountability among SIM card owners to not use their mobile phones in any kind of criminal activities. Continue reading →
RightPatient® will offer a free webinar on September 10, 2015 covering accurate patient identification and patient data integrity in healthcare. The webinar will cover elimination of duplicate medical records, the importance of creating a federated patient identity, and an in-depth discussion of what biometrics can or cannot do.
RightPatient® offer a free webinar on “Biometric Patient Identification Technology for Patient Safety” on September the 10th from 1 p.m. – 2 p.m. EDT.
One of the major debates within the healthcare industry revolves around patient identification and patient data integrity, especially when it comes to patient safety and security. Ask any healthcare professional about the impact of failing to correctly identify patients and the answer would be same. Misidentification of patients is a direct cause of preventable medication errors, transfusion errors, and testing errors. Preventable medical errors continue to persist as the #3 killer in the U.S. and claim the lives of more than 400,000 patients per year.
Continue reading →
Many school principals, district superintendents, administrators, and K-12 food service operators have already heard of fingerprint lunch lines, or the use of fingerprint biometric technology to recognize students and allow automated payment for school lunch purchases.
Using biometric fingerprint technology, school caterers or K-12 food service operators can not only simplify and speedup the school lunch line payment procedure, but can also eliminate lunch line fraud and stop bullying.
Using biometric fingerprint technology, school caterers or K-12 food service operators can simplify and speedup the school lunch line payment procedure
Fingerprints for student identification
The idea of a cashless fingerprint payment system for school lunch lines is not a new one. It has been used primarily in the United Kingdom and United States since the beginning of the 21st century, and is now widespread around the world including deployments in Australia, India, and some other European and Asian countries.
Schools mostly use student’s fingerprint data for cashless catering systems though in the United Kingdom fingerprint biometrics in schools were initially used for library book issuance. Within a few years fingerprints were being used for cashless catering systems, enabling parents to deposit money into students catering accounts, which is debited by a child’s fingerprint scan at the point of sale. In the United States, fingerprint biometrics systems are used primarily for lunch line point of sale transactions, as mentioned above.
Continue reading →