Multiple forms of biometrics to underpin contextual security authorisation

28th July 2017

By: Schalk Burger

Creamer Media Senior Deputy Editor

     

Font size: - +

Various forms and combinations of biometric identification will be used to improve identification and authorisation, with each set of biometric identification methods specifically suited to the context of the application, says encryption and security multinational Gemalto Innovation marketing and communication manager and biometrics expert Xavier Larduinat.

The required security architecture and systems to handle the increased use of biometric identity verification in commerce – specifically the security and encryption key management systems – are already in place and being used to secure commercial transactions, for example, in the financial sector, he explains.

However, what will change is the reliance on passwords with a shift towards contextual security verification. Biometrics will help to improve the consumer experience and security rigour simultaneously.

Businesses can start by leveraging biometrics built into devices, such as fingerprint identification common on new smartphones and devices, as an additional, hassle-free layer of security verification to be used either before or during a transaction, he says.

Biometrics will be used for digital signatures and will steadily replace current forms of identity verification and authorisation, as well as passwords and one-time pins. It is expected that all companies will use between five and ten different biometrics, whether for in-house or external identity verification and authorisation, within the next five years.

Additionally, context-aware security verification will improve security by selectively adding layers of security checks, such as requesting a fingerprint check during a mobile bank payment instead of a mobile device authorisation. Using biometrics will also help to reduce any negative impact on customer experience.

“Less stringent authorisation and identity verification requirements can be used in situations where there is more certainty and precedence,”

says Larduinat.

Edited by Martin Zhuwakinyu
Creamer Media Senior Deputy Editor

Comments

The content you are trying to access is only available to subscribers.

If you are already a subscriber, you can Login Here.

If you are not a subscriber, you can subscribe now, by selecting one of the below options.

For more information or assistance, please contact us at subscriptions@creamermedia.co.za.

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION