In a world where confidentiality and integrity are a vital part of who we are, it is vital that new and improved methods of keeping data private are continuously on the increase. Biometric implementation actively decreases fraud while proactively increasing convenience and speed of services. A case study by “RightPatient” an Iris biometric modality technique saw “close to a dozen cases prevented at each of their respective locations” (M2sys.com, 2018)for medical identity fraud. IoT is to blame for the increase in security for these multimedia devices. Two-step verification allows users to increase user security whilst increasing the productivity of the environment. If a first-time user is to set up a password for internet banking and they are told to create a sophisticated password, without having any education on what a sophisticated password should contain – could lead to problems in the future. Biometrics do not solve the issue, yet they do enhance the problem of forgetting a password.
Moreover, a biometric form of authentication and authorisation allows for users to forget their passwords and use security questions as a form of backup. Two factor authentication is still is not fraud-proof, users are just increasing the number of times they are typing in their password. In the case of Apple using Touch ID on their mobile phones, tablets and now MacBook’s, this has shown a wide acceptance to biometric security. However, many choose to stick to the conventional four-digit passcode. Cracking the passcode was easier as there were a finite number of combinations (10,000).
Two types of provisioning are used to biometrics which are verification and identification. When a user is showing a form of identification that they claim to be themselves, the system is then trying to verify this. “I already know who you claim to be, I just need to verify that it’s true.” (Veridium, 2018). This is known as a 1:1 match. This is usually found at airport control; the passenger provides a passport with biometric data which will be scanned against the database to prove who they are.
Whilst; identification is a 1: n as the system accepts the biometric and compares it to many templates within the database. The system may return several results for the individual which can then be filtered down. The system doesn’t necessarily have any pre-knowledge of who the person might be. The UK government hold biometric data on convicted criminals and those who may have voluntarily given DNA or biometric data.