Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

I know that BIO-key technology protects personal identity by storing fingerprints as mathematical models, but what if a hacker captures the finger model?

0
Posted

I know that BIO-key technology protects personal identity by storing fingerprints as mathematical models, but what if a hacker captures the finger model?

0

To further protect the information when it is being transmitted, BIO-key employs multi-layer, triple encryption to prevent fraudulent capture of finger data, ensuring that no one can intercept or modify secure information over the Internet or network. The encryption is tied to session and other data to assure that no replays or redirections can occur. This means that security systems using BIO-key technology protect user privacy and provide security at the same time! And the user’s identity is protected even further- because BIO-key authorizes users based only on a mathematical model of their fingerprint, the users need not identify themselves or enter any private information when they are authenticating (a constant concern of anyone entering a PIN number at a grocery store or ATM machine). The mathematical model is meaningful only to the BIO-key software!

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.