I know that BIO-key technology protects personal identity by storing fingerprints as mathematical models, but what if a hacker captures the finger model?
To further protect the information when it is being transmitted, BIO-key employs multi-layer, triple encryption to prevent fraudulent capture of finger data, ensuring that no one can intercept or modify secure information over the Internet or network. The encryption is tied to session and other data to assure that no replays or redirections can occur. This means that security systems using BIO-key technology protect user privacy and provide security at the same time! And the user’s identity is protected even further- because BIO-key authorizes users based only on a mathematical model of their fingerprint, the users need not identify themselves or enter any private information when they are authenticating (a constant concern of anyone entering a PIN number at a grocery store or ATM machine). The mathematical model is meaningful only to the BIO-key software!
Related Questions
- I know that BIO-key technology protects personal identity by storing fingerprints as mathematical models, but what if a hacker captures the finger model?
- Is it possible to apply the high technology models of India and Malaysia in Turkey?
- Are Mathematical Models Obsolete for the Business School Curriculum?