Skip to main content

How Biometric Authentication Apps Enhance Security

The mobile phone has long since graduated from being a device that purely enables person-to-person voice communication. The role of the smartphone is far more expansive, as it has become embedded into lifestyles -- used to surf the web, take photos, connect to social networks, get directions, etc.

The proliferation and adoption of the smartphone in particular has been a game changer -- totally redefining what a personal telephone device is capable of doing for the owner -- as well as raising expectations for the user interface (UI).

Handset manufacturers have had to innovate in new modes of device control that allow users to operate it without having to touch, or indeed, look at it. Moreover, as these devices enable access to a wealth of personal information about the user, new forms of security are required.

Juniper Research has found that that more than 770 million biometric authentication applications will be downloaded per year by 2019 -- that's up from just 6 million this year and dramatically reducing dependence on alphanumeric passwords in the mobile phone market.

Human Interface technology market is forecast to enjoy dynamic growth in the coming 5 years. The overall market is also expected to break the billion-dollar barrier in 2019, with estimated revenues of more than $1.2 billion in that year.


Applications for Biometric Technologies

The Juniper market study found that a number of high-profile deployments of biometric authentication techniques would drive wider adoption. It highlighted the combination of Apple's Touch ID authentication allied to tokenization in NFC payments as a key case in this regard.

It argued that fingerprint authentication would account for the overwhelming majority of such apps in the medium term, driven by increasing deployment of fingerprint scanners within mid-range smartphones.

However, the study found that other forms of biometric identification that do not require embedded hardware are also emerging, such as the Descartes Biometrics ERGO ear print biometric authentication app and the Nuance voice authentication service.

Biometrics Can Reduce Rejection Rates

A key benefit of biometrics identified by the study findings was its capability to enhance accessibility by reducing rejection rates of authentication systems. Juniper argued that in addition to the enhanced security, biometric applications can improve the user experience by making it easy for the device owner to make transactions.

Juniper also claims that as consumers seek to reduce the likelihood of their social media profiles being hacked, service providers such as Facebook may turn to facial scanning to add value through increased authentication security.

That said, there's a need to reassure people of the security benefits of biometric technologies over traditional alphanumeric authentication. Meaning, significant public education would likely be necessary, in order for the full potential of biometric technology advantages to be realized.

Popular posts from this blog

IoT Device Management Demand Gains Momentum

More forward-thinking CIOs and CTOs are focused on the adoption of the Internet of Things (IoT). Management challenges are top of mind for those who have already deployed a large number of sensors and associated network edge devices. Device management services are evolving in response to a greater breadth of new device technologies such as edge intelligence and related connectivity solutions, as well as the customer scalability and security of IoT deployments. But forward-looking suppliers are also preparing for a world where 41.3 percent of the connected devices will be using some form of Low Power Wide Area (LPWA) technologies by 2026. IoT Device Management Market Development Since IoT customers increasingly need to manage a larger fleet of connected devices, ABI Research now forecasts that IoT device management services will exceed $36.8 billion in revenues by 2026. Standardization is beginning to play a bigger role in device management services, as more connected devices use LPWA t

Anywhere, Anytime Workplace Demand for SASE

The ongoing adoption of flexible working models within the enterprise market has significant implications for typical IT organizations that must now support knowledge workers and front-line employees that operate outside the corporate network perimeter. The global COVID-19 pandemic created IT networking and security challenges. The expansion of the distributed workforce, an increasing reliance on cloud computing infrastructure, and the requirement to securely connect online employees -- wherever they choose to work, at any given moment in time. Legacy IT solutions that have rigid network underlays and a requirement for on-premises infrastructure cannot adequately deal with these trends. This 'Anywhere, Anytime Workplace' led to demand for new Secure Access Service Edge (SASE) solutions, with networking and security delivered as-a-service. Anywhere, Anytime Workplace Market Development   Although converging networking and security capabilities offer enterprises a promising solut

Cloud Edge Computing Demand Continues to Grow

Public cloud computing solutions are moving closer to the edge of networks where CIOs and CTOs are hosting new apps. The edge journey is well underway for forward-looking organizations as they seek to connect with customers, improve operational efficiency, and adopt digital business technologies to drive innovation. The latest worldwide market study by International Data Corporation (IDC) found that three-quarters of organizations plan to increase their edge computing spending over the next two years with an average increase of 37 percent. A combination of factors is driving this increased spending at the edge. Cloud Edge Computing Market Development The performance requirements of expanding workloads and new use cases that leverage artificial intelligence (AI) and machine learning (ML) demand greater compute capacity at the edge. In addition, the amount of data being stored in edge locations are rapidly expanding, and organizations plan to keep this data longer. As a result, the numbe