Skip to main content

How Biometric Authentication Apps Enhance Security

The mobile phone has long since graduated from being a device that purely enables person-to-person voice communication. The role of the smartphone is far more expansive, as it has become embedded into lifestyles -- used to surf the web, take photos, connect to social networks, get directions, etc.

The proliferation and adoption of the smartphone in particular has been a game changer -- totally redefining what a personal telephone device is capable of doing for the owner -- as well as raising expectations for the user interface (UI).

Handset manufacturers have had to innovate in new modes of device control that allow users to operate it without having to touch, or indeed, look at it. Moreover, as these devices enable access to a wealth of personal information about the user, new forms of security are required.

Juniper Research has found that that more than 770 million biometric authentication applications will be downloaded per year by 2019 -- that's up from just 6 million this year and dramatically reducing dependence on alphanumeric passwords in the mobile phone market.

Human Interface technology market is forecast to enjoy dynamic growth in the coming 5 years. The overall market is also expected to break the billion-dollar barrier in 2019, with estimated revenues of more than $1.2 billion in that year.


Applications for Biometric Technologies

The Juniper market study found that a number of high-profile deployments of biometric authentication techniques would drive wider adoption. It highlighted the combination of Apple's Touch ID authentication allied to tokenization in NFC payments as a key case in this regard.

It argued that fingerprint authentication would account for the overwhelming majority of such apps in the medium term, driven by increasing deployment of fingerprint scanners within mid-range smartphones.

However, the study found that other forms of biometric identification that do not require embedded hardware are also emerging, such as the Descartes Biometrics ERGO ear print biometric authentication app and the Nuance voice authentication service.

Biometrics Can Reduce Rejection Rates

A key benefit of biometrics identified by the study findings was its capability to enhance accessibility by reducing rejection rates of authentication systems. Juniper argued that in addition to the enhanced security, biometric applications can improve the user experience by making it easy for the device owner to make transactions.

Juniper also claims that as consumers seek to reduce the likelihood of their social media profiles being hacked, service providers such as Facebook may turn to facial scanning to add value through increased authentication security.

That said, there's a need to reassure people of the security benefits of biometric technologies over traditional alphanumeric authentication. Meaning, significant public education would likely be necessary, in order for the full potential of biometric technology advantages to be realized.

Popular posts from this blog

Wireless Solutions Advance Work from Home Trends

Despite a challenging backdrop from the ongoing effects of the global COVID-19 pandemic, the negative impact on fifth-generation (5G) wireless supply chains has been minimal compared to the wider mobile smartphone market. This led to 5G mobile devices becoming more diverse, brought to market quickly at a variety of price points, thereby accelerating affordability and adoption. The mobile market is transitioning to 5G and many leading vendors are now exploring the low-priced 5G smartphone segment. According to the latest worldwide market study by ABI Research, 681 million 5G handsets will be shipped in 2022. Therefore, the race is on for OEMs to find that all-important level of differentiation in their flagship portfolios to help boost margins and improve market share. 5G Wireless Market Development Vendors continue to drive the adoption of new product designs, screen technology, chipsets, and camera setups -- notably within the flagship smartphone segment. Meanwhile, the leaders seek a

Software-Defined Infrastructure: The Platform of Choice

As more organizations adapt to a hybrid working model for their distributed workforce, enterprise CIOs and CTOs are tasked with delivering new productivity-enabling applications, while also seeking ways to effectively reduce IT cost, complexity, and risk. Traditional IT hardware infrastructure is evolving to more software-based solutions. The worldwide software-defined infrastructure (SDI) combined software market reached $12.17 billion during 2020 -- that's an increase of 5 percent over 2019, according to the latest market study by International Data Corporation (IDC). The market grew faster than other core IT technologies. The three technology pillars within the SDI market are: software-defined compute (53 percent of market value), software-defined storage controller (36 percent), and software-defined networking (11 percent). "Software-defined infrastructure solutions have long been popular for companies looking to eliminate cost, complexity, and risk within their data cente

Digital Identity Verification Market to Reach $16.7B

As more enterprise organizations embrace the ongoing transition to digital business transformation, CIOs and CTOs are adopting new technologies that enable the secure identification of individuals within their key stakeholder communities. A "digital identity" is a unique representation of a person. It enables individuals to prove their physical identity during transactions. Moreover, a digital identity is a set of validated digital attributes and credentials for online interactions -- similar to a person's identity within the physical world. Individuals can use a 'digital ID' to be verified through an authorized digital channel. Usually issued or regulated by a national ID scheme, a digital identity serves to identify a unique person online or offline. Digital Identity Systems Market Development Complementary to more traditional forms of identification, digital identity verification systems can enhance the authenticity, security, confidentiality, and efficiency of