全球密码行业市场前景及投资研究报告-培训课件外文版2024.5生物识别身份验证指纹掌纹眼纹_第1页
全球密码行业市场前景及投资研究报告-培训课件外文版2024.5生物识别身份验证指纹掌纹眼纹_第2页
全球密码行业市场前景及投资研究报告-培训课件外文版2024.5生物识别身份验证指纹掌纹眼纹_第3页
全球密码行业市场前景及投资研究报告-培训课件外文版2024.5生物识别身份验证指纹掌纹眼纹_第4页
全球密码行业市场前景及投资研究报告-培训课件外文版2024.5生物识别身份验证指纹掌纹眼纹_第5页
已阅读5页,还剩44页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

DIGITAL

&TRENDSBeyondpasswords:

Biometrics,multifactor,

and

passwordlessauthenticationAtrendreport

on

how

newauthentication

methods

arepavingtheway

forapasswordlessfutureAre

we

goingpasswordless?ExecutivesummaryFromsecuritytooverallbusiness

development

purposes,

the

needforsecureauthentication

methods

hasbecome

vitalforenterprises

andconsumers

whendealing

withonline

andphysicalsystems.timeline

of

secureauthentication

measures.Withgrowing

digitaldependency

–both

athomeandwork–comesagreaterawarenessof

online

security.

Duetocomplianceregulations,

MFA

iscurrently

afundamental

requirement

incertainindustries

as

atransitionalphasetoapasswordless

future.This

Statistatrend

report

provides

an

extensive

analysisof

the

mostimportant

authentication

methods,

underlining

the

securitylayersaddedover

timeaswellasthe

journey

to

passwordlessmethods.

Thesetrends

areas

follows:•

Passwordlessauthentication,

the

mostsecuremeasureavailable

thateliminatesthe

intrinsic

weakness

ofpasswordsandMFA.

However,there

aremanychallengestoimplementing

the

method

and•

Corporate

andconsumer

passwordbehaviors,

together

withtheincreaseinpasswordmanagerusage,areproof

thatpasswordshavestood

the

test

of

timeby

being

the

firstlineof

defense

inanyauthentication

process.

However,

withits

associatedrisksandsignificanttechnological

developments,

the

internetcallsformoresecurereinforcements.replacingthe

password,

especiallywhenitcomes

tolegacysystems.•

The

threatsfacedby

every

online

userhavebrought

together

varioustechgiants,including

Google,

Apple,

andMicrosoft,

toformanalliance

inorder

to

increasesecurityby

moving

frompasswordsto

passwordless

authentication.

These

companiessupportthe

development

andcomplianceof

standards,acceleratingtheavailability

of

passwordless

authentication

methods

tothe

world.•

Biometrictechnologies

havestrengthened

online

securityby

addingasecondverificationfactorbased

onauser’sunique

biologicalfeatures,

suchastheir

fingerprint

orface.Withthe

help

of

machinelearning,biometric

authentication

methods

mark

the

beginning

of

anew

eraintechnological

andonline

security.Someofthe

mostrelevantquestions

answeredin

thisreport

are:Whatarethe

current

securitymeasures?Whataretheir

weaknesses?Whatsolutions

areavailable?

Whatisthe

stateof

the

latestsecuritymeasures?Whatis

the

future

of

secureauthentication

methods?•

Multifactor

authentication

(MFA)isanother

level

ofsecurityinthe301Passwords:After

all

this

time•

Thehistory

of

passwords•

Consumer

andcorporate

password

behaviors•

Password

managerusageAshort

historyofcomputer

passwordsAwindow

to

the

pastFirst

computerpasswordFirst

passwordbreachBeginningsofpassword

encryptionThepassword

is

dead.Longlive

the

password!CodephrasesThe

history

of

passwordsgoes

backtosome

of

theworld’searliestandItwas

not

until

1960thatFernandoCorbatóimplemented

the

firstcomputer

password.MIT’s

Compatible

Time-SharingSystem

(CTSS)introduced

the

conceptof

authentication

forthe

firsttimeinthecomputingTwo

yearslater,AllanScherrcommittedthefirstpassword

theft

inhistoryby

printing

thesystem’spasswordfileswhileworking

as

aPh.D.student

on

the

CTSS.

Themain

concernfollowingCorbató’s

passwordimplementation

was

thatpasswordswerestoredincomputer

systemsinplaintext.Inthe

1970s,

RobertMorris–anAmericancryptographer

andHowever,

asCorbatósaidinaninterview

for

The

Wall

StreetJournalin2014,

“Wedidnotforesee

the

internet.”

Today,people

havepasswordsforeverything.

Socialmediaplatformsand,more

recently,

the

Internet

ofThings

arepartially

responsible

forthe

astonishing

growth

inthenumber

of

passwords.Studiesreported

thatthe

global

numberof

passwordswas

estimatedtohaveexceeded

300

billion

by2020.

Nevertheless,

inahyper-connected

anddigitized

world,passwordsarerapidlyfallingintoobsolescence.biggest

empires.

Fromwatchwords

engravedinwood

by

Roman

guardstomilitary

countersigns

usedby

Allied

forcesonD-Dayduring

WorldWarII,codewords

laid

the

foundationformodern-daycomputer

scientist

–developed

aone-wayencryption

systemcalledhashing.Fromthenon,

itwas

just

amatteroftimeuntil

dataencryptionturned

from

popular

tonecessary,

andenvironment.passwords.passwordsbecamepartof

everydaylife.Notes(s):

MIT=MassachusettsInstitute

of

TechnologySource(s):

The

WallStreet

Journal5Usingweaker

passwords

poses

asignificantriskUncoveringconsumer

password

behaviorAverage

timespent

settingup

a

newdigital

account

in2021Whentalkingaboutpassword

security,

there

aretwodifferent

applicationsegments:

consumer

andcorporate.

Regardingconsumerbehavior,passwordsareeasilycompromised

becausepeople

often

resorttopredictable

shortcuts

andpatterns

during

the

creationprocess.29%25%21%11%9%Specops,

aprovider

of

passwordmanagementandauthentication

solutions,analyzed

800

millionbreachedpasswords.The

resultsshowed

most

userswerelikely

tofollow

certainthemes

andpatterns

whencreatingapassword,such

as

favoritemusicians,sports

teams,movies,

orTVshows.5%1min2-3

min4-5

min6-10min

Over10

min

Don'tknow/notsureIn2021,

mostindividuals

spent

fiveminutes

orlesssetting

up

anew

digitalaccount.

Ontop

of

that,manyusersrarelycompliedwithpasswordsecurityrequirements.

Forinstance,in

the

United

Statesandthe

United

Kingdom,only

twoin10

people

always

created

passwordscontaining

more

than

12characters.Suchbehavior

stretches

beyond

consumer

purposes

andallthe

way

toworkenvironments.

The

significantshift

toremote

working

conditions

during

theCOVID-19

pandemic

showed

thatmany

companies

werenot

prepared

forsuch

changesin

securityandtechnology.

This

becomes

even

moreconcerningwhenacompany’ssecuritysystemrelieson

passwords,

whichcanbecompromised

due

tohumanerror.Note(s):Worldwide;

March

12

to

26,

2021;

1,000

respondentsSource(s):

IBM;ID13051216Source(s):

Specops;

NCCIC;

CybSafe;

ID1305222Passwords

are

theprimarysecuritymeasure

of

mostbusinessesMainsecurity

factorsused

by

companiesworldwidein2021

and2022Manycompanies

wereforced

tostrengthen

their

securitywhen84%PasswordSecurityquestion95%switching

toremote

workenvironments.Unlike

consumers,the

corporatesectorusuallyhasmorerobust

securitymeasuresinplaceto

protect

criticalinfrastructure

from

breachesanddatatheft.

Suchmeasuresinclude

variousauthentication

methods,

such

as

asoftwareone-time

password(OTP),

asecuritykey,

orahardwareOTP.56%68%52%SMS,voice,e-mailOTPSoftwareOTP60%41%43%35%34%PushauthenticatorBiometrics(WindowsHello)HardwareOTP13%Whenitcomes

tobusinesses,passwordsarerarelyusedasthe

soleauthentication

method.

They

areoftenused

as

partof

amultifactor

ortwo-factorauthentication

process,

alongwithother

verificationfactors,suchasanSMS.

Nevertheless,

passwordsremainedthe

mainsecurityfactorusedby

companies

worldwidein2022.45%30%2022202117%16%21%SecuritykeyNote(s):Worldwide;

2022;

700

respondents;

VPs,

directors,andC-level

executivesSource(s):

Okta;

ID13002417Strugglingtoremember

yourpasswords?For

those

usingapassword

manager,we

saluteyou!Mostimportant

reasonsforstartingtouseapassword

manager

worldwide

in2022Apasswordmanager

isasoftwareapplicationdeveloped

withthe

purpose

ofsecurelystoring

andmanagingpasswords.Allstored

credentialsfor

variousaccountsandappsareusuallymanagedusing

amaster

password.Password

managers

areby

farone

of

the

mostsecure

waystoprotect

passwords.They

allowusers

tokeep

track

of

their

credentials

withouthavingtomemorizethem,

actaspasswordgenerators,andmakesharingdata

withfriends

andfamilysafer

by

entering

asharedencryption

key.50%44%31%22%16%15%Itseemedlikea

Ikeepforgettingmy

IuseoneatworkgoodwaytoprotectmydigitalIheardorreadaboutitinthe

news

passwordswithmyfamilyIwantedtoshareIwashackedpasswordsinformationMostimportant

reasonsfornotusinga

password

manager

worldwide

in202238%32%27%27%21%Somedisadvantagesof

apasswordmanager

include

the

riskof

havingallcredentials

stored

inone

placeandtheadditional

cost–

prices

rangefromapproximatelytwoto10U.S.

dollarspermonthper

user.MycurrentsystemworksIdon'twanttopayfor

Idon'tknowwhichone

I'mafraidthe

password

Idon'tknowhowtogetpasswordprotectiontousemanagementsoftwarewillget

hackedstartedNote(s):Worldwide;

2022;

more

than2,000

respondentsSource(s):

Bitwarden;

ID1303526;

ID

13059628How

passwordmanagers

improved

securityWhatdoesapassword

managerdo?The

rapiddevelopment

of

the

internet

led

toanincreasingnumber

andvarietyofcyberattacks,

whichquicklyillustrated

thatpasswordswerenot

even

close

toproviding

secure

online

access.

Browser-basedpasswordmanagerswerethe

firstgeneration

of

passwordmanagers,andthey

playedakey

role

inimproving

one

of

the

biggest

passwordlimitations:

safe

storage.New

password

managers

haveemerged,

adding

further

securitylayersdue

tothe

riseof

maliciousactorsandmodern

cyber

threats.Passwordmanagersareconstantlyintroducing

new

functions,

such

as

cloud-basedapplications

oratwo-factor

authentication

mode.

Thelatestpasswordmanagers

also

comeequipped

withseveralautomaticfunctions.

Somelockaccesswhenthe

inactivitytimerismet,whileothers

lockandunlockbasedon

user

proximity.However,

inthe

early

2000s,

the

secondgeneration

ofpasswordmanagersaddressedthe

most

importantpasswordweakness:security.Unlike

the

firstgeneration,

whichonlymanaged

passwords,the

secondgeneration

developed

anew

algorithmtoensure

passwordsecuritybyintroducing

one

passwordto

rulethem

all.Simplyput,

inordertoaccessthe

passwordsstored

inthe

software

vault,the

usermust

insertamaster

password

along

andcomplex

passwordthat

should

not

bedisclosed

tothird

parties.3.07bn2.90bnPasswordmanagement

marketrevenueworldwide(inbillionU.S.

dollars)20201.25bn20252027By2027,

the

overallrevenue

of

the

passwordmanagementmarket

isforecasttodecreaseas

passwordsslowly

become

obsolete.

Untilthen,passwordmanagersremain

the

best

solution

for

both

consumersandbusinesses

toensure

secure

passwordauthentication.In2020,

the

passwordmanagementmarket

wasvaluedat1.25billionU.S.

dollarsandis

expected

toexceed

three

billion

U.S.

dollarsby

2025.The

riseinmarketrevenue

suggests

that

passwordmanagers

arestillhighlyrelevantin

maintainingpasswordsecurity.Note(s):Worldwide;

2022Source(s):

GlobeNewswire;

SANS

Institute;

ID1300988;

ID

13056489Passwords:Thegood,

the

bad,andthe

unknownThefuture

of

password

securityTHEGOODTHEBADWhenaskedaboutthe

future

ofcomputerpasswordsin2014,

FernandoCorbatótoldTheWallStreetJournal,

“Passwordsarenota

super-high

level

ofsecuritybutareenough

toprotectagainstcasual

snooping.”

Attheendoftheday,passwords

areeasytoimplement,

easy

tochange,

andnoadditionalhardwareisrequiredtoensurepasswordauthenticationworks–which

iswhytheyarestillsowidely

used.Passwordsecurityremainsimportant

bymaintainingthe

firstlineofdefenseinsecuringacomputersystem.

Thedirector

ofBoresConsultancy,JamesBore,

definedthepersistenceofpasswordsecuritybysaying

passwords

werethe

worstformof

secureauthentication,exceptfor

allotherformsthat

havebeentried.Inthe

contextofcyberattacksbeingpoweredbyartificialintelligence,

itwillnotbelonguntil

computingsystems

areabletofullyrecognizeusers’passwordbehaviorsbasedonwordsandactivitytracking.Oneaspect

thatremainsuncontestableisthatanyfuture

passwordusagemustinvolvea

large-scaleadoptionoflonganddiversecredentialsacrossaccounts.

However,

thisoftenresultsinpasswordfatigue,

acommonfeelingexperiencedbyindividuals

whenhavingtorememberanoverwhelmingnumberofcredentials.

Thefuture

ofpasswordsecuritymayfranklybethattheywillceasetoexistinfavorofmore

secureandreliablemeasures,such

asbiometricsor

passwordless

authentication.THEUNKNOWNDespitethe

increasing

number

ofredflagsrelatedtopasswordsecurity,the

future

ofpasswordsisyet

tobedecided.Password

managers

haveaddressedthe

mostimportantconcernsrelatedtopasswords:

creation,storage,

andsecurity.Havingthissoftwarewidelyaccessible

toboth

consumersand

businesses

mayjust

betheboostthatpasswords

needtosurvive.

Withoutadoubt,

passwords

remainessential

tosecurity,buttheyarenotthe

onlyauthenticationmethodthatcan

orshouldprotectdevicesordata.Passwords

alonewillmostprobablyneverbesecureenough.

However,whenincludedina

multifactorortwo-factorauthenticationsystem,

theyprovide

just

the

right

securitylayer.10Source(s):

The

WallStreet

Journal;Bores

Consultancy

Ltd.02Biometrics:The

user

is

the

password•

Biometric

authenticationsystems•

Multimodal

and

behavioral

biometrics•

Thelimitationsofbiometric

authenticationsystemsFrom

passwords

tobiometricsShifting

theauthenticationprocess

from

thehumanfactorto

physicalandbehavioral

attributesPassword

authenticationsystems

require

usersto:Biometric

authenticationsystems

eliminateknowledge-basedBiometric

data

doesnotneedtoberemembered,cannotbestolen,bought,orshared.Thereisalso

noneedtoinsecurely

keeppasswords

onaPost-itnoteinthe

officeBiometric

systems

fulfill

thedemandfor:Unlikepasswords,users

cansafely

have

thesamebiometric

authentication

–fingerprint

identificationorfacerecognition

acrossmultipleaccountsThemostsecurepassword

is

theone

youcannotremember•••creatememorizeeventuallysharetheircredentials•••saferquickermore

convenientauthenticationmethodsauthenticationprocesses12Biometricauthentication

systems:

What,

when,

andwhy?Applications

anddevelopmentBiometricsisderivedfromthe

Greekwords

for“bio”

(meaninglife)and“metrics”

(measure).Simplyput,

abiometric

authentication

processrelieson

anindividual’sunique

biologicalfeaturesto

verifytheir

identity.

Hence,

biometrics

areuniversal,unique,

andimmutable.The

current

automatedbiometric

systemshaveonlybeen

availabletoconsumers

andcompaniesfor

the

pastfew

decades.Nevertheless,

this

technology

isbasedon

concepts

developedhundreds

of

yearsago.Biometricsystemsgainedvisibilityat

theend

of

the

19th

century,

withthe

development

of

the

Henryclassificationsystemfor

fingerprints

and,

subsequently,

thefingerprint

branchatNew

ScotlandYard

inthe

UK.The

market

revenue

ofbiometric

authentication

systemsreachedanestimated43billion

U.S.dollarsin2022

andisforecasttoalmostdouble

invalueby

2027.

One

of

thereasonsforthe

growth

isthe

extensive

useof

biometricauthentication

inconsumerelectronics

forend-userconvenience.

Additionally,

corporationsandgovernmentinstitutions

areset

toincreasetheir

adoption

of

identityandaccessmanagementsolutions.Inthe

1960s,

facerecognition

was

the

firstbiometric

tobecomesemi-automated,

makingreal-timefacedetection

possibleby

1991.The

development

ofbiometric

authentication

systems

skyrocketedinthe

21st

century.

The

firststatewide

automateddatabasesofpalm

prints

were

deployed

inthe

U.S.

in2004.

By

2010,

biometricsystemswerealready

being

used

forterrorist

identification.13Biometricsystems

are

beingintegrated

intomillionsof

devicesGlobal

biometric

system

market

revenue

from

2020to

2027(inbillion

U.S.dollars)By2024,

facialrecognitionhardwareisforecasttobedeployedinover800millionmobiledevices.

Atthesametime,

4.6

billionsmartphoneswillbeequippedwithfingerprint

sensors.In2019,

facialrecognitionhardwarewasdeployedinapproximately96

millionmobiledevices.Note(s):Worldwide;

2022;

*forecastSource(s):

ReportLinker;

MarketsandMarkets;

ID104870514Themarket

revenue

of

biometricsecurity

systemsisgrowingFacial

recognitionandfingerprint

identification

are

themostpopular

biometric

security

systemsFacialrecognition

market

sizeworldwide

from

2019

to2028(inbillionU.S.

dollars)Someofthe

mostrelevantinnovations

concerningfacial

recognition

systemshavebeen

due

totheintegration

of

artificial

intelligence.

This

led

toreal-timeidentification,

anti-spoofing

measures,aswellasdiminished

racial

orgender

bias.12.9212.675.014.353.60Alack

of

proper

andclear

regulations

togovern

itsusewas

one

of

the

reasonswhyfacial

recognition

marketrevenue

fluctuated

until

2021.

However,

by

2027,

themarket

sizeisforecast

tojump

tonearly13billion

U.S.dollars.2019202020212027*2028*Automated

fingerprint

identificationsystemmarket

revenueworldwide

from

2021

to2027(inbillionU.S.

dollars)Meanwhile,

withamarket

revenue

of

nearlyninebillion

U.S.

dollarsin2022,

fingerprint

identificationremainsthe

strongest

andmost

frequently19.53implemented

biometric

securitysystem.

The

increaseindemandfor

fingerprintidentification

infinance

andbanking

–aswellasinsmartphones

andotherconsumer

electronics

–isexpected

todrivethemarket’sgrowth

inthe

upcoming

years.8.937.66202120222027*(1)

Note(s):

Worldwide;

2019

to2021;

*forecastSource(s):

ReportLinker;

GlobeNewswire;

ID

1153970(2)

Note(s):

Worldwide;

2022;

*forecastSource(s):

Business

Wire;

ID

126457915Theriseof

biometrics

inthefinance

andbanking

sectorSaudi

Arabialeads

astheUnited

States

lags

behindBiometric

usageworldwide

in2021,

by

typeIncreaseinbiometric

authenticationworldwide

in2021,

by

industryShare

ofconsumers

ready

tousefingerprint

authenticationinsteadofa

PIN

code

whenpaying

instorein2021,

by

country70%1,100%94%92%88%86%73%770%70%69%43%580%25%17%160%11%Financial

Education

Healthservices

careITand

TechnologytelecomsFingerprintFaceVoiceIrisSaudiArabiaIndiaBrazilSouth

Australia

UKAfricaU.S.(3)

Note(s):Worldwide;

2021;

3,422

respondentsSource(s):

Idemia;Dentsu

DigitalInc.;

ID1338830(1)

Note(s):

Worldwide;

2021;

3,422

respondentsSource(s):

Idemia;Dentsu

DigitalInc.;ID1338824(2)

Note(s):

Worldwide;

June

1,

2020,

toMay

31,

2021Source(s):

DuoSecurity;

ID130322716Fingerprint

authentication

forend-userconvenienceandsecurityMitigating

risks,addressingchallenges,andimprovinguser-experienceSensortypesFirst

smartphone

modelstoimplementthe

technologyCapacitiveUses

the

flow

of

electricalcurrents

to

form

animageof

afingerprintQuickandpreciseCannotbeimplementedon

screenPantechGI100Toshiba

Portégé

g500HTCOne

MaxiPhone

5s2004200720072015OpticalWorks

like

adigital

cameratoproduceanimage

ofafingerprintCanbeimplementedbehindthescreenSlower

and

less

accuratecompared

withothertechnologies

andcanbefooled

easilyVivo

X20

Plus2017UltrasonicUses

high-frequencysoundwaves

to

locateridges

and

grooves

toform

afingerprint

imageCanbeimplementedbehindthescreenHighcostSamsung

Galaxy

S10201917Multimodal

biometricsMitigating

risks,addressingchallenges,andimprovinguserexperienceWhichbiometric

do

youthink

isthemostlikelytoshowthegreatestincreaseinuseoverthenext

fewyears?One

of

the

segments

most

likelytoshow

asignificantincreaseinusageis50%multimodalbiometrics.

Simplyput,unimodal

biometric

authentication

verifiesonly

one

humancharacteristic,whereasmultimodalsystems

ensure

an

extra

layerof

securityby

checking

atleasttwobiometric

characteristics.Someof

themostimportantadvantagesofamultimodalauthentication

systemareimproved

recognition

accuracy,centralizedandunified

systemmanagement,andincreasedsecurity

by

diminishingthe

chancesof

spoofing.

Thismethod

willcontinue

todevelop

as

the

authenticationmarket

isconstantly

searchingforwaystofind

the

rightbalancebetween

securityandimproved

userexperience.Inaddition

to

beingsecure,convenient,anduser-friendly,biometricauthenticationmethodsare

constantlyimproving

andadaptinginorder

to

mitigate

risksandaddress

further

challenges.14%9%6%5%4%3%3%FaceMultimodalBehavioralVoiceContactlessfinger/veinIrisFingerprintDon'tknowNote(s):Worldwide;

May

2022;

220

respondents;industry

professionalsSource(s):

BiometricsInstitute;

ID

133934918Behavioral

biometricsRevolutionaryauthenticationmethodrequiresnouser

actionWiththe

help

of

machinelearning,behavioralbiometricauthenticationidentifies

auser

basedon

their

uniquebehaviorsandpatternswhen

interacting,

forexample,

withadevice

such

as

amouse,keyboard,

ortouchscreen.MouseactivitySpeed,

movement

patterns,andscrollpreferencesKeystroke

movementSpeed,

shortcuts,andadvanced

keysUnlike

other

activeauthentication

methodslike

passwordsor

physicalbiometrics,behavioralbiometricsarepassiveauthentication

methods

sincethey

donotrequire

any

additional

actiononbehalf

ofthe

user.Analyzepatternsin

humanactivityTouchscreen

behaviorPresssize,area,and

pressureApasswordsystemisdeterministic

–meaningits

onlyfocus

ison

the

content

ofthe

password.Consequently,

the

user

isauthenticated

once

the

passwordmatches.However,

inthis

case,there

isno

knowingwhoentered

the

password.Withbehavioralbiometrics,

the

useristhe

password.DevicemovementGyro,

orientation,andscrolling19Thelimitations

of

biometric

authentication

systemsCanbiometrics

be

hacked?Overall,when

comparedwithpasswords,biometric

authentication

methods

provide

higher

securitystandardssince

breachingthemisafarmorechallenging

process

thanhacking

alphanumericcodes.

However,

biometric

authentication

isfar

from

flawless.Themethods

simply

createasaferenvironment,

thus

layingthe

foundation

of

anew

systemthat

isasaferalternative

topasswords.Security

limitationsEthicalandprivacy

concernsDevicelimitationWhilebiometricsensurehigher

securitystandardsthanpasswords,theidea

ofbreachingabiometricauthenticationsystem

isfarscarier.Unlikepasswords,

biometricdatacannotbechanged.Whileeverysmartphonecomeswithintegrated

biometricsoftware,notallpersonal

electronicdevicesarecurrentlyequippedtosupportsuch

anauthenticationmethod.Biometric

datatakesethical

andprivacyconcernstoawholenewlevel

becausethe

dataisunforgettable,

unconcealable,

andpermanent.Thatexplainswhyusersstillturn

to

passwords

whenowningaPC,

laptop,or

Macthatdoesnothaveabiometricauthenticationsystem

incorporated.Themainprivacyconcernrelatestodatastorageandenrollment.Forexample,

when

itcomestobiometricpaymentcards,54

percentofsurveyrespondentsworldwidepreferredto

enrolltheir

biometricdataathomebythemselves;

45

percentwantedtohavetheirbiometricdatastoredonthe

cardandnotata

bank.Biometric

technologiesarebasedonpatternrecognitionalgorithms

thatleavespacefortwosecurityconcerns:However,

such

a

limitationcanbebypassedbyusingatwo-factorauthenticationmethodconsistingofacomputerpasswordalongwithbiometricauthenticationonasmartphone.Biometric

authenticationcan

also

beaddedtoa

PCor

laptopviaaUSB

scanner,which

usesalight-sensitivemicrochiptoproduceadigitalimage

ofauser’sfingerprint.1.

Afalsepositive(whenanunauthorizeduserisgranted

access

tothe

system).2.

Afalsenegative(when

the

right

useriserroneouslynotauthenticated).Commerce,

social

media,

andlawenforcement

werethe

industriesinwhich

biometricslegislationwas

perceived

asnotstrict

enough,accordingtoaglobalsurveyin2022.

However,

the

samesurveyfoundthatsixoutof10

Europeanrespondentsbelieved

thel

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论