The following report is by Biometric Update:
Polish fintech provider PayEye has obtained its FIDO Biometric Component Certification and proven highly resistant to presentation attacks, according to a news release.
PayEye submitted the latest version of its eyePOS payment system, equipped with the company’s proprietary iris recognition algorithm, to trials run by private U.S. lab iBeta. EyePOS uses a fusion of face and iris biometrics to authenticate the identity of the person making a payment.
The FIDO Alliance certification requires evaluation of both biometric matching performance and spoof attack detection.
In tests to measure presentation attack detection, PayEye attained an error rate of 0 percent, meaning its eyePOS payment terminals’ biometric detection capability rejected fourteen different types of A and B level FIDO attacks over 300 attempts.
This certification is an important step and a milestone for our company, as it proves that our technology is accurate and secured against attacks, [PayEye is] a system that you know how to use the moment you see it.
No biometrics-based payments vendor before us has integrated two complementary biometric characteristics in such a natural and intuitive way. We chose iris and face for the ultimate user experience, as these traits are widely available, contactless, and hygienic. We believe that this is the future of payments.
Says PayEye CEO Daniel Jarząb
Speaking in October 2022 at the Trust Services Forum/CA Day in Berlin, Germany, iProov CEO Andrew Bud identified presentation attacks as a major threat to consider in implementing automated biometric verification for digital identity, along with fraudulent identity claims in person, and digital injection attacks such as deepfakes.
AUTHOR COMMENTARY
For those that may be confused as to what a “presentation attack” might be, Biometric Update has a short PDF explaining what it is and how they can be prevented. In short, it comes down to this:
The process of a biometric system detecting a biometric spoof is known as Presentation Attack Detection (PAD). PAD systems utilize a combination of hardware and software technologies to determine whether or not a presented biometric is genuine. A subset of this is liveness detection, which refers to a PAD system’s specific ability to differentiate between human beings and non-living spoofs.
Some PAIs—such as 3D masks, synthetically generated irises, or photographs—can fool a less-secure biometric system. Furthermore, since these attacks occur in the physical world, detection systems often need to include a combination of illumination, sensing, and processing to determine the authenticity of the biometric sample.
Therefore, successful PAD often focuses on the interplay between hardware and software to maximize accuracy and usability.
PAD is crucial in applications where the combination of security and convenience is a priority. This is especially true in automated identification and authentication scenarios— such as physical access control, travel facilitation, payments, or online identity verification—where it may be inefficient, insufficient, or unworkable to have a qualified person manually ensure the authenticity of the presented biometric. time to market, and technology ecosystem support.
Just yesterday I reported how a man in Georgia was wrongfully arrested because facial recognition cameras in Louisiana mistook him for someone else. So to say this technology will fair any better is a bit presumptuous. To the same end, it can be scarily accurate, but this stuff is nowhere near as perfect as these tech nerds would have you to believe.
Again, this is bringing us closer to the mark of the beast.
[16] And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: [17] And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. [18] Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is Six hundred threescore and six. Revelation 13:16-18
[7] Who goeth a warfare any time at his own charges? who planteth a vineyard, and eateth not of the fruit thereof? or who feedeth a flock, and eateth not of the milk of the flock? [8] Say I these things as a man? or saith not the law the same also? [9] For it is written in the law of Moses, Thou shalt not muzzle the mouth of the ox that treadeth out the corn. Doth God take care for oxen? [10] Or saith he it altogether for our sakes? For our sakes, no doubt, this is written: that he that ploweth should plow in hope; and that he that thresheth in hope should be partaker of his hope. (1 Corinthians 9:7-10).
The WinePress needs your support! If God has laid it on your heart to want to contribute, please prayerfully consider donating to this ministry. If you cannot gift a monetary donation, then please donate your fervent prayers to keep this ministry going! Thank you and may God bless you.
I make over 13k a month working part-time. I listened to different humans telling me how a good deal of cash they may make online,N255 so I was determined to locate out. Well, it turned into all actual and it absolutely modified my life. Everybody must try this job now by just using this site.. Paynet2.com