Biometric Cryptography

When passwords get hacked, users simply create new passwords. What happens when fingerprint templates are stolen? One does not simply create a new fingerprint. Assuming that any system can be compromised, biometric authentication presents the need for a high-risk security architecture – or does it?


Public Key Cryptography Meets Biometric Security


Existing authentication methods like passwords and two-factor tokens are susceptible to malware attacks and users’ inability to remember secure codes. Mainstream adoption of biometric authentication presents the need for a secure and interoperable solution such as HYPR to address the problems presented by centralized authentication protocols.


HYPR Biometric Encryption

A HYPR-Secure system does not store biometric templates in a centralized database, allowing users to authorize transactions without exposing sensitive data to the internet. By combining the convenience of biometric devices with the power of public-key cryptography, HYPR enables a next-gen user experience through a decentralized security protocol. HYPR prevents hackers from being able to attack a centralized biometric database – forcing them to target individual devices in a way that renders any large scale attack unscalable. HYPR’s multi-factor authentication solution is designed based on these guiding principles:

  • No authentication channel should rely on the centralized storage of biometrics.
  • End-users should be able to choose which biometric authenticators they will utilize.
  • Biometric data should remain encrypted and protected against malware on a user’s device.
  • Relying parties should be able set policies for which biometric authenticators can be utilized.

Here are some of the protocols implemented to achieve end-to-end biometric tokenization:








Related Topics: