When passwords get hacked, users simply create new passwords. What happens when fingerprint templates are stolen? One does not simply create a new fingerprint. Assuming that any system can be compromised, biometric authentication presents the need for a high-risk security architecture – or does it?
Public Key Cryptography Meets Biometric Security
Existing authentication methods like passwords and two-factor tokens are susceptible to malware attacks and users’ inability to remember secure codes. Mainstream adoption of biometric authentication presents the need for a secure and interoperable solution such as HYPR to address the problems presented by centralized authentication protocols.
A HYPR-Secure system does not store biometric templates in a centralized database, allowing users to authorize transactions without exposing sensitive data to the internet. By combining the convenience of biometric devices with the power of public-key cryptography, HYPR enables a next-gen user experience through a decentralized security protocol. HYPR prevents hackers from being able to attack a centralized biometric database – forcing them to target individual devices in a way that renders any large scale attack unscalable. HYPR’s multi-factor authentication solution is designed based on these guiding principles:
Here are some of the protocols implemented to achieve end-to-end biometric tokenization: