SlideShare a Scribd company logo
How will biometric payment
overcome consumer fears
over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?
Many Biometric Systems Rely on Central Databases
CIR
IDENT
Sources: https://www.wired.co.uk/article/wired-awake-150819, https://www.technologyreview.com/f/614163/data-leak-exposes-unchangeable-biometric-data-of-over-1-million-people/
How will biometric payment overcome consumer fears over privacy and contactless?
Many Biometric Systems Rely on Central Databases
CIR
CIR
Databases
can get
compromised!
How will biometric payment overcome consumer fears over privacy and contactless?
Ingredients for Fears Over Biometrics
CIR
How will biometric payment overcome consumer fears over privacy and contactless?
Ingredients for Fears Over Biometrics
CIR
Scarce resource
How will biometric payment overcome consumer fears over privacy and contactless?
Ingredients for Fears Over Biometrics
CIR
No concerns!?
How will biometric payment overcome consumer fears over privacy and contactless?
Sniffing
Relay attacks
Stolen / lost cards
Source: The Independent
Contactless Payment Penetration Increases, some fears remain…
General Biometric System Overview
How will biometric payment overcome consumer fears over privacy and contactless?
PRE-
PROCESSING
FEATURE
EXTRACTOR
TEMPLATE
GENERATOR
MATCHER1
REFERENCE
TEMPLATE
2 3 4

MATCH
STATUS
TEST
TEST
SENSOR
ENROLMENT
Privacy Intrusiveness Assessment
Key questions included in EU’s
General Data Protection Regulation (GDPR)
Source: https://eugdpr.org/)
Is biometric data stored?
What data is stored?
Where is data stored?
Is the storage permanent or temporary?
How is biometric data processed?
Privacy intrusiveness assessment
Is biometric data stored?
Many EU passports
include JPEG file of
holder’s fingerprint
PKI-based Extended
Access Control Authentication
Reference
fingerprint
Matching SW
Candidate’s
fingerprint
Issuing country grants
through reciprocal
agreements to those
authorized to access
confidential information
on the chip.
Privacy intrusiveness assessment
Is biometric data stored?
Interoperability and algorithm independence
At stake: Most people only have 10 fingerprints
Tamper-resistance of
• ID document
• Communication
• Matcher execution
Permanent storage of data in central
database – e.g. TES, CIR
STORAGE
Privacy intrusiveness assessment
What data is stored?
US passport stores no biometric data
US can’t do EAC on EU passports
DHS’ IDENT system stores some
data to facilitate re-entering visitors
What data is stored sounds like a
reasonable question?
It’s recommended to store the
template rather than the fingerprint.
?
Privacy intrusiveness assessment
Where is data stored and processed?
Storage location?
Who has access to it?
For which purpose?
Tamper-proof storage and
processing in a secure
environment is a must.
Source: https://www.nextgov.com/it-modernization/2019/06/dhs-move-biometric-data-hundreds-millions-people-amazon-cloud/157837/
Privacy Intrusiveness Assessment Based on GDPR
Q1: Is biometric data stored?
Q2: What data is stored?
Q3: Where is data stored?
Q4: Is the storage permanent or temporary?
Q5: How is biometric data processed?
A1: Yes
A2: Enrolled reference template
A3: Inside the secure element
A4: Storage
Reference template permanently stored
Candidate template temporarily stored
in RAM during match
A5: Match is processed in secure element
Biometric smart card
To conclude:
How will biometric payment overcome consumer fears
over privacy and contactless?
Personal device  GDPR compliant
• No central database
• Storage of template vs. image
• Tamper resistant device
• Match in Secure Element (SE) is a MUST
No data is retrieved over contactless
without the fingerprint authentication.
€430
100
80%
200
Million turnover in 2018
Dedicated employees
worldwide
Of the population
uses Linxens
products every day
Billion
microconnectors
supplied to the
market
Linxens
is a global leader in
Microconnectors,
RFID Antennas
& Inlays
Production sites
Clients over
the world
Research &
Development
Centers
Billion RFID
Antennas sold
since 2008
Years
experience
6
10
3200
30
4
More than
Linxens products in various applications
1) * Sales Representatives ** Sales Office
Linxens Global Footprint
South America*
France – Levallois, Mantes-la-Jolie, Vorey
Germany - Dresden
The Netherlands - Wijchen
South Korea**
China – Suzhou, Guangzhou, Shanghai
India - Mumbai
Thailand - Ayutthaya
Singapore – Changi
LATAM*
USA*
linxens.com
For further information, please feel free to contact:
• Jean-François Durix, Linxens Business Development Director
Jean-Francois.Durix@linxens.com
• Stephany Gochuico, Linxens Digital & Product Communications Manager
Stephany.Gochuico@linxens.com

More Related Content

What's hot

Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
IJARIIT
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
Veridium
 
Relationship Cards Iiw Nov 3 2009
Relationship Cards Iiw Nov 3 2009Relationship Cards Iiw Nov 3 2009
Relationship Cards Iiw Nov 3 2009
Internet Identity Workshop
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
Syeful Islam
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
Diane M. Metcalf
 
Biometric Authentication in Banking
Biometric Authentication in BankingBiometric Authentication in Banking
Biometric Authentication in Banking
Muthu Ramanathan
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
Amira Serag
 
Mobile wallet security
Mobile wallet securityMobile wallet security
Mobile wallet security
Mahindra Comviva
 
E commerce
E commerceE commerce
E commerce
Kavita Sharma
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
journal ijrtem
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Jigisha Aryya
 
E - comerce
E - comerceE - comerce
E - comerce
Rakesh Kumar
 
E banking & security
E banking & securityE banking & security
E banking & security
Sumeer Sharma
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
Vipin Subhash
 
E commerce
E commerceE commerce
H029044050
H029044050H029044050
H029044050
researchinventy
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
proma_goswami
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
M2SYS Technology
 
Biometrics
BiometricsBiometrics
Biometrics
Satish Chandra
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605
SovanChanda
 

What's hot (20)

Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 
Relationship Cards Iiw Nov 3 2009
Relationship Cards Iiw Nov 3 2009Relationship Cards Iiw Nov 3 2009
Relationship Cards Iiw Nov 3 2009
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Biometric Authentication in Banking
Biometric Authentication in BankingBiometric Authentication in Banking
Biometric Authentication in Banking
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
Mobile wallet security
Mobile wallet securityMobile wallet security
Mobile wallet security
 
E commerce
E commerceE commerce
E commerce
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
E - comerce
E - comerceE - comerce
E - comerce
 
E banking & security
E banking & securityE banking & security
E banking & security
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
 
E commerce
E commerceE commerce
E commerce
 
H029044050
H029044050H029044050
H029044050
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
Biometrics
BiometricsBiometrics
Biometrics
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605
 

Similar to How will biometric payment overcome consumer fears over privacy and contactless?

Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
Kevin Nevias
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
VLink Inc
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Biometrics
BiometricsBiometrics
Biometrics
Priyanka Sharma
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Bahaa Abdulhadi
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
What Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdfWhat Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdf
Bahaa Abdulhadi
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
Lavanya Lakshman
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
Bahaa Abdulhadi
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
IVR Technology Group
 
Biometrics
BiometricsBiometrics
Biometrics
Shubham Singh
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
Bahaa Abdulhadi
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
Biometrics
BiometricsBiometrics
Biometrics
N/A
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
Ulf Mattsson
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
DigitalPersona
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
Bahaa Abdulhadi
 

Similar to How will biometric payment overcome consumer fears over privacy and contactless? (20)

Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
What Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdfWhat Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdf
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 

Recently uploaded

How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes..."Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
Anant Gupta
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Networks
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Kunal Gupta
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Zilliz
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
Jimmy Lai
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
bhumivarma35300
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
maigasapphire
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
Priyanka Aash
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptxIntroduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
313mohammedarshad
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
Data Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining DataData Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining Data
Safe Software
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
How to build a generative AI solution A step-by-step guide (2).pdf
How to build a generative AI solution A step-by-step guide (2).pdfHow to build a generative AI solution A step-by-step guide (2).pdf
How to build a generative AI solution A step-by-step guide (2).pdf
ChristopherTHyatt
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
BrainSell Technologies
 

Recently uploaded (20)

How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes..."Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptxIntroduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
Data Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining DataData Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining Data
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
How to build a generative AI solution A step-by-step guide (2).pdf
How to build a generative AI solution A step-by-step guide (2).pdfHow to build a generative AI solution A step-by-step guide (2).pdf
How to build a generative AI solution A step-by-step guide (2).pdf
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
 

How will biometric payment overcome consumer fears over privacy and contactless?

  • 1. How will biometric payment overcome consumer fears over privacy and contactless?
  • 2. How will biometric payment overcome consumer fears over privacy and contactless? Many Biometric Systems Rely on Central Databases CIR IDENT
  • 3. Sources: https://www.wired.co.uk/article/wired-awake-150819, https://www.technologyreview.com/f/614163/data-leak-exposes-unchangeable-biometric-data-of-over-1-million-people/ How will biometric payment overcome consumer fears over privacy and contactless? Many Biometric Systems Rely on Central Databases CIR CIR Databases can get compromised!
  • 4. How will biometric payment overcome consumer fears over privacy and contactless? Ingredients for Fears Over Biometrics CIR
  • 5. How will biometric payment overcome consumer fears over privacy and contactless? Ingredients for Fears Over Biometrics CIR Scarce resource
  • 6. How will biometric payment overcome consumer fears over privacy and contactless? Ingredients for Fears Over Biometrics CIR No concerns!?
  • 7. How will biometric payment overcome consumer fears over privacy and contactless? Sniffing Relay attacks Stolen / lost cards Source: The Independent Contactless Payment Penetration Increases, some fears remain…
  • 8. General Biometric System Overview How will biometric payment overcome consumer fears over privacy and contactless? PRE- PROCESSING FEATURE EXTRACTOR TEMPLATE GENERATOR MATCHER1 REFERENCE TEMPLATE 2 3 4  MATCH STATUS TEST TEST SENSOR ENROLMENT
  • 9. Privacy Intrusiveness Assessment Key questions included in EU’s General Data Protection Regulation (GDPR) Source: https://eugdpr.org/) Is biometric data stored? What data is stored? Where is data stored? Is the storage permanent or temporary? How is biometric data processed?
  • 10. Privacy intrusiveness assessment Is biometric data stored? Many EU passports include JPEG file of holder’s fingerprint PKI-based Extended Access Control Authentication Reference fingerprint Matching SW Candidate’s fingerprint Issuing country grants through reciprocal agreements to those authorized to access confidential information on the chip.
  • 11. Privacy intrusiveness assessment Is biometric data stored? Interoperability and algorithm independence At stake: Most people only have 10 fingerprints Tamper-resistance of • ID document • Communication • Matcher execution Permanent storage of data in central database – e.g. TES, CIR STORAGE
  • 12. Privacy intrusiveness assessment What data is stored? US passport stores no biometric data US can’t do EAC on EU passports DHS’ IDENT system stores some data to facilitate re-entering visitors What data is stored sounds like a reasonable question? It’s recommended to store the template rather than the fingerprint. ?
  • 13. Privacy intrusiveness assessment Where is data stored and processed? Storage location? Who has access to it? For which purpose? Tamper-proof storage and processing in a secure environment is a must. Source: https://www.nextgov.com/it-modernization/2019/06/dhs-move-biometric-data-hundreds-millions-people-amazon-cloud/157837/
  • 14. Privacy Intrusiveness Assessment Based on GDPR Q1: Is biometric data stored? Q2: What data is stored? Q3: Where is data stored? Q4: Is the storage permanent or temporary? Q5: How is biometric data processed? A1: Yes A2: Enrolled reference template A3: Inside the secure element A4: Storage Reference template permanently stored Candidate template temporarily stored in RAM during match A5: Match is processed in secure element Biometric smart card
  • 15. To conclude: How will biometric payment overcome consumer fears over privacy and contactless? Personal device  GDPR compliant • No central database • Storage of template vs. image • Tamper resistant device • Match in Secure Element (SE) is a MUST No data is retrieved over contactless without the fingerprint authentication.
  • 16. €430 100 80% 200 Million turnover in 2018 Dedicated employees worldwide Of the population uses Linxens products every day Billion microconnectors supplied to the market Linxens is a global leader in Microconnectors, RFID Antennas & Inlays Production sites Clients over the world Research & Development Centers Billion RFID Antennas sold since 2008 Years experience 6 10 3200 30 4 More than
  • 17. Linxens products in various applications
  • 18. 1) * Sales Representatives ** Sales Office Linxens Global Footprint South America* France – Levallois, Mantes-la-Jolie, Vorey Germany - Dresden The Netherlands - Wijchen South Korea** China – Suzhou, Guangzhou, Shanghai India - Mumbai Thailand - Ayutthaya Singapore – Changi LATAM* USA*
  • 19. linxens.com For further information, please feel free to contact: • Jean-François Durix, Linxens Business Development Director Jean-Francois.Durix@linxens.com • Stephany Gochuico, Linxens Digital & Product Communications Manager Stephany.Gochuico@linxens.com