SlideShare a Scribd company logo
1 of 19
How will biometric payment
overcome consumer fears
over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?
Many Biometric Systems Rely on Central Databases
CIR
IDENT
Sources: https://www.wired.co.uk/article/wired-awake-150819, https://www.technologyreview.com/f/614163/data-leak-exposes-unchangeable-biometric-data-of-over-1-million-people/
How will biometric payment overcome consumer fears over privacy and contactless?
Many Biometric Systems Rely on Central Databases
CIR
CIR
Databases
can get
compromised!
How will biometric payment overcome consumer fears over privacy and contactless?
Ingredients for Fears Over Biometrics
CIR
How will biometric payment overcome consumer fears over privacy and contactless?
Ingredients for Fears Over Biometrics
CIR
Scarce resource
How will biometric payment overcome consumer fears over privacy and contactless?
Ingredients for Fears Over Biometrics
CIR
No concerns!?
How will biometric payment overcome consumer fears over privacy and contactless?
Sniffing
Relay attacks
Stolen / lost cards
Source: The Independent
Contactless Payment Penetration Increases, some fears remain…
General Biometric System Overview
How will biometric payment overcome consumer fears over privacy and contactless?
PRE-
PROCESSING
FEATURE
EXTRACTOR
TEMPLATE
GENERATOR
MATCHER1
REFERENCE
TEMPLATE
2 3 4

MATCH
STATUS
TEST
TEST
SENSOR
ENROLMENT
Privacy Intrusiveness Assessment
Key questions included in EU’s
General Data Protection Regulation (GDPR)
Source: https://eugdpr.org/)
Is biometric data stored?
What data is stored?
Where is data stored?
Is the storage permanent or temporary?
How is biometric data processed?
Privacy intrusiveness assessment
Is biometric data stored?
Many EU passports
include JPEG file of
holder’s fingerprint
PKI-based Extended
Access Control Authentication
Reference
fingerprint
Matching SW
Candidate’s
fingerprint
Issuing country grants
through reciprocal
agreements to those
authorized to access
confidential information
on the chip.
Privacy intrusiveness assessment
Is biometric data stored?
Interoperability and algorithm independence
At stake: Most people only have 10 fingerprints
Tamper-resistance of
• ID document
• Communication
• Matcher execution
Permanent storage of data in central
database – e.g. TES, CIR
STORAGE
Privacy intrusiveness assessment
What data is stored?
US passport stores no biometric data
US can’t do EAC on EU passports
DHS’ IDENT system stores some
data to facilitate re-entering visitors
What data is stored sounds like a
reasonable question?
It’s recommended to store the
template rather than the fingerprint.
?
Privacy intrusiveness assessment
Where is data stored and processed?
Storage location?
Who has access to it?
For which purpose?
Tamper-proof storage and
processing in a secure
environment is a must.
Source: https://www.nextgov.com/it-modernization/2019/06/dhs-move-biometric-data-hundreds-millions-people-amazon-cloud/157837/
Privacy Intrusiveness Assessment Based on GDPR
Q1: Is biometric data stored?
Q2: What data is stored?
Q3: Where is data stored?
Q4: Is the storage permanent or temporary?
Q5: How is biometric data processed?
A1: Yes
A2: Enrolled reference template
A3: Inside the secure element
A4: Storage
Reference template permanently stored
Candidate template temporarily stored
in RAM during match
A5: Match is processed in secure element
Biometric smart card
To conclude:
How will biometric payment overcome consumer fears
over privacy and contactless?
Personal device  GDPR compliant
• No central database
• Storage of template vs. image
• Tamper resistant device
• Match in Secure Element (SE) is a MUST
No data is retrieved over contactless
without the fingerprint authentication.
€430
100
80%
200
Million turnover in 2018
Dedicated employees
worldwide
Of the population
uses Linxens
products every day
Billion
microconnectors
supplied to the
market
Linxens
is a global leader in
Microconnectors,
RFID Antennas
& Inlays
Production sites
Clients over
the world
Research &
Development
Centers
Billion RFID
Antennas sold
since 2008
Years
experience
6
10
3200
30
4
More than
Linxens products in various applications
1) * Sales Representatives ** Sales Office
Linxens Global Footprint
South America*
France – Levallois, Mantes-la-Jolie, Vorey
Germany - Dresden
The Netherlands - Wijchen
South Korea**
China – Suzhou, Guangzhou, Shanghai
India - Mumbai
Thailand - Ayutthaya
Singapore – Changi
LATAM*
USA*
linxens.com
For further information, please feel free to contact:
• Jean-François Durix, Linxens Business Development Director
Jean-Francois.Durix@linxens.com
• Stephany Gochuico, Linxens Digital & Product Communications Manager
Stephany.Gochuico@linxens.com

More Related Content

What's hot

Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarVeridium
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
Biometric Authentication in Banking
Biometric Authentication in BankingBiometric Authentication in Banking
Biometric Authentication in BankingMuthu Ramanathan
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerceAmira Serag
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Cardjournal ijrtem
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
E banking & security
E banking & securityE banking & security
E banking & securitySumeer Sharma
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerceVipin Subhash
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar promaproma_goswami
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingM2SYS Technology
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605SovanChanda
 

What's hot (20)

Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 
Relationship Cards Iiw Nov 3 2009
Relationship Cards Iiw Nov 3 2009Relationship Cards Iiw Nov 3 2009
Relationship Cards Iiw Nov 3 2009
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Biometric Authentication in Banking
Biometric Authentication in BankingBiometric Authentication in Banking
Biometric Authentication in Banking
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
Mobile wallet security
Mobile wallet securityMobile wallet security
Mobile wallet security
 
E commerce
E commerceE commerce
E commerce
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
E - comerce
E - comerceE - comerce
E - comerce
 
E banking & security
E banking & securityE banking & security
E banking & security
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
 
E commerce
E commerceE commerce
E commerce
 
H029044050
H029044050H029044050
H029044050
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
Biometrics
BiometricsBiometrics
Biometrics
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605
 

Similar to How will biometric payment overcome consumer fears over privacy and contactless?

Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasKevin Nevias
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfVLink Inc
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
What Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdfWhat Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdfBahaa Abdulhadi
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBahaa Abdulhadi
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBahaa Abdulhadi
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Biometrics
BiometricsBiometrics
BiometricsN/A
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloudUlf Mattsson
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBahaa Abdulhadi
 

Similar to How will biometric payment overcome consumer fears over privacy and contactless? (20)

Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
What Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdfWhat Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdf
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

How will biometric payment overcome consumer fears over privacy and contactless?

  • 1. How will biometric payment overcome consumer fears over privacy and contactless?
  • 2. How will biometric payment overcome consumer fears over privacy and contactless? Many Biometric Systems Rely on Central Databases CIR IDENT
  • 3. Sources: https://www.wired.co.uk/article/wired-awake-150819, https://www.technologyreview.com/f/614163/data-leak-exposes-unchangeable-biometric-data-of-over-1-million-people/ How will biometric payment overcome consumer fears over privacy and contactless? Many Biometric Systems Rely on Central Databases CIR CIR Databases can get compromised!
  • 4. How will biometric payment overcome consumer fears over privacy and contactless? Ingredients for Fears Over Biometrics CIR
  • 5. How will biometric payment overcome consumer fears over privacy and contactless? Ingredients for Fears Over Biometrics CIR Scarce resource
  • 6. How will biometric payment overcome consumer fears over privacy and contactless? Ingredients for Fears Over Biometrics CIR No concerns!?
  • 7. How will biometric payment overcome consumer fears over privacy and contactless? Sniffing Relay attacks Stolen / lost cards Source: The Independent Contactless Payment Penetration Increases, some fears remain…
  • 8. General Biometric System Overview How will biometric payment overcome consumer fears over privacy and contactless? PRE- PROCESSING FEATURE EXTRACTOR TEMPLATE GENERATOR MATCHER1 REFERENCE TEMPLATE 2 3 4  MATCH STATUS TEST TEST SENSOR ENROLMENT
  • 9. Privacy Intrusiveness Assessment Key questions included in EU’s General Data Protection Regulation (GDPR) Source: https://eugdpr.org/) Is biometric data stored? What data is stored? Where is data stored? Is the storage permanent or temporary? How is biometric data processed?
  • 10. Privacy intrusiveness assessment Is biometric data stored? Many EU passports include JPEG file of holder’s fingerprint PKI-based Extended Access Control Authentication Reference fingerprint Matching SW Candidate’s fingerprint Issuing country grants through reciprocal agreements to those authorized to access confidential information on the chip.
  • 11. Privacy intrusiveness assessment Is biometric data stored? Interoperability and algorithm independence At stake: Most people only have 10 fingerprints Tamper-resistance of • ID document • Communication • Matcher execution Permanent storage of data in central database – e.g. TES, CIR STORAGE
  • 12. Privacy intrusiveness assessment What data is stored? US passport stores no biometric data US can’t do EAC on EU passports DHS’ IDENT system stores some data to facilitate re-entering visitors What data is stored sounds like a reasonable question? It’s recommended to store the template rather than the fingerprint. ?
  • 13. Privacy intrusiveness assessment Where is data stored and processed? Storage location? Who has access to it? For which purpose? Tamper-proof storage and processing in a secure environment is a must. Source: https://www.nextgov.com/it-modernization/2019/06/dhs-move-biometric-data-hundreds-millions-people-amazon-cloud/157837/
  • 14. Privacy Intrusiveness Assessment Based on GDPR Q1: Is biometric data stored? Q2: What data is stored? Q3: Where is data stored? Q4: Is the storage permanent or temporary? Q5: How is biometric data processed? A1: Yes A2: Enrolled reference template A3: Inside the secure element A4: Storage Reference template permanently stored Candidate template temporarily stored in RAM during match A5: Match is processed in secure element Biometric smart card
  • 15. To conclude: How will biometric payment overcome consumer fears over privacy and contactless? Personal device  GDPR compliant • No central database • Storage of template vs. image • Tamper resistant device • Match in Secure Element (SE) is a MUST No data is retrieved over contactless without the fingerprint authentication.
  • 16. €430 100 80% 200 Million turnover in 2018 Dedicated employees worldwide Of the population uses Linxens products every day Billion microconnectors supplied to the market Linxens is a global leader in Microconnectors, RFID Antennas & Inlays Production sites Clients over the world Research & Development Centers Billion RFID Antennas sold since 2008 Years experience 6 10 3200 30 4 More than
  • 17. Linxens products in various applications
  • 18. 1) * Sales Representatives ** Sales Office Linxens Global Footprint South America* France – Levallois, Mantes-la-Jolie, Vorey Germany - Dresden The Netherlands - Wijchen South Korea** China – Suzhou, Guangzhou, Shanghai India - Mumbai Thailand - Ayutthaya Singapore – Changi LATAM* USA*
  • 19. linxens.com For further information, please feel free to contact: • Jean-François Durix, Linxens Business Development Director Jean-Francois.Durix@linxens.com • Stephany Gochuico, Linxens Digital & Product Communications Manager Stephany.Gochuico@linxens.com