How do you set up unlocking your smartphone and various applications on your device these days? To be honest, quite believe that different brands of smartphones have a function “unlock with fingerprint scanning” or “unlock by scanning face”
Many people also choose to use their own method of scanning these organs to unlock their personal phones. Instead of having to remember passwords, remember pin codes, or even remember drawing patterns, scanning is much easier and faster. We can enter the phone screen in just a fraction of a second. and they do not have to remember any codes unless the system is locked from the scanning method. This was due to an error when trying to unlock multiple times. The nation must remember what the machine’s password is.
This is just one example of the closest use of biometric technology in our everyday life. Today, this technology is widely used. To help ensure in many ways apart from the unlocking function of the smartphone The technology is also used in other areas, one of which is very close to human resources programming and the company’s payroll.
What is Biometric Technology?
In terms of terminology, the word biometric includes the words bio, which means living organisms, and metric, which refers to attributes that can be measured or quantified. Refers to the technology to use specific attributes or behaviors in organisms that are unique. and can compare, measure or count to be combined with statistical principles in order to distinguish, remember, confirm and identify the individual It has more than 20 unique identifiers. which can be broadly divided into two types:
- Physical characteristics such as fingerprints, palm veins, palm, retina, iris, face, DNA and smell.
- Behavioral features such as sounds, signatures and typography
Biometric data is a person’s physical characteristics such as fingerprints, facial features, iris, voice, as well as behavior that is unique to the individual. make this present We use Biometrics as a technology to verify or authenticate a person. By taking physical characteristics such as fingerprints, pupils and facial structure. or individual behaviors such as walking style Hand movements and speech sounds are used for classification. By examining physical features and computer technology together.
the uniqueness of the knowledge Therefore, it is unique that no human being has the same. Even identical twins have their own characteristics that the other twins do not have, such as fingerprints and irises. Twins are not the same to consider with the eyes Seeing that the external appearance is so similar that they are almost identical, but they are not in fact the same Biometrics are separable, making Biometrics a highly secure system. difficult to forge against loss and with high accuracy Therefore, it is widely used to protect data or assets that require high security.
However, there was once a case of a famous mobile phone brand. Which uses Face ID technology to unlock faces, but Face ID creates a story because “inseparable twins” allow another twin who is not registered with Face ID to unlock the device for use. Although reality shouldn’t be like that
It is therefore interesting how much Face ID can tell the difference between similar faces if the Face ID system cannot distinguish between the faces of the twins. Does that mean the security of Face ID technology could be less than other biometric security systems like fingerprint scanning or iris scanning?
Biometric data is not that personal.
Today, we see biometric technology being widely used. especially the benefits of authentication/identification and protection of information or assets that require high security As we have commonly used in everyday life. Such as unlocking various electronic devices and logging in to financial transactions. Because it is information that reduces the risk of being hacked and forged. Currently, biometric technology is being developed to be more accurate. reduce errors
However, one thing to be aware of is that biometric data is not that personal. In other words, most of us upload our own “face” selfies to social media. While reviewing various attractions, they also take a clip of what they see. In addition, throughout our lives we have hundreds of documents with our “signatures.” Indeed, it is possible that these biometric data can be accessed. It is very easy and accessible from anywhere. Because we are the ones who created these identities in the online world (virtual world) by ourselves.
With ordinary people, there may not be much to do with this information. But for every cybercriminal it is not certain. Our Internet presence All of our physical properties may be accessible to criminals through photos and videos uploaded by us. And the hacker level might be able to take our most obvious facial image data to scan into some system. or a 2 inch photo if the hacker zooms in and sees our fingerprints clearly we may be able to bring our fingerprints to be scanned into the system anywhere as well In this case it was warning recently.
Since the introduction of facial recognition technology or face scanning The previous period may be improved to be more efficient. Reduce spoofing vulnerabilities It’s like you can’t use a picture or animation from a video to scan to unlock. but in fact hackers are not less knowledgeable about these technologies than those who try to prevent vulnerabilities from being faked. Good or bad can be the same person. It’s the same way with a joke from a long time ago. that the person who created the computer virus and the person who created the antivirus program may be the same person. This is the person who caused the virus to arise. and then create their own antiviral drugs Once they are infected with the virus, they will come for treatment and buy medicines.
For example, the old Face ID technology from a famous mobile phone brand. This technology was once guaranteed to be very safe, with only a 1 in 1,000,000 chance of error. Even if users wear hats, wigs, glasses, makeup and beards, they can still be scanned with facial recognition technology that already recognizes our faces. And it can’t use photos or videos to scan to unlock, while the Touch ID system has a chance of error up to 1 in 50,000. However, the worst mistake that ever happened to Face ID is separating the faces of the twins. not out yet!
Therefore, a skilled hacker may attempt to breach the defenses. “Can’t use photos or videos to scan to unlock” and then use photos or videos with our faces to scan to unlock later. It shouldn’t be difficult for cybercriminals. We may own fingerprints, faces or voices. But we’re not the only ones with access to those unique personal elements. Because we are the ones uploading part of our identity to the internet by ourselves!
So, think carefully before choosing biometric data, because unlike hacked passwords where we can change them when they are corrupted, but we cannot change biometric data for life. if it’s stolen It’s like we’ve been stolen for the rest of our lives. It is lifelong damage that cannot be recovered.
Convenient but very safe?
Biometrics are considered a form of sensitive information. “Biodata” means “personal data generated by technology in connection with the adoption of physical or behavioral characteristics of a person which enables the identification of that individual rather than any other person”, Article 26 Personal Data Act The law therefore provide special protection because it is a truly personal identity. if disclosed incorrectly There is a risk of being treated unfairly, including identity theft. The law therefore clearly states that it is “prohibited” to collect without the “express” consent of the data subject.
In the early days, biometric technology was widely used. Many people already understand that this is the safest technology. because we only have a face like this have this iris There are fingerprints like this There is DNA like this that can be scanned or checked to unlock, log in, or anything else. It’s very personal.
But when it actually works We start to see that there are still many weaknesses. which requires the improvement and development of technology to fill the gaps in order to use it more efficiently. Also in the matter of law to protect this data. which can be smuggled and used without permission and cause damage
Take, for example, using your fingerprint or face to unlock your phone, which often contains our personal data. It seems to be safe because we can only use our own organs to scan and unlock our personal phones. But what we could have seen in dramas or movies is When a character is in a deep sleep or is knocked unconscious. A bad character can grab the owner’s finger and scan it to unlock that phone in just a fraction of a second. Or forced to make a straight face, put the phone in front of your face. The device is unlocked.
vice versa If it’s a simple password lock set or a way to pull a pattern and never tell anyone what the unlock code is. It wouldn’t be easy to unlock that phone in a split second. Guessing at random, entering the wrong password more than once. may cause the device to lock Access may be restricted for a long time.
However, if the bad guys don’t have our biometrics, it also helps us to be very secure from remote systems or remote device control. In case of hacked access to banking apps, scammers control our device by sending us strange links, which may contain spyware or requests for permission to open the attached remote, the use of a password or pin or pattern will caught by spying But we can’t work through biometrics because only one of us can scan our own organs through the device we installed.
It is true that the biometric data we use to open the app and unlock the device is very secure in most cases. Because it is very private. However, our identity on the Internet is subject to hacking. And these methods get more complicated over time, so maybe we’d better compromise a bit. Then turn on two-step verification, using a Biometric with a strong password. A code is something we can change whenever we want. especially when you feel unsafe. Focus on creating strong, strong passwords to improve security.