Our CEO Gereon Tillenburg explains in an exciting interview with IWW Institute for Knowledge in Business GmbHwhere Germany currently stands in terms of biometrics and where research is headed.
In addition to the Biometric methods Around fingers and faces, which have been driven by public authorities and smartphone manufacturers, are rather unknown methods: finger vein, hand vein, speech recognition, iris, the palm, but also behavior-based biometrics. These are, for example, typing behavior, gait behavior or the way the person moves a computer mouse.
Biometric authentication and access control
TWINSOFT firmly believes that the current traditional authentication methods such as passwords and chip cards will disappear from the market in the next few years and the authentication of the future will only use the people themselves and not their possessions or knowledge to verify their identity and permissions. So to put it concretely: Only biometric authentication will be used in all areas. The vision is that the apartment door opens directly, the PC starts and the refrigerator door opens as soon as you stand in front of it.
Two-factor authentication (2FA)
Biometric features are differently safe, with the security here correlating directly with the effort of the manipulation. Like all digital security systems, biometrics can also be manipulated. However, the security of biometrics can be significantly increased by combining it with other biometric or non-biometric authentications, for example when face and finger are scanned, the finger is checked in conjunction with a code or the combination face and registered mobile phone or RFID card. Two-factor authentication increases security and user-friendliness, because forgetting and resetting passwords is a thing of the past.