SlideShare a Scribd company logo
1 of 19
How will biometric payment
overcome consumer fears
over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?
Many Biometric Systems Rely on Central Databases
CIR
IDENT
Sources: https://www.wired.co.uk/article/wired-awake-150819, https://www.technologyreview.com/f/614163/data-leak-exposes-unchangeable-biometric-data-of-over-1-million-people/
How will biometric payment overcome consumer fears over privacy and contactless?
Many Biometric Systems Rely on Central Databases
CIR
CIR
Databases
can get
compromised!
How will biometric payment overcome consumer fears over privacy and contactless?
Ingredients for Fears Over Biometrics
CIR
How will biometric payment overcome consumer fears over privacy and contactless?
Ingredients for Fears Over Biometrics
CIR
Scarce resource
How will biometric payment overcome consumer fears over privacy and contactless?
Ingredients for Fears Over Biometrics
CIR
No concerns!?
How will biometric payment overcome consumer fears over privacy and contactless?
Sniffing
Relay attacks
Stolen / lost cards
Source: The Independent
Contactless Payment Penetration Increases, some fears remain…
General Biometric System Overview
How will biometric payment overcome consumer fears over privacy and contactless?
PRE-
PROCESSING
FEATURE
EXTRACTOR
TEMPLATE
GENERATOR
MATCHER1
REFERENCE
TEMPLATE
2 3 4

MATCH
STATUS
TEST
TEST
SENSOR
ENROLMENT
Privacy Intrusiveness Assessment
Key questions included in EU’s
General Data Protection Regulation (GDPR)
Source: https://eugdpr.org/)
Is biometric data stored?
What data is stored?
Where is data stored?
Is the storage permanent or temporary?
How is biometric data processed?
Privacy intrusiveness assessment
Is biometric data stored?
Many EU passports
include JPEG file of
holder’s fingerprint
PKI-based Extended
Access Control Authentication
Reference
fingerprint
Matching SW
Candidate’s
fingerprint
Issuing country grants
through reciprocal
agreements to those
authorized to access
confidential information
on the chip.
Privacy intrusiveness assessment
Is biometric data stored?
Interoperability and algorithm independence
At stake: Most people only have 10 fingerprints
Tamper-resistance of
• ID document
• Communication
• Matcher execution
Permanent storage of data in central
database – e.g. TES, CIR
STORAGE
Privacy intrusiveness assessment
What data is stored?
US passport stores no biometric data
US can’t do EAC on EU passports
DHS’ IDENT system stores some
data to facilitate re-entering visitors
What data is stored sounds like a
reasonable question?
It’s recommended to store the
template rather than the fingerprint.
?
Privacy intrusiveness assessment
Where is data stored and processed?
Storage location?
Who has access to it?
For which purpose?
Tamper-proof storage and
processing in a secure
environment is a must.
Source: https://www.nextgov.com/it-modernization/2019/06/dhs-move-biometric-data-hundreds-millions-people-amazon-cloud/157837/
Privacy Intrusiveness Assessment Based on GDPR
Q1: Is biometric data stored?
Q2: What data is stored?
Q3: Where is data stored?
Q4: Is the storage permanent or temporary?
Q5: How is biometric data processed?
A1: Yes
A2: Enrolled reference template
A3: Inside the secure element
A4: Storage
Reference template permanently stored
Candidate template temporarily stored
in RAM during match
A5: Match is processed in secure element
Biometric smart card
To conclude:
How will biometric payment overcome consumer fears
over privacy and contactless?
Personal device  GDPR compliant
• No central database
• Storage of template vs. image
• Tamper resistant device
• Match in Secure Element (SE) is a MUST
No data is retrieved over contactless
without the fingerprint authentication.
€430
100
80%
200
Million turnover in 2018
Dedicated employees
worldwide
Of the population
uses Linxens
products every day
Billion
microconnectors
supplied to the
market
Linxens
is a global leader in
Microconnectors,
RFID Antennas
& Inlays
Production sites
Clients over
the world
Research &
Development
Centers
Billion RFID
Antennas sold
since 2008
Years
experience
6
10
3200
30
4
More than
Linxens products in various applications
1) * Sales Representatives ** Sales Office
Linxens Global Footprint
South America*
France – Levallois, Mantes-la-Jolie, Vorey
Germany - Dresden
The Netherlands - Wijchen
South Korea**
China – Suzhou, Guangzhou, Shanghai
India - Mumbai
Thailand - Ayutthaya
Singapore – Changi
LATAM*
USA*
linxens.com
For further information, please feel free to contact:
• Jean-François Durix, Linxens Business Development Director
Jean-Francois.Durix@linxens.com
• Stephany Gochuico, Linxens Digital & Product Communications Manager
Stephany.Gochuico@linxens.com

More Related Content

What's hot

Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarVeridium
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
Biometric Authentication in Banking
Biometric Authentication in BankingBiometric Authentication in Banking
Biometric Authentication in BankingMuthu Ramanathan
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerceAmira Serag
 
Mobile wallet security
Mobile wallet securityMobile wallet security
Mobile wallet securityMahindra Comviva
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Cardjournal ijrtem
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
E banking & security
E banking & securityE banking & security
E banking & securitySumeer Sharma
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerceVipin Subhash
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar promaproma_goswami
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingM2SYS Technology
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605SovanChanda
 

What's hot (20)

Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 
Relationship Cards Iiw Nov 3 2009
Relationship Cards Iiw Nov 3 2009Relationship Cards Iiw Nov 3 2009
Relationship Cards Iiw Nov 3 2009
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Biometric Authentication in Banking
Biometric Authentication in BankingBiometric Authentication in Banking
Biometric Authentication in Banking
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
Mobile wallet security
Mobile wallet securityMobile wallet security
Mobile wallet security
 
E commerce
E commerceE commerce
E commerce
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
E - comerce
E - comerceE - comerce
E - comerce
 
E banking & security
E banking & securityE banking & security
E banking & security
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
 
E commerce
E commerceE commerce
E commerce
 
H029044050
H029044050H029044050
H029044050
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
Biometrics
BiometricsBiometrics
Biometrics
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605
 

Similar to How will biometric payment overcome consumer fears over privacy and contactless?

Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasKevin Nevias
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfVLink Inc
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
What Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdfWhat Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdfBahaa Abdulhadi
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBahaa Abdulhadi
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBahaa Abdulhadi
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Biometrics
BiometricsBiometrics
BiometricsN/A
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloudUlf Mattsson
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBahaa Abdulhadi
 

Similar to How will biometric payment overcome consumer fears over privacy and contactless? (20)

Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
What Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdfWhat Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdf
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

How will biometric payment overcome consumer fears over privacy and contactless?

  • 1. How will biometric payment overcome consumer fears over privacy and contactless?
  • 2. How will biometric payment overcome consumer fears over privacy and contactless? Many Biometric Systems Rely on Central Databases CIR IDENT
  • 3. Sources: https://www.wired.co.uk/article/wired-awake-150819, https://www.technologyreview.com/f/614163/data-leak-exposes-unchangeable-biometric-data-of-over-1-million-people/ How will biometric payment overcome consumer fears over privacy and contactless? Many Biometric Systems Rely on Central Databases CIR CIR Databases can get compromised!
  • 4. How will biometric payment overcome consumer fears over privacy and contactless? Ingredients for Fears Over Biometrics CIR
  • 5. How will biometric payment overcome consumer fears over privacy and contactless? Ingredients for Fears Over Biometrics CIR Scarce resource
  • 6. How will biometric payment overcome consumer fears over privacy and contactless? Ingredients for Fears Over Biometrics CIR No concerns!?
  • 7. How will biometric payment overcome consumer fears over privacy and contactless? Sniffing Relay attacks Stolen / lost cards Source: The Independent Contactless Payment Penetration Increases, some fears remain…
  • 8. General Biometric System Overview How will biometric payment overcome consumer fears over privacy and contactless? PRE- PROCESSING FEATURE EXTRACTOR TEMPLATE GENERATOR MATCHER1 REFERENCE TEMPLATE 2 3 4  MATCH STATUS TEST TEST SENSOR ENROLMENT
  • 9. Privacy Intrusiveness Assessment Key questions included in EU’s General Data Protection Regulation (GDPR) Source: https://eugdpr.org/) Is biometric data stored? What data is stored? Where is data stored? Is the storage permanent or temporary? How is biometric data processed?
  • 10. Privacy intrusiveness assessment Is biometric data stored? Many EU passports include JPEG file of holder’s fingerprint PKI-based Extended Access Control Authentication Reference fingerprint Matching SW Candidate’s fingerprint Issuing country grants through reciprocal agreements to those authorized to access confidential information on the chip.
  • 11. Privacy intrusiveness assessment Is biometric data stored? Interoperability and algorithm independence At stake: Most people only have 10 fingerprints Tamper-resistance of • ID document • Communication • Matcher execution Permanent storage of data in central database – e.g. TES, CIR STORAGE
  • 12. Privacy intrusiveness assessment What data is stored? US passport stores no biometric data US can’t do EAC on EU passports DHS’ IDENT system stores some data to facilitate re-entering visitors What data is stored sounds like a reasonable question? It’s recommended to store the template rather than the fingerprint. ?
  • 13. Privacy intrusiveness assessment Where is data stored and processed? Storage location? Who has access to it? For which purpose? Tamper-proof storage and processing in a secure environment is a must. Source: https://www.nextgov.com/it-modernization/2019/06/dhs-move-biometric-data-hundreds-millions-people-amazon-cloud/157837/
  • 14. Privacy Intrusiveness Assessment Based on GDPR Q1: Is biometric data stored? Q2: What data is stored? Q3: Where is data stored? Q4: Is the storage permanent or temporary? Q5: How is biometric data processed? A1: Yes A2: Enrolled reference template A3: Inside the secure element A4: Storage Reference template permanently stored Candidate template temporarily stored in RAM during match A5: Match is processed in secure element Biometric smart card
  • 15. To conclude: How will biometric payment overcome consumer fears over privacy and contactless? Personal device  GDPR compliant • No central database • Storage of template vs. image • Tamper resistant device • Match in Secure Element (SE) is a MUST No data is retrieved over contactless without the fingerprint authentication.
  • 16. €430 100 80% 200 Million turnover in 2018 Dedicated employees worldwide Of the population uses Linxens products every day Billion microconnectors supplied to the market Linxens is a global leader in Microconnectors, RFID Antennas & Inlays Production sites Clients over the world Research & Development Centers Billion RFID Antennas sold since 2008 Years experience 6 10 3200 30 4 More than
  • 17. Linxens products in various applications
  • 18. 1) * Sales Representatives ** Sales Office Linxens Global Footprint South America* France – Levallois, Mantes-la-Jolie, Vorey Germany - Dresden The Netherlands - Wijchen South Korea** China – Suzhou, Guangzhou, Shanghai India - Mumbai Thailand - Ayutthaya Singapore – Changi LATAM* USA*
  • 19. linxens.com For further information, please feel free to contact: • Jean-François Durix, Linxens Business Development Director Jean-Francois.Durix@linxens.com • Stephany Gochuico, Linxens Digital & Product Communications Manager Stephany.Gochuico@linxens.com