Fingerprint
Fingerprint biometrics are used both in specialised applications such as access control and large-scale identification systems, as well as in protecting end-user computing devices such as smartphones, tablets and laptop computers. In these devices, fingerprints are by extension being used to control access to security features such as FIDO-compliant passkeys.
The capture devices for fingerprint solutions vary significantly in their design, function, and form – resulting in different performance characteristics in real-world scenarios. Matching algorithms vary in performance and configuration too, and this is especially significant when contemplating usage at great scale such as in population-wide initiatives.
Fingerprint biometrics that are used in specialised applications such as access control and large-scale identification systems must undergo rigorous and ongoing testing to ensure they are performing optimally.
Fingerprint biometrics are used:
In mobile devices, as part of device security mechanisms.
In both contact and contactless modes, depending on use case and technology selection.
Stored in databases at scale – whether used for population-wide identity purposes, or for more constrained use cases such as criminal investigation.
For forensic purposes such as investigation of criminal events.
Often in uncontrolled capture environments, with little or no oversight of the capture process – implying that quality control, if any, is automated.
What Could We Provide?
BixeLab provides analysis services for matching data, including for procurement, quality assurance, or as part of an ongoing and periodic evaluation. Importantly, we also provide targeted vulnerability testing of fingerprint devices including capture devices, access control units, or other software. Such assessments support risk analysis at large scale – such as when relying on end-customer capture devices for authentication.
Our services will provide you with a full understanding of performance from the point of fingerprint capture through to matching whether verification or in large scale identification scenarios. This understanding is important to detect performance problems and ensure that the devices and algorithms used have sufficient vulnerability mitigations and provide quality data and in turn good matching outcomes.
Services applicable to fingerprint recognition systems:
-
Algorithmic performance, ISO/IEC 19795 ‘Technology’ style
-
System performance including e.g. capture processes, ISO/IEC 19795 ‘Scenario’ style
-
Operational performance assessments
-
Capture processes, whether in-the-field, using dedicated devices in our laboratory, or end-consumer devices.
-
Interoperability testing for identity frameworks such as MOSIP.
-
Presentation Attack Detection systems for protecting against vulnerabilities