HP Tech@Work
Today's trends for tomorrow's business
Very Personal Security - Your Biometrics Update

Very Personal Security - Your Biometrics Update

They are finding new ways to figure out who you are

This is part two of our machine learning series. You can read part one on machine and deep learning 101.
Biometric recognition technology has been an essential part of our daily lives for a while now - in fact, you’re probably reading this story on a phone you unlocked with your thumb. The idea of biometric identifiers has been kicking around for many years (and many more if you count science fiction references). But there’s been rapid advancements and proliferation of biometric tech recently, all thanks to the equally rapid advancements of machine learning algorithms and neural networks.
In general, biometric recognition tech is a five-step process that works like this:
1. Acquisition. A variety of sensors gather audio, visual, and/or motion input to evaluate.
2. Pre-processing. Various “noises” (distracting information that will hinder the matching process) are filtered out.
3. Registration and segmentation. Biometric signatures are segmented from their background and registered in the database.
4. Feature extraction. The key pieces of the biomarker (for example, the ridges of a fingerprint) are extracted for comparison.
5. Classification. The system decides if the sample is a match. This stage requires the most algorithmic analysis.
We have lots of biometric markers that we can be identified by: Things like fingerprints and iris scans, as well as less-used markers such as ears, gestures and walking gait. Right now, though, there are a few markers that are hogging the spotlight. Expect rapid machine learning and neural network development - as well as growing databases - in these areas in the next few years:

Faceprints

You’ve heard for a few years that your face will be your new fingerprint - and there’s a lot of money and research that’s making it happen right now. In 2014 Facebook began their DeepFace project, which used a nine-layer-deep neural network with 120 million parameters to develop 3D face modeling with 97 percent accuracy.
Both Apple and Google are investing in facial recognition technology for their smartphone software. Of course, faceprints are controversial because of privacy concerns - since unlike a fingerprint, you might be unaware that someone is scanning your face. Some casinos and retailers are using faceprints to monitor customers, and the U.S. Department of Homeland Security is investing in a faceprint monitoring system that’ll evaluate visitors crossing U.S. borders.

Voiceprints

Speaker identification algorithms using deep neural networks will soon be able to recognize your voice - or, more specifically, a “spectrogram” that maps out all the variables your particular voice can have. Some of the future applications of voiceprints include unlocking a car door (and detecting if a driver has had too many drinks to drive), as well as customizing digital assistant voice commands for each family member (such as preventing your kid from telling Alexa to buy that new video game).

Behavioral biometrics

Unlike physical attributes, which mostly don’t change, behaviors are often hard to reproduce - which can make them good security identifiers. Behavioral biometrics measures the unique rhythms of a person’s movements on their smartphone, such as how they type, how they scroll and how they hold the phone.
Smartphone manufacturers are already preparing for this: By 2022, 80 percent of smartphones shipped will have AI capabilities that can analyze these behaviors, according to a recent report. Hundreds of different behaviors can be measured, compiled and processed to identify if a user is a match; one behavioral biometrics company claims it can analyze more than 2000 parameters. This multi-layered personal signature has caught the eye of financial institutions and credit cards that are looking for ways to integrate behavioral biometrics into their cybersecurity measures.

Get started

Ready to integrate biometric identifiers into your own business needs? Find out more about HP Multi-Factor Authenticate Gen2, which can fortify your security with up to three authentication factors including fingerprints and facial recognition.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.

More about these products
Disclaimer

Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by HP.com; reseller offers may vary. Items sold by HP.com are not for immediate resale. Orders that do not comply with HP.com terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at https://support.microsoft.com/lifecycle

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See http://www.microsoft.com.

HP Rewards qualifying and eligible products/purchases are defined as those from the following categories: Printers, Business PCs (Elite, Pro and Workstation brands), select Business Accessories and select Ink, Toner & Paper.