• Home
  • About
  • My Account
  • Blog
  • Success Stories
  • Contact
Bayometric Bayometric Bayometric Bayometric
  • Live Scan
    • Print to FD-258 Card – Background Check
    • SWFT Applicant System
    • FBI Fingerprinting – Live Scan
    • NFA Fingerprinting – Live Scan
    • FINRA EFS
    • FDLE Live Scan
    • Fingerprint Background Check
    • SWFT+ Compatible Devices
  • Fingerprint SDK
    • Touch N Go
    • Griaule Fingerprint SDK
  • Single Sign-On
  • Fingerprint Scanner
    • USB Scanners
      • SecuGen Hamster Pro
      • SecuGen Hamster Plus (HSDU03P)
      • Nitgen Fingkey Hamster DX
      • Lumidigm M301 (M30x)
      • Lumidigm M311 (M31x)
      • Lumidigm V302 (V30x)
      • Lumidigm V311 (V31x)
      • Nitgen Fingkey Hamster II
      • Nitgen Fingkey Hamster III
      • Verifi P5100
      • IB Curve
    • FBI Certified Readers
      • SecuGen Hamster Pro 10
      • SecuGen Hamster Pro 20 (HU20)
      • SecuGen Hamster IV (HSDU04P)
      • Unity 20 Bluetooth
      • Integrated Biometrics Watson Mini
      • Integrated Biometrics Columbo
      • Suprema BioMini Plus 2
      • Suprema RealScan-G1
      • Suprema BioMini Slim 2
      • Suprema BioMini Slim 2S
    • Ten Print Scanners
      • Integrated Biometrics Kojak
      • Suprema RealScan G10
      • Integrated Biometrics FIVE-0
    • Dual / Two Print Scanners
      • Suprema RealScan-D
      • Integrated Biometrics Sherlock
      • Integrated Biometrics Watson Mini
      • Nitgen eNBioScan-D Plus
    • Scanners + Card Readers
      • SecuGen iD-Serial
      • SecuGen iD-USB SC/PIV
      • SecuGen ID USB SC
      • Hamster Pro Duo CL
      • Hamster Pro Duo SC/PIV
      • Suprema BioMini Combo
    • OEM Modules
      • SecuGen SDU03P
      • SecuGen SDU04P
      • Lumidigm M300 (M30x)
      • Lumidigm M310 (M31x)
      • Lumidigm V300 (V30x)
      • Lumidigm V310 (V31x)
  • NFA Fingerprinting
Bayometric Bayometric
  • Live Scan
    • Print to FD-258 Card – Background Check
    • SWFT Applicant System
    • FBI Fingerprinting – Live Scan
    • NFA Fingerprinting – Live Scan
    • FINRA EFS
    • FDLE Live Scan
    • Fingerprint Background Check
    • SWFT+ Compatible Devices
  • Fingerprint SDK
    • Touch N Go
    • Griaule Fingerprint SDK
  • Single Sign-On
  • Fingerprint Scanner
    • USB Scanners
      • SecuGen Hamster Pro
      • SecuGen Hamster Plus (HSDU03P)
      • Nitgen Fingkey Hamster DX
      • Lumidigm M301 (M30x)
      • Lumidigm M311 (M31x)
      • Lumidigm V302 (V30x)
      • Lumidigm V311 (V31x)
      • Nitgen Fingkey Hamster II
      • Nitgen Fingkey Hamster III
      • Verifi P5100
      • IB Curve
    • FBI Certified Readers
      • SecuGen Hamster Pro 10
      • SecuGen Hamster Pro 20 (HU20)
      • SecuGen Hamster IV (HSDU04P)
      • Unity 20 Bluetooth
      • Integrated Biometrics Watson Mini
      • Integrated Biometrics Columbo
      • Suprema BioMini Plus 2
      • Suprema RealScan-G1
      • Suprema BioMini Slim 2
      • Suprema BioMini Slim 2S
    • Ten Print Scanners
      • Integrated Biometrics Kojak
      • Suprema RealScan G10
      • Integrated Biometrics FIVE-0
    • Dual / Two Print Scanners
      • Suprema RealScan-D
      • Integrated Biometrics Sherlock
      • Integrated Biometrics Watson Mini
      • Nitgen eNBioScan-D Plus
    • Scanners + Card Readers
      • SecuGen iD-Serial
      • SecuGen iD-USB SC/PIV
      • SecuGen ID USB SC
      • Hamster Pro Duo CL
      • Hamster Pro Duo SC/PIV
      • Suprema BioMini Combo
    • OEM Modules
      • SecuGen SDU03P
      • SecuGen SDU04P
      • Lumidigm M300 (M30x)
      • Lumidigm M310 (M31x)
      • Lumidigm V300 (V30x)
      • Lumidigm V310 (V31x)
  • NFA Fingerprinting
May 20

Shield Your Privacy and Digital Identity with Fingerprints

  • Danny Thakkar
  • Biometric Identification, Fingerprint Recognition, Privacy

Some stores, restaurants and hotels keep a visitor’s book, placed nicely near the exit door. This visitor’s book with creatively designed cover and colorful pages, tempt us to write something about the service we received. Comments column is kept specious so that you could take as much space as you need to express your feelings about the services. These visitor’s books also have columns like name, address and contact number. These details you leave behind, as a gratitude for good service or complaint for bad one, may go a long way. The traces you leave behind are valuable to businesses. This information can be used for commercial, advertising or just selling personal details’ database to others, whether you like it or not. Similarly, over the internet, when you shop online, pay bills, navigate on maps, order food, or just leave your comments on a Facebook post, you unknowingly fill online visitor’s books, which are way more descriptive than those you ever filled in a restaurant.

Form Hidden FieldsImage: Hidden fields to track user activity

Commercial websites and online services are designed the way that they can track user activity and probably no commercial website or service is an exception to this. The user activity data collected by web can be used to create your digital identity. Digital identity is not necessarily need to contain personal data like name, address or phone number, but when shopping online or ordering food, personal details provided are also used in creating your digital identity. Online services are interested in user’s activity patterns like what you buy, search, where you navigate to, etc. Piecing together, this information creates an entity, which can be used to represent you and is called digital identity or digital entity. A person, device, organization or an application can have more than one digital identities.

International Organization for Standardization (ISO) defines digital identity as:
“Item inside or outside an information and communication technology system, such as a person, an organization, a device, a subsystem, or a group of such items that has recognizably distinct existence.”

Why digital identity is required in the first place?

Since the beginning of human civilization, identity system is based on physical presence and face to face interactions. With advancement of civilization, complexities arose and it was realized that physical presence and face to face interaction were not possible in all cases. Then documents, signatures, seal, and identity cards served as representatives of physical presence, for example, when the president has to pass an order, he or she doesn’t go to public and recite it. It comes in the form of a document, which is signed and sealed by the office of the president. This form of identity has been serving mankind very well. Frauds and scams also came along like duplicating or forging identity, but stayed under control with law enforcement. Where face to face interactions were not possible, documents represented identity.

But with the evolution of cyberspace and growing dependence of economy on it, traditional way of proving identity fell short. Internet knew no boundaries and existing methods of identity were meant for jurisdictional boundaries. Being anonymous became easy and deceiving identity became even easier on the internet. Existing laws that were made for physical identity system also proved to be inadequate, so companies facilitating web services established digital identity by using user activity data cocktailed with personal details, if available. But this method as well does not represent a proper digital identity solution and compromises user privacy.

Kimberley Sutherland, senior director of fraud and identity management strategy at LexisNexis Risk Solutions, states:
“How the consumer behaves when online, what they share about themselves, where they’re located, how they interact with their device — all of those components are really what creates digital identity. There are use cases where your digital identity never has been connected to the physical world and there are other times when your digital ID and physical ID do need to intersect.”

Digital identity does the job where your physical identity can’t. Paying money to buy a cheap mobile phone from China sitting in Hawaii is what digital identity makes possible. In simpler words, it drives economy. It makes people trust that your digital identity is as good as physical identity and this trust makes you pay money and the seller parcel you goods from one country to another. Your digital identity can pay on your behalf, receive money, make pizza guy drive for you and get your petitions signed on change.org. But increasing number of frauds, data breaches and identity theft suggests that current system of digital identity is not good enough.

Why present digital identity structure is inadequate?

Websites and online services collect user data to establish digital identity. In cases like online shopping, users proactively provides their details, however, activity data is always collected without user consent. There is no user control that how much data is being collected, how this data is being used, stored and shared. A privacy policy page does state how this data is used but again there’s no user control. If you don’t agree to privacy policy, you can’t avail the service; this is where it goes wrong. In bars and pubs, bartenders check customer IDs to ensure that they are of a legal to be served with alcohol. Date of birth is all they need, but you have to reveal much more than needed, ID cards contain enough personal information and you have to show it all to get your age verified. Websites and online services capture way more data than they need and that is one of the inadequacies with current digital identity scenario. Other issue like ensuring that people or entities on the internet are who they say they are. It is easy for people to mask their identity on the internet, but this masking is done by faking identity. Providing someone else’s email ID just to try a service is one example of it.

What is the solution?

In an ideal scenario, digital identity should enable users to keep hold of their information. How their information flows through the internet, where it is shared, used or abused. User should be the custodian of their information, not Google, Facebook or Amazon. Users should be able to provide the minimum amount of information required for the purpose. Solution lies in a digital identity system that cannot be faked, duplicated or manipulated. This system would take user consent before any use or access to their information. Telling your name wrong when a stranger asks is easy, taking it further you can also carry a fake identity card having that name. When the same thing is done over the internet, verification of that physical ID card would be very time consuming if not impossible. This is where using physical identity system in digital space fails.

How can fingerprints be used for digital identification and as privacy shield?

Digital identification by fingerprints offers a possibility of secure method to authenticate user identity in cyberspace. Consumers can authenticate ownership of their personal data by fingerprint authentication. Complete hold of user on his information may sound like a fairy tale but work is indeed underway. IBM is working with SecureKey and leading Canadian banks including Desjardins, BMO, RBC, CIBC, Scotiabank and TD to frame a method for consumers to get hold of their personal information. SecureKey is a leading identity and authentication provider to deliver digital identity network for consumers. During the solution analysis, need for a reliable repository of user information was felt. Banks were chosen as the user data repository because they already hold huge amount of user data, which have gone through extensive verification. So with this verified user information, banks can serve as identity verifier. Another reason for choosing banks is that customers trust banks more than any other organization. If banks can be trusted with money, they can be trusted with data easily.

Identity solution, IBM, SecureKey and Canadian banks are working on, will send notification to consumers, when any service providers need an access to their data. For example: A consumer chooses to subscribe to a service that requires verification of user information, consumer will receive a notification that the service provider needs access to verify consumer information. Only when the consumer authenticates with his biometrics like fingerprints, the service provider will be able to access the information. This solution will not only enable consumers to get a hold of their digital identity, but also work as a privacy shield by letting them control how much of their information is shared.

This solution network is underway testing in Canada and expected to go live later in 2017. This solution will expectantly address flaws of current digital identity and privacy procedures and revolutionize how digital identity is established and consumer information is shared. This system will also keep online services and websites in check, which are collecting user data irrepressibly without their consent. Uncontrolled use of this information is made legal between the thin lines of privacy policy terms and conditions, however, we do boast our ability to agree by clicking that Accept button, don’t we?

  • Facebook
  • Twitter
  • Reddit
  • Pinterest
  • Google+
  • LinkedIn
  • E-Mail

About The Author

Mary Clark is Product Manager at Bayometric, one of the leading biometric solution providers in the world. She has been in the Biometric Industry for 10+ years and has extensive experience across public and private sector verticals.

Comments are closed.

Have any questions? We will be happy to answer.

Sidebar Contact

Shop online for high quality fingerprint readers

Hamster Pro 20

hamster pro 20
Buy Online

Unity 20 Bluetooth

unity 20 bluetooth
Buy Online

Hamster Plus

hamster plus
Buy Online

Columbo

columbo
Buy Online

Fingerprint applications we offer

Fingerprint SDK

Simple and Intuitive API, NO biometrics programming experience required. Get sample code in C++, C#, VB, Java etc.
Take a Tour

Live Scan

Live scan fingerprinting allows quick and cost effective background checks of individuals.
Take a Tour

Computer Logon

Logon to Windows, Domain, Websites and Applications using fingerprints & create a ”password free” environment.
Take a Tour

Search the Blog

Categories

  • Access Control
  • Archive
  • Automotive Biometrics
  • Background Check
  • Big Data
  • Biometric ATMs
  • Biometric Authentication
  • Biometric Data Security
  • Biometric Device
  • Biometric Identification
  • Biometric Immigration
  • Biometric National ID
  • Biometric News
  • Biometric Passport
  • Biometric Payment
  • Biometric Research
  • Biometric Screening
  • Biometric Security
  • Biometric Spoofing
  • Biometric System
  • Biometric Technology
  • Biometric Terminology
  • Biometrics as a Service
  • Biometrics Comparison
  • Biometrics Examples
  • Biometrics in Banking
  • Biometrics in Education
  • Biometrics in School
  • Border Control
  • BYOD
  • Cloud Communication
  • Cloud-based Biometrics
  • Covid 19
  • Cyber Security
  • Facial Recognition
  • Finger Vein Recognition
  • Fingerprint Attendance
  • Fingerprint Door Lock
  • Fingerprint Recognition
  • Fingerprint Scanner App
  • Fingerprint scanners
  • Fingerprint SDK
  • Fingerprint with Phone
  • Future of Biometrics
  • Guest Blog
  • Hand Geometry
  • Healthcare Biometrics
  • Home Security
  • Hospitality Industry
  • Integration Guideline
  • Internet of Things
  • Iris Recognition
  • Law Enforcement
  • Live Scan Fingerprinting
  • Mass Surveillance
  • Membership Management
  • Multi-factor Authentication
  • Multimodal Biometrics
  • Network Security
  • NFA Fingerprinting
  • Palm Vein Recognition
  • Patient Identification
  • Privacy
  • Public Safety
  • Retail POS
  • Retinal Scan
  • SecuGen RD Service
  • Secure Data Center
  • Signature Verification
  • Single Sign On
  • Smart Card
  • Time and Attendance
  • Two-factor Authentication
  • Vascular Biometrics
  • Visitor Management
  • Voice Authentication
  • Voter Registration
  • Windows Biometrics
  • Workforce Management

About Bayometric

Bayometric is a leading global provider of biometric security systems offering core fingerprint identification solutions. Learn more

Products We Offer

  • Touch N Go
  • Single Sign-On
  • Biometric Access Control
  • Biometric Security Devices
  • Fingerprint Scanners
  • FBI Certified Readers
  • Live Scan Systems
  • OEM Modules

Contact Us

Footer Contact
Sending

Recent from Blog

  • How Does NFA Obtain Your Criminal History Record? February 4, 2023
  • ATF Final Rule (2021R-08F) – Attached Stabilizing Braces January 30, 2023
  • Can Live Scan Detect Masked Fingerprints? January 5, 2023
© 2007 - 2022 by Bayometric | All Rights Reserved.
  • Best Seller
  • Cart
  • Checkout
  • Policies
  • Industries
  • Knowledge Base
  • Sitemap