Securing your tomorrow, amidst the changing biometric landscape

Duration: 1:00

Biometrics-based identification, authentication, and authorization are transforming fast thanks to technological advancements in the biometrics space. This is not only transforming the use cases but the users too. How we establish ‘Who you are’ and ‘What you can do’ is creating a very exciting future in terms of ‘What is possible’. The password is passé, but do we know?

HackerEarth, in collaboration with Unisys, is pleased to announce the next webinar session to discuss the ever-changing technology of biometric identification systems.

We all have traditionally used username/password or passphrase to determine ‘who you are’.  In the digital age, the number of passwords to be used to access different systems/sites have increased, which means it has become complex to remember these unique passwords. Therefore, there is a high possibility that many will reuse the same passwords across all the systems/sites. This one mistake could cost us pretty much everything, including user identity. These days, most of the verification is sent through an email. Granting access to an impersonator will have serious consequences on the end user. 

So, how do we protect our identity?  This session will talk about, ‘Securing your tomorrow, amidst the changing biometric landscape’.

What are the new trends? 

Smartphones have changed the landscape of biometrics by bringing them closer to the consumer. These days, most of the phones have fingerprint scanners and/or facial recognition systems which are very effectively used by the financial institutions as “Multi-Factor Authentication”.  Now the advancement of wearables is paving the way to the use heartbeat and DNA as the biometric authentication and authorization mechanism.  Gartner also predicts that smartphone AI will detect passwords with behavioral biometrics.

What are the bottlenecks and business risks? 

Biometric security of collected data is paramount which can otherwise cause identity theft, fraud, and terrorism. Used properly, biometrics can efficiently prevent these. National Institute of Standards and Technology (NIST) provides guidelines for data security. Depending on the sector where the biometric identification is used, ‘False positives’ and ‘False negatives’ can falsely implicate a person in the judiciary. In medicine, it can be a life-threatening situation. Malicious hackers can collect end users’ biometric data in a non-intrusive way. For example, they can easily collect the fingerprints because of the touch or through remote fingerprint scanners or can reconstruct the DNA of a person, albeit more complex it’s still achievable. Once the biometric data is compromised, it is nearly impossible to replace them. 

How is the biometric market/landscape? 

Usage of biometrics is not new. Law enforcement has always collected fingerprints to identify a person. Smartphones have made biometrics readily available on the consumer’s fingertips. This is adopted by many financial, and Government sectors to authenticate an end user as part of multi-factor authentication.  Governments have adopted biometrics in the following sectors:

  • Border security – Major countries collect biometrics data (finger and retina) for the aliens entering the country.
  • Healthcare – Biometrics Research Group, Inc. estimates that the entire global marketplace for biometric solutions in the healthcare market will reach approximately US$5 billion by 2020. Biometric use will reflect the increasing need for healthcare fraud prevention and cost containment in the United States, along with the need to improve patient privacy and healthcare safety. 
  • Law enforcement and counter-terrorism – They use known databases to search for a fingerprint and/or facial image to identify a culprit. 
  • Unique ID – Unique Identification Authority of India (UIDAI) has collected the fingerprints of a majority of the Indian residents. This system can authenticate the end user, and it can be used to provide seamless services both in the government and private sector. 

Who are the major players and stakeholders? 

Governments, security implementing private companies such as Unisys, biometrics companies such as Cognitec, and Operating System vendors such as Microsoft.

Seeing this huge potential of biometric technology, we have Prashant Kumar Gupta, the Lead Architect for Stealth (Identity) at Unisys, as the speaker for the session on October 16 at 7 PM.

The main topics that will be covered during the webinar are

  • Biometric landscape
  • New trends
  • Bottleneck and business risks
  • Major players and stakeholders


  • Speaker Image

    Prashant Kumar Gupta

    Consulting Engineer Lead Architect – Stealth (Identity) Member of Technology Board @Unisys - India Technology Center

    Prashant Kumar Gupta is a Lead Architect for Stealth (Identity) in India Technology Center of Technology Division (SSD) at Unisys. In the 19+ years of his career he has garnered extensive experience in High Availability Clustering, Disaster Recovery, Backup & Recovery and Storage subsystem. Prashant has spent a fair amount of time working on Distributed and Virtual File Systems, Storage Sub-systems and in Unix/Linux Kernel development.

Don’t miss out on any of our upcoming webinars.
Subscribe now.