When you check in in a hotel, you can swipe your face to avoid paying a deposit; when paying in a restaurant, you can pay by pressing your fingerprint; even when you approach the door, the smart hardware can identify the owner and open the door automatically... These are cool scenes that only appear in science fiction films , Relying on the promotion of biometric technology, it will enter the lives of ordinary people in the future.
Will the Internet become more secure from the ordinary account and password verification system to the biometric system? If the account password is stolen, you can change the password, but the biometric information is unique. If it is stolen, the impact will be lifelong. In a sense, wouldn't it be more dangerous?
Cool biometricsThe coolest thing in the technology circle in the past two years is definitely the biometric technology. Some mobile phones already support fingerprint unlocking and fingerprint payment, but they have not yet been widely used.
Identity authentication is a basic application of the Internet. In the traditional Internet era, registration, login, payment and other actions require identity confirmation. However, it is difficult for the system to distinguish the authenticity of the identity information entered by the user. "You never know whether the opposite of the Internet is a person or a dog."
The arrival of the era of biometrics and big data has essentially changed this status quo. Fingerprints, human faces, palm prints, eye patterns, iris, human DNA, and the collection of human health information by various wearable devices will all become biometric data. This information is unique, just like there are no two leaves that are exactly the same in the world.
By applying biometric technology and cooperating with big data, it can accurately identify a person instead of an account during identity authentication. It becomes possible to obtain the real identity of users through the Internet, and the transaction cost of the entire credit system will be greatly reduced.
Cool biometric technology is also welcomed by young people. They pursue the ultimate cool user experience. In the future, many scenes can be swiped through wearable devices. In the future, the scanning process can even be omitted. The sci-fi scene is completely May become reality.
Call for industry standardsGoogle newly launched the Android M operating system and Apple launched the fingerprint recognition system. Major giants are trying to develop biometrics, but there is no unified industry standard internationally.
In this storm, Ant Financial advocated the establishment of the Internet Finance Branch of the Internet Trusted Identity Authentication Industry Alliance (IFAA) in an attempt to form a unified technical standard and lead the healthy development of the industry.
On June 18th, IFAA was initiated and established by Ant Financial. Partners include mobile phone manufacturers such as Samsung, Huawei, ZTE, OPPO, and Coolpad, as well as chip manufacturers, security manufacturers, algorithm manufacturers, and testing institutions represented by Qualcomm and Watchkey, trying to integrate all parties in the industry chain.
Feng Chunpei, senior director of Ant Financial’s Security Product Technology Department, believes that the traditional Internet is to identify accounts, but accounts may be stolen and operated by others. In the field of Internet finance, to do more securely, you need to identify people and know whether they are. I am operating.
"In the future, the real identification of a person may not be through a password, perhaps through other personal characteristics about you, you are unique, it is difficult for others to imitate and copy. In this sense, biometrics makes the Internet more Safe," Feng Chunpei said.
safer? More dangerous?Safety and danger are always relative.
Zhang Fu, CEO of Qingteng Cloud Security, believes that biometric technology may make the Internet more dangerous. Cyber ​​hackers have always been hacked. The traditional account information leakage can be solved by changing the password, but the biological information leakage is difficult to change. "You only have ten fingers, and these fingerprint information are unique. If the impact on people is lifelong, there is basically no way to fix it."
In the history of the Internet, we can still find similar examples.
In 2007, South Korea introduced the online real-name system. The original intention was to combat the prevailing cyber violence and cyber crimes at the time, and to make the Internet more secure.
However, while implementing the real-name system, the information security mechanism did not follow up. At that time, black production in South Korea was prevalent. Hackers attacked websites and could easily obtain users' personal information. This led to the leakage of a large number of personal privacy information and the Internet flooded the Internet.
There is a huge contradiction between the online real-name system and the protection of user information security. The Korean people are angered and strongly urge the government to abolish the real-name system.
In August 2012, South Korea had to announce the cancellation of the real-name system.
An initiative aimed at making the Internet safer has made the Internet even more insecure. If the promotion of biometric technology only pursues coolness and ignores information security, it may face the fate of South Korea.
Ant Financial is also aware of this, "Protecting the security of biological information is the most important, and it must be more advanced and stricter than traditional account protection," Feng Chunpei said.
Watchdata has developed a security system to protect biological information. Its senior product manager Yang Ziguang said that biometric data is very secure. For example, mobile phone users use fingerprints for payment and transactions. The fingerprint information will be encrypted and stored in the mobile phone isolation area. Upload to the cloud.
When the user needs to pay, the data will not be connected to the Internet, and the fingerprint data will be verified in a trusted execution environment. “It is like an information island that is physically isolated. This island has only one entrance and one key.†Yang Ziguang said. The key is only in the hands of the mobile phone dealer, even if the mobile phone is lost, no one can step into the island to obtain biological data.
At present, biological data is relatively safe. However, the ability of hackers to attack is also constantly improving, and I am afraid that it is necessary to continuously improve the defensive ability to prevent the invasion of black property.
- [Compact Design & Family-Sized:]Compact design frees valuable desk space while non-slip grip keeps it from being knocked off. 6 high powered ports lets you charge any combination of phones, tablets or other USB-charged devices simultaneously
Brand Name: OEM
Product Name: Multi USB Charger
Use: Mobile Phone
Place of Origin: Guangdong, China (Mainland)
Port: 6 port
Input: AC100-240V 50/60HZ
Size: 90*70*16mm
Weight: 250g
Materials: PC+ABS
Color: Black/White
Warranty: 1 year
Multi USB Charger,Multi Usb Wall Charger,Multiple Usb Port Charger,Multi Port USB Charger
Shenzhen Waweis Technology Co., Ltd. , https://www.waweis.com