White Paper
Mobile biometric authentication: Device-centric vs. server-centric architecture
MULTIPLE BIOMETRIC MODALITIES FOR AUTHENTICATION CAN ACHIEVE HIGHER BIOMETRIC PERFORMANCE.
Introduction
Biometrics use “inherent” factors (something the user is) to authenticate a user’s identity. Relative to knowledge- and possession-based authentication methods (something the user knows and something the user has), inherent authentication factors like biometrics are difficult to steal and spoof. We can’t easily tell when a fraudster uses a stolen password or mobile device, but with biometrics and liveness detection we can better detect when a fraudster is at work so that their access can be prevented.
Download PDF here if you are having trouble viewing.