White Paper

Mobile biometric authentication: Device-centric vs. server-centric architecture

MULTIPLE BIOMETRIC MODALITIES FOR AUTHENTICATION CAN ACHIEVE HIGHER BIOMETRIC PERFORMANCE.

Introduction

Biometrics use “inherent” factors (something the user is) to authenticate a user’s identity. Relative to knowledge- and possession-based authentication methods (something the user knows and something the user has), inherent authentication factors like biometrics are difficult to steal and spoof. We can’t easily tell when a fraudster uses a stolen password or mobile device, but with biometrics and liveness detection we can better detect when a fraudster is at work so that their access can be prevented.

Download PDF here if you are having trouble viewing.