download checkmark warning privacy-hand guarantee safe spy brick-wall id privacy firewall data-security book-gear book diagram video-marketing hierarchical-structure phone email user Lifted Logic Web Design in Kansas City clock location phone play chevron-down chevron-left chevron-right chevron-up facebook checkbox checkbox-checked radio radio-selected instagram google plus pinterest twitter youtube send linkedin simple-play plus pin left-arrow left-arrow-long restart

What is biometric authentication and how does it store my data? 

Here is a quick rundown according to our security experts:

Image of a green finger print scanner icon, a black StoneLock facial biometrics icon and a blue iris scanner icon on a white background

Biometric authentication is a security process that uses your unique biological characteristics to verify that you are who you say you are. After using a mathematical formula to verify you, the biometric reader allows the door to unlock allowing you access to the secured area.


The three most used biometric readers in the security industry are fingerprint scanners, facial recognition scanners, and iris scanners.  Each gets the job done but, which method keeps your personal data most protected?


Here is a quick rundown according to our security experts:


Facial Recognition:

Facial recognition traces your unique facial characteristics and then uses a database to find a match.

Up until now, facial biometric authentication would compare your individual data against a database of collected images or video stills. While this is still how most facial biometric verification works, updates in facial recognition technology allow for the elimination of a picture database providing a more private experience for the user.


Iris Scanning:

Iris scanning uses visible and near-infrared light to take a high-contrast photograph of your iris.

It compares the pattern of colors in the iris to the photograph in the database to determine if you should be granted access into the secured area.


Capacitive fingerprint sensors:

Capacitive fingerprint sensors collect data on the ridges and valleys of your fingerprint.

This the most common type of fingerprint scanner. You might even be using it on your cellphone, laptop, iPad, or another consumer electronic right now. Instead of creating a traditional image of a fingerprint, capacitive fingerprint scanners use tiny capacitor circuits to collect the data.

These capacitors can store an electrical charge, that connects them to conductive plates on the surface of the scanner. This allows them to be used to track the details of a fingerprint.


Ultrasonic fingerprint ID:

Ultrasonic fingerprint scanners make use of very high-frequency ultrasonic sound.

You can’t hear it, but these waves are used to map out the details of your fingerprint. Ultrasonic scanners capture 3D images making them much more secure than the 2D images captured by capacitive fingerprint scanners.


Securing your data with StoneLock facial biometric readers:

The StoneLock Go is a facial biometric reader that doesn’t use photographs, video stills, or video to allow you to enter secured areas of a building. Instead, StoneLock uses near-infrared technology to capture reflectivity data that’s not visible to the naked eye.

This allows us to go further in protecting your privacy than any facial biometric product on the market has before.  StoneLock also protects your gender and ethnicity.

Back to Blog

Already have an account?