HYPR Corp. Addresses Android Vulnerability That Exposes Ecosystem-wide Biometric Security Challenges

Biometric Insecurity on Mobile Devices Exemplifies Need for Biometric Tokenization and Improved Security Practices

Aug 12, 2015, 07:47 ET from HYPR Corp.

NEW YORK, Aug. 12, 2015 /PRNewswire/ -- New research unveiled at Black Hat 2015 outlines how hackers can attack Android phones to steal users' fingerprints. Information released today by HYPR Corp. identifies the increasing availability of fingerprint scanners on mobile devices, making the security of this data of utmost concern. To secure biometrics on mobile devices, HYPR Corp. recently released a biometric tokenization platform to augment these convenient authentication systems with strong cryptographic security. More information on this biometric authentication platform is available from HYPR (https://www.hypr.com/biometric-authentication/).

Security concerns identified at HYPR Corp., and findings from the research1 revealed at Black Hat, include:

  • A recent report from Market Research estimated that by 2019, more than half of smartphones will include a fingerprint sensor.
  • Most device manufacturers fail to use available protection to safeguard users' most sensitive biometric data in the Android Trust Zone, an environment that is safely isolated from the operating system.
  • Hackers have found a means to steal victims' fingerprint data due to fingerprints being stored as an image file in an open, world readable, folder.

In order to ensure biometric security, HYPR Corp. advises:

  • Leveraging biometric tokenization to enable the safe transmission of a fingerprint image, or template, to the cloud using trusted public key cryptography.
  • Storing fingerprints as a mathematical representation in a trusted environment, a location separate from a device's operating system.
    • As of late, key players, such as biometric sensor suppliers and mobile device manufacturers, have been behind this approach.
  • Deploying secure processors that are specifically designed for the storage of sensitive data, such as biometrics.

By utilizing state of the art biometric encryption protocols, relying parties can validate signatures in various ways while meeting these four guiding principles of biometric tokenization:

  • No third party should be allowed to centralize storage of biometric credentials.
  • Biometric data should remain isolated from the operating system on a user's device.
  • End users should have full control in choosing what biometric authenticators they will utilize.
  • Relying parties should be able to choose between bring-your-own-device (BYOD) or specialized hardware tokens for authentication in a device agnostic manner.

HYPR Corp. has introduced its biometric tokenization platform to address security with a focus on the financial, government and healthcare sectors. A video overview and demonstration of the HYPR SDK is available here: https://youtu.be/gFJj0-Rag-I

George Avetisov, CEO of HYPR Corp. said:
"Biometric authentication provides a much-needed solution to the problem of insecure passwords, but it is not a panacea. As we have seen, when executed poorly, biometric authentication can put sensitive data at risk. That is why enterprises must ensure they have implemented a robust, multifaceted security solution that ensures biometric signatures and user data is stored safely and isn't transmitted across the Internet. This is where biometric tokenization comes into play."

About HYPR
HYPR is a sector agnostic platform enabling secure biometric authentication. From software developers to enterprises and device manufacturers, we're replacing the use of passwords with advanced biometric cryptography. As an end-to-end solution, HYPR is the fundamental framework for securing the Internet-of-Things. Additional information is available at: https://www.hypr.com/

1 YuLong Zhang, Zhaofeng Chen, Hui Xue and Tao Wei, "Fingerprints on Mobile Devices: Abusing and Leaking," FireEye Labs, August 2015. https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf

PR Contact:
Jessica M. Pasko
Nadel Phelan, Inc.
+1 831-440-2412
jessica@nadelphelan.com

Logo - http://photos.prnewswire.com/prnh/20150409/197571LOGO

 

SOURCE HYPR Corp.



RELATED LINKS

https://www.hypr.com