• Skip to content
  • Skip to primary sidebar
  • Skip to footer
  • Gaming
  • Computing
  • Internet
  • Phone and communications
  • Software
  • Mobile computing

The source for tech buying advice

The latest technology news and reviews, covering computing, home entertainment systems, gadgets and more.

Face authentication feature to be added to Aadhaar verification by July

March 26, 2018 By discountbonus_sd3n3h



Iris and fingerprint scans are already in place for the verification of Aadhaar users, but now the Unique Identification Authority of India (UIDAI) is going to add face authentication as a security option. 

This is to facilitate the authentication of people that have run into issues when using bio-metric authentication because of their old age or wear-and-tear of their fingerprints. It won’t be a stand-alone feature but will only be allowed in fusion mode. This means that fingerprint or iris authentication will still be required, but face authentication can be used alongside to verify details. 

UIDAI’s CEO, Ajay Bhushan Pandey, confirmed that the feature would roll out by July 1 in his presentation to the Supreme Court titled ‘1 Billion Plus’. The five-judge bench is hearing petitions that challenge the constitutional validity of Aadhaar.

There have been lots of questions about UIDAI’s competency with respect to the privacy and security of Aadhaar numbers. Of late, it was reported that Robert Batiste, a French security researcher, could hack into the Aadhaar app in under a minute. 

More recently, another report by ZDNet said a Delhi-based security researcher claimed that there was a leak on a system that was run by a state-owned utility company allowing access to private information of Aadhaar Holders including their names, 12-digit identity numbers and bank credentials. 

On the other hand, Pandey claims that the Aadhaar encryption system is so robust that break it may take, “More than the age of the universe for the fastest computer on Earth.”

The security of Aadhaar numbers is paramount because they’re being used for identity authentication across banks, income tax, telecom companies, public distribution systems (PDS) among others. An average of 4 crore authentications take place in one day across the country. 

Addressing the recent concerns, Pandey reassured people that UIDAI doesn’t collect purpose, location or the details of any transaction.

  • Keep your identity safe with the following defenses in place:
  • The best identity management systems and authentication services
  • How to add two-factor authentication to Linux with Google Authenticator
  • How to enable two-factor authentication on Android
  • How to enable two-factor authentication on your iPhone or iPad



Source link

Filed Under: Computing

Disclaimer: All the links on this page are ‘affiliate links’. This means we will earn commission from every customer we refer from this website. Our reviews are honest, we wouldn’t waste your time or put our reputation on the line by recommending anything we didn’t fully believe in.

Primary Sidebar

Disclaimer: All the links on this page are ‘affiliate links’. This means we will earn commission from every customer we refer from this website. Our reviews are honest, we wouldn’t waste your time or put our reputation on the line by recommending anything we didn’t fully believe in.

Recent Posts

Three CEO: Market consolidation will allow for better mobile infrastructure

Three CEO: Market consolidation will allow for better mobile infrastructure

Robert Finnegan believes a permissive attitude towards consolidation will allow … [Read More...] about Three CEO: Market consolidation will allow for better mobile infrastructure

  • Tangerine offers some extra-juicy deals on its excellent NBN plans
  • PS5 restock: Best Buy restock time – when to look for the PS5 on sale today
  • Facebook under pressure to scrap its plan for 'Instagram for Kids'

Follow Us Online

  • Facebook
  • Google+
  • LinkedIn
  • Pinterest
  • Twitter

Footer

Menus

  • Contact
  • Terms of Service
  • Privacy Policy

Most Posts

  • Google’s collection of consumer location data was misleading, Australian court rules
  • Gaming
  • Computing
  • Internet
  • Phone and communications
  • Software
  • Mobile computing

Newsletter

Copyright © 2021 · WordPress · Log in