You are currently viewing Biometric authentication: the best security for your devices?
© CNIL

Digital devices, particularly smartphones and computers, are an integral part of our daily lives and are used for both personal and professional purposes. They contain a great deal of data, some of it sensitive, which needs to be secured to guarantee its confidentiality, integrity, and availability. Because of their ubiquitous presence in businesses and our homes, and the sensitivity of the information they store, these devices require robust security measures.

This article presents biometric data authentication as one of the ways of preventing these risks. Let’s analyze it.

  1. Authentication by biometric data

Authentication involves providing proof of his identity. It differs from identification, which is the declination of his identity. Applied to a smartphone or computer, authentication means unlocking this device and proving by this way that it belongs to you. There are several methods for doing this, known as « authentication factors ». These factors can be knowledge-based (pattern, PIN, password) or biometric characteristics.

© KLIPPA

Biometrics brings together all the computer techniques used to automatically recognize an individual based on their physical, biological or even behavioural characteristics. These biometric authentication systems use voice recognition, facial structure, iris patterns or fingerprints. Biometric systems thus create a « biometric template », stored locally or in the cloud, used to authenticate the user.

For many specialists, biometric authentication is the best of the authentication factors, given the advantages it offers.

  1. Comparative advantages of biometric authentication

Biometric authentication offers improved security because biometric data is technically more difficult to compromise or steal by cybercriminals. If the biometric template is only stored locally, it offers guarantees of confidentiality because neither the manufacturer of the phone or operating system nor third parties can access your template. Nor can this data be extracted from the device or cross-checked with other data.

Biometric authentication also offers convenience and speed of use, as users always carry their « authentication codes » with them and cannot relatively lose or forget them. It is also much quicker than using passwords and other authentication methods, as the owner of a device simply needs to scan their face, fingerprint or iris to unlock it, simplifying the user experience for the owner.

What’s more, unlike passwords, biometric data is unique to each individual and cannot be shared or passed on to a third party, as it is a physical identifier.

However, when it comes to digital security, there is no such thing as a zero-risk technology. So, what are the vulnerabilities of biometric authentication?

  1. Risks associated with biometric authentication

If the biometric template is stored in the cloud and can be manipulated by applications, there is a risk that it will be used fraudulently once it has been recovered by a third party. The person concerned therefore has no control over their biometric template. However, unlike a knowledge factor, biometric elements are fixed, which can pose problems in terms of privacy.

What’s more, current facial recognition techniques can be compromised by a simple photo. And that’s not counting the potential access problems that could arise with a hoarse voice or a physical accident that alters biometric data such as the face or burned fingers.

In conclusion, biometric authentication offers many advantages in terms of security and ease of use, but it also entails risks and limitations. For optimum security, it is advisable to combine this method with other forms of authentication. The next article will look at one of these: state-of-the-art strong password authentication.

Freddy BASILA BULAMBO

M2 Digital Economy Law – Class of 2023/2024

Sources :

  1. CNIL – Smartphone : authentification avec vos données biométriques
  2. ANSSI – MOOC sur la sécurité numérique
  3. Keeper – La biométrie est-elle plus sûre que les mots de passe ?
  4. Okta – Biométrie des empreintes digitales : définition et degré de sécurité.
  5. Idemia – La technologie de reconnaissance de l’iris est en plein essor.