So, what should we do when we see a correct user falsely rejected?

Today's topic is this report “Thales launches payment card with onboard fingerprint scanner” https://www.theregister.com/2021/07/22/thales_fingerprint_payment/
Is the user expected to give up the payment opportunity altogether or is expected to feed the default password as a fallback measure?
Alleging ‘improved usability’ would be misleading in the former case, whereas alleging ‘improved security’ would be misleading in the latter case.
As such, what they claim is false.
More of our reasoning is offered here – “Negative Security Effect of Biometrics Deployed in Cyberspace”
Incidentally, a nice figure is quoted as False Acceptance Rate, but such a figure makes no sense unless it comes with the empirical False Rejection Rate that corresponds to the said False Acceptance Rate; these two rates are in the trade-off.

Key References
“What we need to do for NOT achieving Solid Digital Identity”
Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’


Additional References
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History - Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform
Account Recovery with Expanded Password System
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers - Expanded Password System and Related Issues

< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes - narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space - "below-one" factor authentication

Articles from Hitoshi Kokumai
View blog
Today's topic is BBC's “Facebook to end use of facial recognition software” · https://www.bbc.com/n ...

There is actually a valid methodology that enable us to maximize the entropy of the secret credentia ...

The quantum computer held in a bad guy’s hand is indeed a big threat. So is the artificial intellige ...
Related professionals
You may be interested in these jobs
-
Data Governance Product Owner
Found in: Jooble UK Organic - 6 days ago
Weirgroup Glasgow, United Kingdom Full timeData & AI Product Owner · The Weir Group · Location: UK/Glasgow · Hybrid/Remote Purpose of Role: Support the Weir business in the establishment and execution of enterprise level Data & AI Governance processes, standards and tools to support data governance and data management ...
-
Teacher of Science
Found in: Jooble UK Organic - 16 hours ago
North Durham Academy Durham, County Durham, United Kingdom Full timeTeacher of Science & P.E · MPS—UPS · North Durham Academy requires a Teacher of Science and P.E. · This role presents an excellent opportunity to make a real difference to our young people's lives in all aspects of Academy life through providing high quality teaching and guida ...
-
Relief Home Care Support Worker
Found in: Talent UK3 - 5 days ago
Scottish Borders Council Kelso, United KingdomJob DescriptionWe are looking for Support Workers who care about making every moment matter · Job Title: · Relief Support Worker Location: · East · Hours: · Relief · Contract: · Relief/Casual · Salary*: · £11.59 - £12.31 per hour/ £22,.59 - £23,.67 pro rata per annum. 15% pay enh ...
Comments