Google is looking to improve biometrics in its upcoming Android P. The company announced that developers can start integrating biometric authentication into their apps using the BiometricPrompt API.
According to Google, biometrics are an important part of keeping users safe. Applications and devices often use knowledge factors, possession factors, and biometrics factors for authentication mechanisms. Knowledge factors typically include PINs and passwords, possession factors include token generators or security keys, and biometrics factors include fingerprints, irises, or the user's face. Vishwath Mohan, a security engineer at Google, wrote in a blog post:
With Android P, Google hopes to provide a better model for measuring biometric security, restrict weaker authentication methods, and provide a common platform and entry point for developers to easily integrate the functionality. Biometrics typically uses two metrics: the false acceptance rate (FAR) and the false rejection rate (FRR). While both metrics provide an indication of the accuracy and precision of machine learning, Google says they do not take active attackers into account or provide information about resilience against attacks. FAR focuses on security issues, measuring how often an illegitimate user is accidentally identified as the device owner, while FRR focuses on usability issues, measuring how often the legitimate device owner has to retry their authentication. In Android 8.1, the company introduced the Spoof Acceptance Rate (SAR) and Impersonation Acceptance Rate (IAR) to measure how easy it is for an attack to bypass biometric authentication services. "Spoofing" refers to using a known good recording (such as replaying an audio recording or using a picture of a face or fingerprint), while "impersonation" means successfully mimicking another user's biometrics (such as trying to sound or look like the target user). |
<<: The real reason Apple and Google want you to spend less time on your phone
>>: You can't hire programmers like this
As the consumption environment evolves, how can n...
At this year's CES, the field of autonomous d...
What are the application scenarios of “live broad...
The development of the Internet has a history of ...
In fact, most of the Xiaohongshu merchants are mo...
The most important part of user operation is user...
1. Bank card cannot be bound 2. Website registrati...
If you are engaged in community operation , you m...
[[230081]] Hi, everyone. I’m Ji Xiaohua, the deve...
Author: Zheng Xixi, Internal Medicine Doctor at P...
In daily life, we are always used to putting fres...
Cold and windy weather Down jackets have excellen...
gossip "Drinking vinegar can soften blood ve...
This article only discusses accounts with landing...
When I was talking with a friend last week, I cam...