16-Apr-2021 | Market Research Store

Currently, the smartphones and many electronic devices are using face recognition for unlocking the devices from the security protocol point of view. The advanced technologies are believed to confuse and make it difficult for the hackers to gain access to the data in the devices due to such security features such as the facial recognition. However, the thieves or hackers try unlocking the phone using the face when you asleep or using the photo from social media. Just like the other existing human biometric identification system, there are flaws in these advanced identity verification technology as well.

The team from Brigham Young University has found a more secure and effective means of using face for making accessibility limited. The latest security method named Concurrent Two-Factor Identity Verification (C2FIV) requires facial identity and particular facial motion to gain access to the device. For setting up the security code, the user uses a camera to record a video of about 1 or 2 Seconds of facial movements or lip motion after reading a secret phrase. The integration of the video into the device helps use facial features and facial motion and also stores them for ID verification in the future as well.

The researchers basically want the identity verification process to be intentional to help overcome the hacking issues. There are risks that even if the person falls unconscious, the individual’s device can be opened using the finger or retina to gain access to the device. However, in the C2FIV as it uses integrated neural network structure to continuously analyze the facial motions and features. The framework comprises of dynamic, sequential data that are recorded for further use. The facial features and motions are stored in the server or devices such that it can be used to unlock the device. The device verifies the user’s ID to the stored embedding so that they match. The researchers believe that C2FIV could be used in restricted areas or high security demanding places such as a workplace, ATM use, online banking, safe deposit box access, hotel room entry, or keyless entry/access to vehicle.