9월 18, 2020

Using biometrics for authentication in Android

Joel Snyder

Mobile device users are now favoring biometric authentication such as fingerprint sensors to unlock their smartphones and tablets, mainly because they speed and simplify the unlocking process while reducing the cognitive burden of remembering multiple long passwords.

Additionally, proper use of biometrics increases security: passwords are easy to steal, while faking biometrics is much more difficult. The result is a technology that is ideal for providing role-based access controls and high levels of trust for business users.

Here’s a detailed look at how biometrics work, how data encryption fits in, and what business leaders should look for to keep security high while delivering the convenience that users want. How exactly do all of the elements of biometrics come together in Android to provide a heightened security offering?

 

How biometrics work

The first step to understanding biometrics is to realize the biometrics are not being saved in the network or passed around between devices and servers. Instead, biometrics are used to lock up and protect other authentication information — usually a digital certificate private key — and it’s the “protected” information that is actually being used to authenticate the user.

Android v6 (“Marshmallow”) introduced a standardized API for biometrics, focusing on fingerprint readers. Companies looking to leverage biometrics as part of authentication can depend on having a common set of services, a high level of security, and a consistent user experience across platforms.

The key requirement in Android is that fingerprint biometrics have to be stored in the Trusted Execution Environment (TEE). This means that the biometric information is encrypted and stored in a separate part of the smartphone, completely inaccessible to the regular operating system. They can’t even be exported. Android can ask the TEE to validate an identity using biometrics, but cannot extract the biometric information. This means that when the user stores their biometric information, such as a fingerprint, they are not sharing that information outside of their own smartphone or tablet. They are just establishing a way to identify themselves to their device.

 

Implementing biometrics in the enterprise

Using fingerprints to authenticate the user to their own phone is just one use of biometrics. Companies can think beyond unlock screens for their employees. For example, some types of password vaults can be unlocked with biometrics, simplifying the process and encouraging their use.

An even more advanced use combines the TEE, biometrics, and application-specific authentication information to give users the experience of using their fingerprint to log onto online services. The FIDO (Fast Identification Online) Alliance has developed a standard to optimize exactly that: converting biometric authentication of an end-user to application-friendly user authentication. Android 7.0 (“Nougat”) is certified as compatible with FIDO2, which means that most Android devices are ready, out of the box or with a quick software update, to use biometrics (or other FIDO-compatible security hardware) to eliminate the use of passwords for many websites and applications.

While Android, the client, is important, it’s even more critical that FIDO Alliance’s FIDO2 protocols are supported by online services and browsers. Major vendors, including Google, Dropbox, Facebook, Paypal, Salesforce, Bitbucket and GitHub, and major browsers such as Google Chrome, all support FIDO2.

Samsung Pass is an example of a service that is based on the FIDO specifications. Samsung Pass enables strong authentication across applications using biometrics combined with a cloud-based service provided by Samsung. With Samsung Pass, smartphone users can lock up multiple sets of authentication credentials (from both public and private enterprise services) with their fingerprint, facial recognition or iris scan. Samsung Pass simplifies the user experience, but uses highly secure authentication systems based on digital certificates so that end users can keep their strong authentication credentials locked up with biometrics, reduce their use of insecure passwords, and speed authentication to applications.

 

Advancing and evaluating biometric technology

Of course, fingerprints are only the first biometric that came to smartphones. Vendors such as Samsung have added other biometrics such as face and iris scanning to their devices.

For iris scanning, Samsung smartphones like the Galaxy S9 and Note9 made use of a separate infrared camera and “flash” for the iris that is only connected to the TrustZone-based TEE. This eliminates the possibility that untrusted software can grab an iris scan. The scans are processed by a trusted application in the TEE, and only the processed hash of the scan is stored, eliminating the possibility that the raw data can be extracted by any software running outside of the TEE.

Fingerprint readers are getting their own innovations too. For example, Samsung’s Galaxy S10, Note10 and S20 series include an ultrasonic fingerprint sensor. Built into the display, the sensor detects the ridges and valleys of the fingerprint directly through the glass by bouncing off ultrasonic pulses. This new style of reader is fast and popular with users, because they no longer have to find the capacitive sensor on the back.

 

Addressing standards

Businesses with BYOD or CYOD policies should carefully evaluate biometrics on Android smartphones when choosing vendors and technologies. This will help reduce the risk of introducing the kinds of security vulnerabilities that came with the initial implementations of fingerprint readers. Following standards such as FIDO’s U2F will help reduce the risk of insecure implementation.

When enabling newer biometrics, look for a clear statement from the manufacturer on how the data is stored and verified. Data should be stored in an encrypted or hashed format eliminating the possibility of decryption, even by privileged applications.

Android devices should make use of specialized hardware and TEE with live biometric data, to ensure that malware can’t tamper with the data or interfere with the process, creating safer options for businesses interested in top security measures for their growing workforce.

 

Learn more about how Samsung mobile devices are Secured by Knox. And read about businesses that are succeeding with Knox solutions.

[아이콘] 닫기

삼성 Knox 시작하기

[아이콘] 여행가방
리셀러, 솔루션 공급업체 또는 서비스 공급업체이신가요?

지금 Knox 파트너가 되어 비즈니스 성장을 도모하세요.

[아이콘] 정보

시작할 Knox 제품 선택:

올인원 번들
Knox Suite
리브랜딩 및 맞춤 설정
Knox Configure
사기 및 도난 방지
Knox Guard
디바이스 보호 플랜
Samsung Care+ for Business
기타 제품 및 서비스

시작하기

[이미지] Knox Suite

기업용 모바일을 위한 일체형 솔루션 번들

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 회사 디바이스를 안전하게 보호, 배포, 관리 및 분석할 수 있는 완벽한 툴 모음입니다.
  • Knox Suite와 함께 제공되는 강력한 기능을 사용해 보세요.

Knox Suite에는 다음이 포함됩니다.:

Knox Mobile Enrollment 무료
Knox Manage
Knox E-FOTA
Knox Asset Intelligence
Knox Platform for Enterprise 무료
Knox Remote Support
Knox Capture
Knox Authentication Manager

시작하기

[이미지] Knox Configure 로고

삼성 디바이스를 리브랜딩하고 맞춤 설정하세요.

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 삼성 디바이스를 대량으로 구매하는 즉시 원격으로 구성하고 특정 요구 사항을 충족하도록 맞춤 구성합니다.
  • 디바이스를 일회성 배포를 위해 설정하거나 원하는 만큼 업데이트할 수 있습니다.

시작하기

[아이콘] Knox Guard 로고

삼성 디바이스를 위한 사기 및 도난 방지

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 원격으로 삼성 디바이스를 제어하여 금융 관련 위험성을 줄이고 자산을 보호하세요.
  • SIM 제어 및 디바이스 잠금 기능을 포함한 Knox Guard의 모든 기능을 사용해 보세요.

시작하기

[이미지] Samsung Care Plus For Business 로고

삼성 디바이스를 위한 디바이스 보호 플랜

  • 빠른 디바이스 수리 및 교체로 업무 중단을 최소화합니다. 시작하려면 삼성 영업팀에 문의하세요.
  • 한 곳에서 모든 디바이스 보증 범위 및 청구 정보를 확인하세요.
  • 이미 Samsung Care+ for Business를 구매하셨나요? Samsung Care+ for Business 콘솔에서 계정을 만들고 플랜을 활성화하세요.

기타 제품 및 서비스

[이미지] 기타 로고

고객의 고유한 요구 사항을 해결하는 최신 솔루션입니다.

  • Enterprise Tech Support를 통해 전담 계정 관리자로부터 효율적인 기술 지원을 받아보세요.
  • 삼성 소프트웨어 맞춤 설정 서비스를 사용하여 귀사를 위한 맞춤형 디바이스를 만들어 보십시오.
영업 팀에 문의