Biometric Security Overview Of Parallel Wallet Biometric Security Module

Facilered
Coinmonks
4 min readJan 20, 2023

--

A transparent, equitable, and reliable backbone infrastructure for the digital economy is being built using the public + private layer-1 blockchain technology ParallelChain.

ParallelChain has served as a permissioned blockchain platform on which high performance enterprise-grade apps, like KYC, data security, and supply chain solutions, are developed and maintained since its inception in 2018.

ParallelChain was built from the ground up with commercial and company adoption in mind. Thanks to its special characteristics, businesses have been able to use blockchain technology without jeopardizing their economic independence, data privacy, or compliance.

The parallel Wallet is one of the products of the parallel Chain

Parallel Wallet

With Parallel Wallet from Parallel Chain, you are offered a personal vault for secure crypto storage with multi-biometric recognition. This means that you can conveniently secure assets using your biometrics be it face or voice ID.

The reason for this is not far fetched from the fact that biometric authentication has been shown to be far more trustworthy than conventional authentication techniques like passwords. To back the fact up, a study carried out in 2022 by Verizon shows that password verification now accounts for more than 80% of cyber breaches.

After the biometric template is created upon enrollment, no photos or media files are required for comparisons in the future, therefore they are automatically and irrevocably deleted. In ParallelWallet, the data erasure includes images of the user’s face, palm, as well as voice samples.

These security steps by parallel Chain eliminates the fear and possibility usually associated with biometric data compromise, where hackers would be able to reuse the person’s original face, handprint or whatever the biometric happens to be.

This is because for the hacker to even be able to reuse the templates generated by ParallelWallet, the hacker must first have a compatible deep-learning model, then crack the encryption and re-assemble the files properly, and finally de-scramble the proper ordering (described below), which is a non-trivial and daunting process.

In the case of the handprint template for the palm recognition in ParallelWallet, we also deliberately exclude all fingerprints for privacy protection. Only the area from the palm up to the middle knuckles is used for generating the template.

Anti-spoofing and multi-biometric templates

In a bid to further strengthen the biometric security level, the Parallel Chain wallet uses the anti-spoofing and multi-biometric templates which is another step in the identity authentication process. The “anti-spoofing” addresses the question of “Is this a real person” which is a further question to “Is this person who they claim to be?” This makes it an exercise in futility for any hacker attempting to pass authentication by using a photo of your face or handprints.

In conclusion, ParallelWallet, supports four aspects of identity authentication in a single application, which is the first of its kind in the biometric identity products or services market in the world today: “who you are (biometrics)”, “is this a live person (anti-spoofing)”, “what you know (secret passphrase in voiceprint)”, and “what you possess (mobile device in use)”.

Processing and storing biometric templates safely

Your biometric information is secure beyond this level in ParallelWallet’s authentication system.

  • In order to lower the danger of data security risk in action (also known as “data in action”), each web request to the biometric server is first provided a time-limited token per user session that expires after a specific amount of time (for example, 10 minutes).
  • Second, all internal data transmission and storage (also known as “data in transit” and “data at rest”) is encrypted.
  • Third, to safeguard user privacy even in the unlikely scenario of template theft, the biometric template is maintained in a format that complies with biometric data and privacy standards like the GDPR1.

This final security precaution involves further scrambling each biometric template (which is made up of a vector of real numbers) before it is divided into several pieces, encrypted, and stored.

Summary

Instead of storing the collected data in understandable formats that may be decoded to disclose the original files, ParallelWallet goes through a rigorous procedure to transform your biometrics into distinctive mathematical derivations, then further encrypts and scrambles the data to make it absolutely irreversible both inside and outside ParallelWallet.

In conclusion, ParallelWallet’s biometric authentication system enables users to use biometrics in a secure and private manner by utilizing the different security methods mentioned above.

Find out more about Parallel Chain

Website

Twitter

Telegram

Discord

New to trading? Try crypto trading bots or copy trading on best crypto exchanges

--

--