В АО «ЦБТ» рассказали о защите биометрических данных от дипфейков

Encryption of communication channels makes it possible to understand that there is a living person in front of the camera

Facial image is one of the most popular biometric recognition models. Natalya Bessonova, Director of the Department of Biometric Technologies at JSC CBT, spoke about methods of data protection at the event "Cloud Cities. BRICS Cities Future Forum".

According to her, biometric data may be publicly available, for example, on social networks.

The rules for storing biometric data have changed; previously, there were no standards for storing and using this data. Now, mandatory consent is required for the collection of biometrics.
Natalya Bessonova, JSC CBT

Bessonova reminded that biometric data can only be stored in the Unified Biometric System (UBS). Non-commercial government structures can only use data processed by neural networks, and not the original biometric data itself.

A single point of control for your biometric data is emerging. There you can find all the services to which you have granted access and revoke your consent to data processing. A huge amount of biometric data is publicly available. They affect what threats exist for biometric systems.
Natalya Bessonova, JSC CBT

Bessonova reminded that there are several methods of protection. A hacker attack on the system is possible at any point, so various methods are used depending on this.

Strong encryption, encryption of communication channels, algorithmic methods that allow you to understand that there is a living person in front of the camera. Lifeless algorithms. They allow you to verify that there is a living person in front of the camera at the time of service.
Natalya Bessonova, JSC CBT

At the same time, active algorithms are less convenient for the user. They require the user to complete a task, such as a smile. They are more difficult for fraudsters.

Perviy Technicheskiy acts as an information partner of the event "Cloud Cities. BRICS Cities Future Forum".

Read more on the topic:

Record interest in remote voting shown in Russia

How hackers steal user passwords: methods named

The number of recorded hacker attacks has increased in Russia

Now on home