10 Biometric Technology Trends to Watch in 2017 2017-02-22 17:27:59 / CONFERENCES

This year promises to be a "breakthrough" for biometrics and digital identity.

 

2017 will be a "breakthrough year" for biometrics and digital identity. It was in this year, according to research by Acuity Market Intelligence, the technology will become more widespread among consumers and developers will find her a new application.

 

Most states that 2017 will be a turning point - cloud technologies in biometrics, mobile security credentials and innovations in financial technology to provide the applicable level of security and control over personally identifiable information.

 

According psm7.com, the company Acuity Market Intelligence identified the top 10 trends in the development of biometric technologies and digital identity in 2017:

  • Behavioral biometrics on smart phones and related privacy issues will become mainstream.
  • The technology of recognition of the iris on smartphones will be mass due to its accessibility to the consumer in terms of price.
  • Issues related to the security of personal identifying information as part of the Internet of things, will be vital for CEOs.
  • Cloud biometrics will become an integral part of the infrastructure of global digital payment and commerce platform.
  • Links between digital identity, smartphones, mobile and stationary smart appliances will be monetized.
  • There will be new monetization model for digital identity that will outweigh the scales of businesses towards the consumer.
  • Secure Mobile credentials will contribute to the development of infrastructure, moving from pilot testing phase to full implementation.
  • Further development of biometric technologies will be largely due to the sector BFSI (banking, financial services and insurance).
  • The industry will be a huge number of innovators, which will pose a threat to established order.
  • Biometrics and digital identification will be considered as ways to establish social equality, to ensure the availability of equity and the protection of confidential information.
    Copyright © İnformasiya Texnologiyaları İnstitutu, 2024