Synaptics Blog

June 14, 2017
Category: Biometrics

Recently Synaptics did the heavy lifting to educate the public about biometric security and the need for data encryption. We spent time with customers, press and analysts to establish best practices for any biometric sensor, including fingerprint sensors. One of the best practices is to ensure that unencrypted data is never out in the “clear” through unencrypted memory or as we demonstrated, an unencrypted bus.

During these security... Read more

May 18, 2017
Category: Biometrics

People are now conditioned to believe that fingerprints are unique and are much safer than passwords. In many ways, this is true. But what is less well-known is a notebook manufacturer’s choice in fingerprint sensors can potentially lead to the theft of your fingerprint image, giving the thief the master-key to all your devices and your company enterprise.

There are two types of fingerprint sensors in the notebook market today: those... Read more

February 14, 2017
Category: Biometrics

Many of us remember those stretch-of-the-imagination science-fiction movies and TV shows in which people were screened by facial and iris scans to access otherwise-off-limits locations.  While these futuristic depictions of technology have found success in some government and commercial applications, its use for consumers is still in its infancy.

By contrast, fingerprint authentication has been readily adopted on consumer flagship... Read more

October 4, 2016

One of the many advances being made in smartphones and tablets is the progression to a “whole-device” display. Some models already have full-width displays with little or no bezel or ink area on the sides. The next step will be a nearly full-height display; “nearly” that is, because while the home button will be gone, there will still need to be a front-facing camera.

The use of biometrics for user identity has become increasingly... Read more

March 29, 2016
Category: Biometrics

Easy-to-guess keyboard passwords are just one of the pitfalls of legacy user authentication. In the world of enterprise IT, maintaining security is a challenge and managing the logistics that enable it can be tedious as well. But it is never in vain – protecting the company’s crown jewels is so important, and in our hyper-connected world, strong security procedures are necessary. Biometrics provides that enhanced security, eliminates the... Read more