We have prototyped a portable (soon to be wearable) Biometric device with the following features:
- Biometric 3 factor authentication - (Something you "have", Something you "know", Something you "are")
- Communication via USB, Bluetooth, RFI, & Wifi
- Onboard biometric database and management software
- Stand-alone unit, untethered, and contact-less
- ATMEL encrypted chip for sensitive information
- Device is powered by a 32 BIT Cortex CPU
- Biometric system is powered by Authentic chip
Our product was demonstrated as a Biometric, bluetooth login device for a Windows system last week at the Toronto Bitcoin Community Meetup.
We are reaching out to the Bitcoin community to see possible applications for our product, which direction we should go and to get some discussion going regarding Biometrics and Bitcoin hardware.
I would love to use this thing as an hardware wallet, however in order to do safely, I would pull out this:
- Communication via USB, Bluetooth, RFI, & Wifi
Then we would only have USB left, which is imo not an ideal way to pay in a shop.
What we need is a Wireless technology, that is designed to be secure. (like https, ssh, etc etc)
Lastly, while I like 3 factor auth, I'm not really sure how "something you have (like an ID card)" could benefit here, as having the id card in my left pocket, and the device in my right pocket, kinda defeats the purpose of something you have. (imo, something you have security, only works when your not constantly near the thing/location that it needs) (feel free to prove me wrong here)
As to spark an idea in you guys, a combination / randomization of the "Something you are" would be something I really love to see. (asking for either left or right eye for retinal scan, and asking for a specific finger for fingerprint) (just in case someone tries to copy one, now they would need all, a lot harder to get)
And in case you missed it, this stuff is great for hardware wallets.
Agreed that Bluetooth and Wifi are not designed for security. However the responsibility of security utilizing communication protocols is up to the host and client systems. We cannot and will NOT rely on communication protocols to provide adequate and provable security. There are numerous very good open source solutions to enable robust security on top of these communication stacks. As such the movement of information to and from our device is well protected and offers assurances as to its resilience and capabilities. In other words you have the controls that will give you peace of mind.