Privaris BPID™ LR Security Device
Is my fingerprint stored on the device?
No. Your fingerprint itself is not stored. Only numeric representations of
unique features of your fingerprint (for example, specific ridges, valleys
or whorls) are encoded and stored on the device in the form of a
template. These numeric representations are used in the matching
process that confirms you as the authorized user of the device, and
cannot be used to regenerate your actual fingerprint.
Is my fingerprint transmitted from the device?
No. When your device matches your live fingerprint to your stored
fingerprint template it wirelessly transmits a stored credential which
confirms your identity. Your fingerprint is never transmitted. Neither
your fingerprint nor its features can ever leave your device, and it is
impossible to recreate your original fingerprint from the device.
Can my fingerprint be faked and the security of my device
compromised?
The fingerprint sensor on your device uses sensing technology that
allows it to reject a fake finger or other attempts to fool the device. The
sensor actually looks beyond the surface of your finger at the inner
layers of your skin where your fingerprint features are formed. These
techniques rely on the specific chemistry of your skin, which is not
present in a fake finger.
Can my fingerprints be accessed from my device?
No. The device does not permanently store your actual fingerprint.
Numeric representations of specific unique features of your fingerprint
are encoded and stored on the device and used in the matching process
that confirms you as the authorized user of the device. These numeric
representations cannot be converted into your actual fingerprint.
Can a third party steal my credentials while they are being
wirelessly transmitted to or from my device?
Typically, all information sent to or from your device is encrypted. This
prevents a third party from intercepting the information as it is
transmitted. For some low frequency physical access applications,
encryption is not an option; however the close proximity required for
access significantly reduces the possibility of a transmission being
intercepted without notice.
15