Biometric Identity Systems — Built to Pass Liveness and the Audit
A biometric system that can be bypassed with a printed photograph isn't a security upgrade — it's a liability. We build biometric authentication that passes ISO 30107-3 liveness checks, handles fallbacks correctly, and integrates with your physical and digital access control infrastructure.
- 1CaptureCamera / sensor acquires the biometric signal
- 2Liveness checkISO 30107-3: print, replay, 3D mask attacks blocked
- 3Feature extractOn-device — raw data never leaves the sensor
- 4Template matchEncrypted compare against stored template
- 5Access grantedDigital auth or physical access controller triggered
Fallback chain is designed with the same security bar — biometrics don't fall back to SMS OTP.
What you get
When it fits
- Your use case has a real security or UX driver for biometrics — not 'it would be cool'
- You need to bridge digital and physical access (the same identity unlocks the app and the door)
- Regulatory environment requires MFA with a possession or inherence factor — biometrics satisfies inherence
- You can architect template storage on-device or in an encrypted vault — raw biometric data should never leave the device
When it doesn't
- The real goal is removing friction, not improving security — consider passkeys instead
- You can't store templates securely — a biometric system with a breachable template database is worse than passwords
- The fallback is password-only — that makes biometrics the weaker path once users learn to use 'forgot password'
Process
Week 1–2: threat model, ISO 30107-3 compliance gap analysis, platform survey. Weeks 3–6: biometric SDK integration on target devices with liveness detection. Weeks 7–10: physical access middleware and PACS integration (if applicable). Week 11–12: penetration testing focused on presentation attacks, handover, and compliance documentation.
Full delivery processPricing
Fixed-price by scope. Digital biometric auth (one platform): $60–140k. Physical + digital bridge: $120–280k. Template vault for multi-platform: add $40–80k. Compliance documentation and third-party pen test coordination included.
See engagement modelsFAQ
- Can a printed photo bypass your system?
- No — liveness detection is mandatory, not optional. We test against the ISO 30107-3 attack list (printed photo, 2D video replay, 3D silicone mask, deepfake video) during development and include the test evidence in the handover documentation.
- Where is biometric template data stored?
- On-device in the Secure Enclave (iOS) or StrongBox / TEE (Android) wherever possible. For cross-device scenarios, templates go into an encrypted vault with access keys held on the device — never in a database accessible by a server-side query. Raw biometric data never leaves the sensor.
- What about BIPA and GDPR?
- We include a biometric data compliance baseline covering BIPA (Illinois), GDPR Article 9, and Texas CUBI. This means written retention policies, explicit consent flows, and a deletion mechanism before any template is stored. We'll flag your specific jurisdiction's rules in discovery.
- Can you integrate with our existing access control system?
- Yes — we've integrated with Lenel OnGuard, Genetec Security Center, CCURE 9000, and custom PACS. The middleware layer we build translates digital biometric identity into the credential format your physical access controller expects, without replacing your existing system.