Today, there are no physical or virtual boundaries to prevent intruders from gaining access to any sensitive data include Biometric data in free space, private sector, or government storage areas. The reason for using Biometric is to bridge the verification gap between human and machines. The latest cyberattacks proves: “One Time Password” (SecurID) has failed to protect faked access. Significant federal sites with RSA protection got breached. Biometric storing method, is defining the conditions for individual identification by storing his indefeasible characteristics in national/governmental/private databases also means specifying the characteristics that distinguish or identify the actual identity of a person, instead of using it for authentication, without the need to store it anywhere, to avoid the obvious potential to be hacked, copied, cloned and manipulated in minutes. Financial institutions, Fortune 500 companies, Governments, Intelligence Agencies, and Militaries worldwide have spent billions of dollars to prevent illegal access to protect critical intellectual property, plans and finances on mainframes, data centers and computers. This paper outlines the vulnerability of current sensitive Biometric data storage systems and presents a unique solution to this growing security threat with the use of traceless amorphous identifiers.
Although many inventors have offered myriad approaches attempting to providing inexpensive, minimally accumulated, and compact verification systems in which digitized characters of human users could be stored, retrieved and compared at some later time to verify that a human user is indeed a properly authorized user, none have succeeded in producing a system that is practical and desirable for use in providing non-unique biometric security for appropriate for use with real-time reaction biometric measurements (without need to dangerously store unique information). Because of these and other significant limitations as mentioned earlier, no commercially viable biometric-based non-unique security system has been successfully invented.
Close-loop Fuzzy Biometric logic is a type of mathematic algorithms and programming that more accurately represents how the human brain categorizes objects, evaluates conditions, and processes decisions. Close-Loop Fuzzy Traceless Biometric logic allows an object to belong to a set to a certain degree or with a certain confidence. Instead of using unique biometric information, an amorphous identifier(s) agent is replacing it. It was first proposed by Dr. Michael Shafir. Besides reliable accuracy performance and the replacement policy Traceless Biometric has to be non-revisable in order to fulfill the aim . Traceless Biometrics approach, that was using non-unique remedies and a Real Time Reactive Authentication process solves all such cloneable, deflectable and privacy challenges. The Traceless Biometric workflow uses the time tested photo ID concept, wherein you match a picture to a person, no different than in any typical biometric authentication process. In a very simplistic way, just as in a mirror reflection, anyone can “authenticate” a stranger’s reflection without the need to compare the reflection against any other source of stored information. It does so, however, in a manner that is, as its name suggests, traceless, without storing any biometric data anywhere.