Skip to main content

Secure all your devices with SonicTouch, the breakthrough in biometrics

breakthrough biometrics technology announced sonictouch screen shot 2015 12 05 at 11 18 am
Image used with permission by copyright holder
Having the world at your fingertips has never been as literal as it can be with Sonavation and its new SonicTouch Fingerprint Sensor. As we proceed to rely increasingly on biometrics for our data security, the Florida-based company and its breakthrough technology is making it easier than ever to protect yourself and your loved ones. While most of our biometrics interactions today may be limited to our iPhone fingerprint sensors, experts believe that this method of authentication will soon become the leading security system. And with the SonicTouch Fingerprint Sensor, you can add an extra line of defense to just about anything you want.

As the cloud and the number of Internet-connected devices grows ever larger and more inundated by your data, your neighbor’s data, your government’s data, and beyond, reliable security is of paramount importance. In the next five years, it has been estimated that there will be more than 25 billion Internet-enabled devices, and already, over a quarter of web transactions are made via mobile devices. But as we grow more connected, we also seem to grow more vulnerable — we clearly can’t pick (or remember) passwords, and while having a biometric system in place is certainly a step up, getting locked out of your phone because your fingers are dirty or sweaty is a near everyday occurrence (or is that just me?).

But perhaps a solution has finally arrived.

Described as the most advanced ultrasound biometric authenticator module for the Internet of Things and mobile devices, SonicTouch is an embeddable fingerprint sensor capable of integration with anything from your smartphone to your key fob to your home safe. Because it’s a full-stack solution, you can add it onto any existing device without having to take anything apart or fundamentally change its design. Of course, you could also introduce SonicTouch as a standalone security system that serves as an added layer of safety to your smart home.

By binding directly to a device’s protective glass, SonicTouch eliminates the need for any sort of etching, which could otherwise damage a smartphone or other gadget. This, Sonavation notes, maintains the “full strength of the glass … a critical element to reducing device costs while providing a positive end-user experience.” A potential game changer for manufacturers, SonicTouch uses ultrasound in order to authenticate a fingerprint.

FIDO compliant and complete with upgradable anti-spoofing and Level 3+ matching systems, SonicTouch is made even more secure by the fact that your fingerprint never leaves the device for the cloud in order to be authenticated — everything stays native, using an algorithm and microprocessor for “open sesame.” 

“The digital and connected world is at our doorstep and is already beginning to touch every aspect of life,” said Karl Weintz, Sonavation CEO. “The ultra-thin SonicTouch is the comprehensive advancement that will enable the most secure authentication solution for manufacturers.”

There’s no word yet on when the technology will become widely available, but already, the company notes that it is working with three “global tier one” manufacturers in order to add the SonicTouch technology to upcoming devices. And with a developer program scheduled for the beginning of 2016, a lucky few may be able to explore SonicTouch’s capacities first hand.

Lulu Chang
Former Digital Trends Contributor
Fascinated by the effects of technology on human interaction, Lulu believes that if her parents can use your new app…
How to keep your data secure while working from home
Man working at a desk at home.

Phishing attacks are on the rise. Companies are struggling to create work-from-home best practices as they are forced into remote work. And experts think that the lack of preparedness will result in unprecedented numbers of corporate breaches.
So what can you do to make sure your work data isn't stolen or leaked? Here are some tips from cybersecurity experts:

Set up a VPN
A VPN, or virtual private network, allows a user to send and receive data on a public server as if it were secured like a private server.
“Make sure any communications are using a VPN client, and make sure that own home devices are protected and secured,” said Heather Federman, vice president of privacy and policy at cybersecurity company BigID.

Read more
All AMD processors since 2011 have had a security vulnerability
Fingers holding an AMD Ryzen 9 3900X.

Coming on the heels of recent news that there is an unfixable vulnerability in Intel processors from the last five years, security researchers have identified a vulnerability in AMD processors from the last nine years as well.

A paper by researchers from the Graz University of Technology, first reported on by Tom's Hardware, describes two attacks, Collide+Probe and Load+Reload, which are a subset of the "Take A Way" vulnerability and are based on a Spectre attack. The vulnerability is found in all AMD processes released between 2011 and 2019, including the Zen microarchitecture.

Read more
Your iPhone can now act as a physical Google security key
Google account security

A year after introducing it for Android phones, Google has today announced that iPhones can now function as physical two-factor security keys for logging into the company’s own services like Gmail in Chrome. This authentication method is a lot more secure than the two-factor prompt you’re likely used to, as it requires your iPhone to be physically in the computer’s proximity.

Two-factor authentication adds an extra layer of security to your accounts. However, SMS and internet-based two-factor processes have been in the past failed to prove as secure as one would hope for. Google’s solution for that takes advantage of your phone’s Bluetooth to turn it into a dedicated security key and ensures you’re physically authenticating the login.

Read more