Sunday, February 1, 2026

IR Authentication

freedstorm IR-Tec | High-Security IR Authentication
High-Security Biometrics

FREEDSTORM IR-TEC

The Freedstorm IR-Tec project is developing a high-security biometric authentication method based on infrared. It enables secure login and execution of privileged services in environments where no keyboard is available or manual input is not desired.

Security Status: The system implements a multi-layer protection mechanism that goes beyond conventional facial recognition by verifying biological signs of life.

# Comparison: IR-Tec vs. Standard

Feature / Technology IR-Tec Standard
Hardware AnchorTPM2 IntegrationNo
Liveness DetectionMulti-Layer (Static + Temporal)Limited
rPPG Pulse CheckYes (Core Feature)No
Thermal AnalysisIntegrated (Signature Check)No
Deepfake ProtectionVery High (Micro-mimicry)Low

# The 5-Level Security Architecture

🔐 Hardware Anchor (TPM2 + LUKS)

Biometric templates are stored in a LUKS-encrypted container, physically bound to the local TPM2 module.

💓 rPPG Pulse Detection

Analysis of subcutaneous blood flow. The engine measures minimal reflection changes in the infrared spectrum caused by the pulse. A defense against 3D masks and high-resolution displays.

Validation Process:

  • Static Liveness: Pattern analysis against 2D attacks (photos/displays).
  • Temporal Liveness: Motion detection analyzes micro-mimicry.
  • Thermal Signature: Verification of biological heat signatures.
  • Face Recognition: DNN with 28 landmark points.
  • Integrity Check: Validation of process isolation under Linux.

# Technical Background: rPPG Technology

Remote Photoplethysmography (rPPG) utilizes the light absorption of oxygen-rich blood in the NIR (Near-Infrared) range.

Core Algorithm

Vscore = ∑i=0n ( ΔIRref / ti ) > Tbio

Vscore: Validity Score

ΔIRref: Amplitude change (NIR)

ti: Timestamp

Tbio: Biometric Threshold

# Engine Mechanism

Signal Analysis

Extraction of the pulse wave from subcutaneous blood flow. Filters out noise from digital displays.

Thresholding

The Tbio value is variable and adjusts dynamically to the environment.

Unlike conventional methods, rPPG technology uses the temporal change in light reflection patterns to determine whether the subject is a living person.

# BSI Compliance & ISO Standards

  • BSI TR-03166: Robust Presentation Attack Detection (PAD).
  • ISO/IEC 30107-3 Level 2: Protection against 3D masks (AAL3).
  • FIDO Alliance: Binding to hardware ownership.
Note: This project is an independent development. The mentioned standards serve as a technical guideline. The tool is not officially certified; however, the mechanisms strictly follow BSI requirements for high-security systems. More coming soon...

Developer: freedstorm | Focus: Arch Linux Security & Biometrics