Blog

Biometrics for banks: identity protection and regulatory compliance

By | January 12th, 2017|

Identity authentication based on biometric matching continues to grow along with consumer acceptance in both private and public sectors. Biometrics, the unique physical characteristics that all human beings have, include fingerprints and iris scans, as well as facial and voice matching. These modalities can all be used – to various extents – to clearly identify [...]

Improving Mobile Biometric Identification with Hardware Abstraction

By | December 1st, 2016|

Biometrics have continued the inevitable migration from the desktop device to the mobile device. Both the mobile industry and the biometric industry have continued to strive for smaller and more capable devices. The past few years have seen the accelerated adoption of biometrics on mobile devices. Most recently, iris biometrics have been added to Samsung [...]

Improving Biometric Search Performance with Intramodal Fusion

By | November 10th, 2016|

We often hear about the benefits and applications of “multimodal” biometrics; the use of different biometric modalities together (e.g. fingerprint and face) to increase the performance and enrollment flexibility of biometric search and match solutions. There are cases where going multimodal is an ideal solution, but others where it’s not an attractive option. The benefits [...]

FIDO Adoption Pushes Passwords the Way of the Dodo

By | October 19th, 2016|

Of all the things we do online, managing our passwords has to be our least favorite. The horror stories are told over and over again – password phishing, stolen identities, data breaches. Billions of dollars are spent every year by business, government, and consumers in an attempt to safeguard our most cherished belongings: our identities. [...]

Going Branchless – Mobile Onboarding for Banks

By | September 29th, 2016|

Banks keep making banking easier, and that means cutting down on branch visits or eliminating them altogether by giving customers really great mobile apps. Perhaps more than any type of business, banking and financial services firms increasingly rely on the sophistication and ease-of-use of their mobile applications to attract new customers and keep them. They [...]

Biometrics in Education: Case Study at NYC Schools

By | September 1st, 2016|

It’s the time of year for new notebooks, sneakers, backpacks, and also new schoolteachers. Most of those new teachers will be subject to background checks. Fingerprint searches have been used for decades to screen new employees in a variety of careers, including nursing, policing, banking, transportation, and education. In the US, employers in these fields [...]

Biometric Authentication Part IV – Spoof Detection Is Critical For Mobile Facial Biometrics

By | August 18th, 2016|

Facial recognition is here to stay for mobile authentication. It’s fast, easy, and familiar to anyone who has taken a selfie. And thanks to the universal appeal of the selfie, even lower-cost mobile handsets just about now have a front-facing camera. This is important because it means that biometrics can be used to strengthen the [...]

Biometric Authentication Part III – Sorting Out the Options

By | August 4th, 2016|

Biometrics are the heir to the password for the reign of secure authentication. There are good reasons for that; our biometrics are naturally unique to us and could hardly be more convenient. They will enable strong authentication to become a seamless, transparent process that make login easier and more secure. But there are different ways [...]

Biometric Authentication Part II: Convenience and Security

By | July 19th, 2016|

In Part One of this series, we looked at the topic of government and commercial organizations being hacked. Gaining access to our personal information is the objective of these breaches, and despite massive investments in anti-hacking technology there seems no end in sight. With that vicious cycle in mind, perhaps it’s time to make the [...]

Biometric Authentication Part I: A New Consumer Paradigm

By | July 7th, 2016|

2015, according to the Chinese zodiac calendar, was the year of the sheep. In reality, though, it turned out to be the year of the hack. T-Mobile. ScottTrade. Ashley Madison. Even the U.S. Office of Personnel Management (OPM). All were victims of cyber hacking in 2015, and the personally identifiable information (PII) of millions was [...]