Blog

Going Branchless – Mobile Onboarding for Banks

By | 2017-03-24T12:47:00+00:00 September 29th, 2016|

Banks keep making banking easier, and that means cutting down on branch visits or eliminating them altogether by giving customers really great mobile apps. Perhaps more than any type of business, banking and financial services firms increasingly rely on the sophistication and ease-of-use of their mobile applications to attract new customers and keep them. They [...]

Biometrics in Education: Case Study at NYC Schools

By | 2017-03-24T12:47:00+00:00 September 1st, 2016|

It’s the time of year for new notebooks, sneakers, backpacks, and also new schoolteachers. Most of those new teachers will be subject to background checks. Fingerprint searches have been used for decades to screen new employees in a variety of careers, including nursing, policing, banking, transportation, and education. In the US, employers in these fields [...]

Biometric Authentication Part IV – Spoof Detection Is Critical For Mobile Facial Biometrics

By | 2017-03-24T12:47:00+00:00 August 18th, 2016|

Facial recognition is here to stay for mobile authentication. It’s fast, easy, and familiar to anyone who has taken a selfie. And thanks to the universal appeal of the selfie, even lower-cost mobile handsets just about now have a front-facing camera. This is important because it means that biometrics can be used to strengthen the [...]

Biometric Authentication Part III – Sorting Out the Options

By | 2017-03-24T12:47:00+00:00 August 4th, 2016|

Biometrics are the heir to the password for the reign of secure authentication. There are good reasons for that; our biometrics are naturally unique to us and could hardly be more convenient. They will enable strong authentication to become a seamless, transparent process that make login easier and more secure. But there are different ways [...]

Biometric Authentication Part II: Convenience and Security

By | 2017-03-24T12:47:00+00:00 July 19th, 2016|

In Part One of this series, we looked at the topic of government and commercial organizations being hacked. Gaining access to our personal information is the objective of these breaches, and despite massive investments in anti-hacking technology there seems no end in sight. With that vicious cycle in mind, perhaps it’s time to make the [...]

Biometric Authentication Part I: A New Consumer Paradigm

By | 2017-03-24T12:47:00+00:00 July 7th, 2016|

2015, according to the Chinese zodiac calendar, was the year of the sheep. In reality, though, it turned out to be the year of the hack. T-Mobile. ScottTrade. Ashley Madison. Even the U.S. Office of Personnel Management (OPM). All were victims of cyber hacking in 2015, and the personally identifiable information (PII) of millions was [...]

What’s in a Name? FIDO Enables Trust Without Passwords

By | 2017-03-24T12:47:00+00:00 June 16th, 2016|

“Fido” in Latin translates as “to trust”, but it more commonly evokes thoughts of man’s most loyal companion. Abraham Lincoln had a dog named Fido, and among the most recognized (non-fictional) dogs in history was named Fido. He was a street dog that became famous in Italy in the 1950s for unwavering loyalty to his [...]

Facial Biometric Search – Examiner Tools Can Make the Difference

By | 2017-03-24T12:47:01+00:00 June 2nd, 2016|

The proliferation of digital cameras and facial images has made facial biometrics extremely useful for criminal investigations, and increasingly so for identity applications beyond law enforcement. As with fingerprints, the use of facial biometrics needs to meet certain criteria to make them admissible in court or for whatever legal basis might be required. In these [...]

Astra™ – A Next-Gen Biometric Platform from Aware Sets a Benchmark

By | 2017-03-24T12:47:01+00:00 May 18th, 2016|

In talk about large-scale biometric systems, we hear a lot about algorithm performance: speed, accuracy, template size, false accept and reject rates, ROC and DET curves, etc. These are critical to knowing if a biometric algorithm is up to the task at hand. But we hear less about how these systems achieve their massive scale; [...]

Know Your Visitor – Biometrics in Visitor Screening and Border Management

By | 2017-03-24T12:47:01+00:00 May 5th, 2016|

It is plainly evident that border management is essential to containing illegal immigration, international crime, and terrorism. But implementing effective border control measures while minimizing the impact of security on lawful travel and commerce is extraordinarily difficult and expensive; a herculean task. While management of travel through international airports requires substantial infrastructure and staffing, management [...]