Blog

Biometric Authentication Part II: Convenience and Security

By | July 19th, 2016|

In Part One of this series, we looked at the topic of government and commercial organizations being hacked. Gaining access to our personal information is the objective of these breaches, and despite massive investments in anti-hacking technology there seems no end in sight. With that vicious cycle in mind, perhaps it’s time to make the [...]

Biometric Authentication Part I: A New Consumer Paradigm

By | July 7th, 2016|

2015, according to the Chinese zodiac calendar, was the year of the sheep. In reality, though, it turned out to be the year of the hack. T-Mobile. ScottTrade. Ashley Madison. Even the U.S. Office of Personnel Management (OPM). All were victims of cyber hacking in 2015, and the personally identifiable information (PII) of millions was [...]

What’s in a Name? FIDO Enables Trust Without Passwords

By | June 16th, 2016|

“Fido” in Latin translates as “to trust”, but it more commonly evokes thoughts of man’s most loyal companion. Abraham Lincoln had a dog named Fido, and among the most recognized (non-fictional) dogs in history was named Fido. He was a street dog that became famous in Italy in the 1950s for unwavering loyalty to his [...]

Facial Biometric Search – Examiner Tools Can Make the Difference

By | June 2nd, 2016|

The proliferation of digital cameras and facial images has made facial biometrics extremely useful for criminal investigations, and increasingly so for identity applications beyond law enforcement. As with fingerprints, the use of facial biometrics needs to meet certain criteria to make them admissible in court or for whatever legal basis might be required. In these [...]

Astra™ – A Next-Gen Biometric Platform from Aware Sets a Benchmark

By | May 18th, 2016|

In talk about large-scale biometric systems, we hear a lot about algorithm performance: speed, accuracy, template size, false accept and reject rates, ROC and DET curves, etc. These are critical to knowing if a biometric algorithm is up to the task at hand. But we hear less about how these systems achieve their massive scale; [...]

Know Your Visitor – Biometrics in Visitor Screening and Border Management

By | May 5th, 2016|

It is plainly evident that border management is essential to containing illegal immigration, international crime, and terrorism. But implementing effective border control measures while minimizing the impact of security on lawful travel and commerce is extraordinarily difficult and expensive; a herculean task. While management of travel through international airports requires substantial infrastructure and staffing, management [...]

Biometric Database Interoperability for Fraud Prevention in LATAM

By | April 14th, 2016|

Latin America (LATAM) is one of the most culturally rich and diverse regions in the world; a melting pot that combines native traditions with a perpetual influx of people from all corners of the world. Unfortunately, the diversity of its identity is matched by that of its identity credentials, and the opportunities for fraud it [...]

Biometric KYC (Part III) – Registration of Prepaid SIM Cards

By | March 25th, 2016|

Millions of people in many parts of the world buy prepaid SIM cards to purchase mobile telephony and data services on a pay-as-you-go basis, as opposed to a subscription and contract. The vast majority of users are attracted to this model of service for its low cost, flexibility, and convenience. But the potential anonymity afforded [...]

Biometric KYC (Part II) – Biometric Identity Proofing Gets Off the Ground for Onboarding

By | March 18th, 2016|

Biometrics have been primarily the business of governments for many years, which—for applications like law enforcement, defense, and border control—applied biometric search to “identify” people, essentially verifying their claimed identity.

Today, biometric sensors are ubiquitous, and millions of people are using biometrics many times each day for authentication. It’s now hard to remember a time when the association of biometrics with criminality was reflexive; a notion that collection of my fingerprints—let alone a mugshot— represents accusation and inherent mistrust. This is a powerful paradigm shift for the industry not only in terms of market potential but for the change in how consumers view biometrics [...]

Biometric KYC (Part I) – Keeping Fraudsters Out of Your System

By | March 4th, 2016|

Some form of identity theft is at the heart of most financially-motivated fraud. A proliferation of personally identifiable information (PII) available through social media and other public sources is easily accessible to aspiring fraudsters, while the anonymity of Internet commerce and communication gives them plenty of cover. Illicit call centers troll for private identity data [...]