You are at : Search > Articles Search Results

Articles Search Results

233 Articles and 249 related Products found for fingerprint

MorphoTrust adds 3 states with $25M to enrollment business

MorphoTrust adds 3 states with $25M to enrollment business

Editor / Provider: MorphoTrust Safran | Updated: 2/7/2014 | Article type: Security 50

MorphoTrust USA (Safran), an American provider of identity solutions and services, has won new programs to provide fingerprint-based background checks for the Massachusetts Executive Office of Public Safety and Security, the New Jersey Department of Public Safety, Division of State Police and fingerprint channeling services in Nevada for the Department of Public Safety, increasing public safety through the vetting of individuals working in childcare, education, nursing, law enforcement and more. These agreements could yield up to $25.2 million in revenue over the next 6 years.

The Massachusetts Executive Office of Public Safety and Security is working with MorphoTrust to establish a system for applicants that are mandated by recent legislation to obtain fingerprint-based background checks, including caregivers and applicants seeking to become adoptive or foster parents. The background check system will also include Massachusetts public and private schools, including current and prospective employees and volunteers, as well as, subcontractors and laborers who perform regular work on school grounds or have regular contact with children. The program will enroll up to 245,000 applicants annually at 33 enrollment centers around the state. The one-year contract can be renewed for 5 additional one-year periods and could generate approximately $9.1 million in its entirety.

The Nevada Department of Public Safety civilian enrollment and channeling program includes individuals seeking employment, volunteer and licensing opportunities in the state that require a fingerprint-based background check, including real estate, gaming, housing authorities, education and insurance. The program's goal is to enroll 60,000 individual applicants per year. The 4 years contract can be renewed for 2 additional one-year periods and could generate nearly $700,000 over the full duration.

The program with the New Jersey Division of State Police will enroll an estimated 340,000-400,000 applicants annually. All individuals in the state who are mandated by legislation to submit to fingerprint criminal history background checks will use the services of MorphoTrust. This includes but is not limited to licensing, foster and adoptive parents, employment, firearms applications and volunteering. The three-year contract can be renewed with two additional one-year periods and could generate $15.4 million in revenues.

“These awards recognize MorphoTrust's leadership as an enrollment services provider, specifically with regard to the secure capture and transmission of fingerprints to support many state and federal programs and commercial businesses,” said Bob Eckel, CEO of MorphoTrust. “Identity verification – ensuring individuals are who they claim to be – has never been more important, especially when it comes to taking care of our children and accessing our healthcare and public safety systems.”

Applicants for these contracts will be serviced in the company's convenient IdentoGO Centers. IdentoGO Centers by MorphoTrust provide a convenient place for a growing number of identity-related services through a nationwide network of professional locations, staffed by trained enrollment agents. Spanning all 50 states and U.S. territories the primary service offered in each center is the secure capture and transmission of electronic fingerprints.

Celeste Thomasson appointed as President and CEO of MorphoTrak

Celeste Thomasson appointed as President and CEO of MorphoTrak

Editor / Provider: Safran Morpho | Updated: 1/29/2014 | Article type: Security 50

Morpho (Safran) announced the appointment of Celeste Thomasson as President and CEO of its U.S. company, MorphoTrak.

As a U.S. citizen, Celeste Thomasson's path allowed her to acquire extensive experience with the international high technology company, Safran, serving most recently as Safran Vice President of Legal Affairs, a position she began in July 2010. Previous to that, she served as Senior Vice President & General Counsel of Safran USA. Celeste Thomasson first joined Safran in 2002 as Legal Counsel of Messier Services and in 2003 she was appointed Vice President of Legal Affairs of Messier-Dowty. Celeste Thomasson's appointment follows former President & CEO, Daniel Vassy who is returning to Safran to fulfill his next assignment within the Group.

MorphoTrak, a subsidiary of Safran USA, provides biometric and identity management solutions to a broad array of markets in the U.S. including law enforcement, border control, civil identification, and facility/IT security. Reporting to Morpho, Safran's security division, MorphoTrak is part of the world's largest biometric company. Morpho is a leading innovator in large fingerprint identification systems, facial and iris recognition, as well as secure credentials. With 40 years' experience, Morpho has captured more than 3 billion fingerprints and Morpho products are used by more than 450 government agencies in over 100 countries. MorphoTrak is headquartered near Washington D.C., with major corporate facilities in Anaheim, CA and Federal Way, WA.

Security outlook 2014: Products and technologies

Security outlook 2014: Products and technologies

Editor / Provider: Editorial Department, a&s Asia | Updated: 2/4/2014 | Article type: Hot Topics

In 2014, there are few product trends and technologies that will be heavily addressed, including intelligent surveillance, higher resolution technology, growing demands for entry-level market, upgraded analog, steady growth in access control and biometrics and video verification applications.

Intelligence is the breakthrough in surveillance
In the early years when video content analysis (VCA) was introduced to the market, it created a ripple of excitement. However, when the high expectation was not met by the technology, the excitement was chilled quickly. In the recent years, we have seen many applications been adapted to different vertical markets. For example, people counting is highly used in the retail sector for flow management or distinguishing out the hot selling products in malls. Another practical usage is to use VCA as a filter, to isolate suspicious activities for further determination by people. This application can be programmed to the cameras at the front end as an activity detector. If it is to be used at the back end as an intelligent analytic tool, then the pictures will become information-rich tool or further applications.

As to the improvements of VCA, there are 2 ways to go. One is through adding in the three-dimension (3D) technology--- by incorporating determining factors such as height measured from the ground, the accuracy of the image analysis could be highly enhanced, becoming a more reliable application. Another improvement is through self-learning technology. The precision of VCA is dependent on how well the VCA corrects its mistakes through multiple trial-and-errors.

Cameras are like the human eyes. If the image registered by the eyes is not just “seen” but “comprehended,” then the application will become more valuable to the system. The hottest topic in IT now is the big data. If combing intelligent surveillance and big data, security will definitely be brought to a higher level.

Higher resolution, clearer images
Recently, we have heard the coming of 4K images or H.265 compression technology – the revolution of visual demands is stimulated by the consumer market. As a product, HD can be described as mature; however, if we are talking about a system or an environment, then it is yet to be accomplished. From my point of view, it is very difficult to find new marketing topics for the IP market that is heavily competed for. In order to stay ahead in the industry, many manufacturers will pioneer into incorporating the 4K and H.265 technologies into their products despite that the environment is not mature yet.

Entry-level markets' rising demands
As mentioned, security has become more affordable and much accepted in the consumer markets. Many leading players such as AXIS, BOSCH, and SONY continuously introduce new entry-level products specially designed for this market. Similarly, the cost-downed made-in-Asia products from both IT and security industries all have something to offer to the entry-level market. To offer a stage for manufacturers to showcase their consumer-defined products, the 2014 Secutech International Expo, organized by Messe Frankfurt New Era Business Media (a&s company), is going to launch a concurrent SmaHome show, to greet the coming of age of the new security market.

Analog – bullish with upgrades
The analog technology still dominates the security market in terms of quantity with an 80 % share even in 2013. Although the competition is so intense that little profit can be generated, the cheap pricing will still affect the market for another while. However, if manufacturers can take advantage of the large need for analog upgrades and produce some innovation for improving the existing technology, profits can certainly be yielded. Hence, we should pay attention to those solutions designed for the upgrade of the existing analog systems, such as the highly developed 960H, HD-SDI to be lowered in price, or the 800TVL products hot in China. These upgrades will aggressively seize the large analog market.

Access control onto a steady rise
Access control applications has followed closely with the IP trend, and can go along with other mature technologies such as biometrics, RFID, wireless electric lock, IP video door phone. As IP continues to excel, access control is definitely going on a stable growth for the following years.

Biometrics be lifted up outside security
In the previous issue, we have picked out iPhone 5s as the product of the month due to its selection of fingerprint technology. Biometrics will definitely be riding an upward spiral with consumer 3C products--- free from the constraints of the security market. Applications such as facial recognition, voice identification, and many more will also be in demand. Some of the technologies that were unable to be supported by the surveillance industry could possibly find a new stage to shine through 3C.

Video verification enhancing applications
False alarm has always been a headache for the alarm providers. Some of the countries now have regulations requesting all alarm services to add in video images to enhance verifications that alleviate the burden of police on duty. Some alarm service providers add in the video verification to reduce the unnecessary dispatch of guards. This is even more appreciated in Asian countries, where people are accustomed to image viewing. Although alarm is not highly requested in India, perhaps more can be secured through the combination of alarm and video.

Looking ahead the transition phase of security
The most exciting trajectory of security is pointed towards to follow the path of 3C, as the value of surveillance becomes tangible through mobile devices. The untapped opportunities in the security industry will lure both geniuses and funds as how it is in the Silicon Valley! There is going to be a fiery image revolution changing the old professional security. I myself am very curious, just how will the core value of professional security---“trust”--- be redefined in the consumer-driven new markets? Maybe we can hold on to this thought, and come back to examine it in 2016.

How to differentiate types of smart cards

How to differentiate types of smart cards

Editor / Provider: Alf Chang | Updated: 1/20/2014 | Article type: Tech Corner

As building automation has evolved over the years, almost all previously disparate systems have been integrated into a single management platform. With these changes brings the possibility of having a single, “smart” access card that allows users to access different services and facilities according to different authorization rights. For example, a single smart card could allow a user to reach certain floors via the elevator, gain access to restricted rooms, open the gate to the parking lot and more. These integrated systems and smart cards have applications in smart communities, smart homes, industrial parks and other highly managed environments.

Types of Smart Cards
There are numerous technologies on the market that can power universal access cards, and they all have one thing in common—silicon. Smart cards are “smart” because they have embedded chips that can store and process data. Different types of smart cards may perform better than that others in certain situations; according to their architecture, smart cards can be classified as follows:

Memory Card
Its embedded chip is equivalent to a normal serial E2PROM storage unit. Some chips are even designed to have write protection on certain areas of the chip. Memory cards can conveniently store data, are simple to use and are inexpensive. In many cases, memory cards can replace magnetic cards; however, since memory cards are not encrypted, they are limited to low-security applications.

Security Card
In addition to storing data, the embedded chips in security cards also have logic controls that will not allow access to the stored data unless the password is accepted. Security cards provide better security for the stored data, while retaining the ease of use of memory cards.

CPU Card
CPU cards embed chips that are not only capable of storing data, but can also process it. These chips come complete with internal controllers, storage units, sequential logic circuits, arithmetic units and operating system. CPU cards are widely used in environments that require a high level of security, due to its higher storage capacity, processing capability, and better data encryption.

Smart Card
Smart cards have their own integrated MPU, hard drive, keyboard, LCD display and power supply. Some even include fingerprint scanners. According to the way data is read and written, smart cards are either contact-based IC cards or contactless IC cards.

Contact-Based IC Card
Data in the card is accessed by the reader through contact. This type of smart card is regulated by ISO7816 standards.

Contactless IC Card
Contactless IC cards transmit data to and from card reads via various types of wireless transmission technologies, such as light or radio waves. Its embedded chips not only have storage and logic control units, they also have integrated wireless transceiver circuitry. Contactless cards are used in environments where data is accessed frequently and where reliability is crucial. Contactless cards are regulated by ISO10536 standards.

For more informationaobut smart cards technology, please register for Secutech 2014.

2013 Security50 access control(2-2): Product trends from mechanical to electronic

2013 Security50 access control(2-2): Product trends from mechanical to electronic

Editor / Provider: Jill Lai, a&s International | Updated: 11/26/2013 | Article type: Hot Topics

Product Trends
Industry experts feel that a number of technologies are maturing and will likely continue to grow incrementally in market share. These include, in addition to the shift from mechanical to electronic locks that has been in progress over the past decade, NFC, biometrics, and PoE and wireless systems. Furthermore, the development of open standards will surely have an impact on the access control landscape. Standardization is definitely in the books, with both ONVIF and PSIA announcing actions in this direction. ONVIF announced a specification to enable interoperability between clients and devices of physical access control in August. Meanwhile, in September, PSIA announced the launching of a Physical-Logical Access Interoperability Working Group to synchronize the two spheres.

Mechanical to Electronic
The shift from mechanical locks to electronic access control continues to drive the market.

Electronic access control systems have overcome the shortcomings of traditional mechanical access control systems. However, this convenience in access control also comes with new threats, such as intrusions via forged documents, tailgating, and identity theft.

This technological shift is reflected in Assa Abloy's strategy. “We've put a lot of emphasis in the last years on our electrical mechanical business. Consequently, we're grown dramatically in that area of the business in the last few years, and it now represents some 26 percent of our overall business in EMEA,” noted Bone.

“That's a market area that is growing, much faster, compared to the traditional mechanical area. For the existing established markets in Western Europe, there may be a lot less green field construction, but there is a lot of refurbishments going on. In Eastern Europe, Africa, and Asia, there are a lot of new construction projects that we are benefiting from,” added Bone.

A definite trend, mobile device enabled applications continue to seep Security solutions at high-risk locations need to evolve and persevere in a digital era. into the access control product offerings in the market. The proliferation of smart devices will continue to popularize NFC and mobile technology.

While NFC technology has been around for a decade, it is in 2012 that the industry laid the foundation for mobile access control deployment on NFC-enabled mobile devices. However, industry experts have noted that is unlikely that NFC-enabled smartphones will completely replace physical smart cards in the near future; instead, mobile access control solutions will coexist with cards. Nevertheless, a key benefit of NFC-enabled mobile access control is the ability to fuse logical and physical access control through embedding credentials in a smartphone.

In line with this trend, several manufacturers are boarding the NFC ship accordingly. TDSi, for example, is rolling out NFC compatible readers in 2014. “It is very clear that many end users want to use their mobile device for security access and the whole industry needs to take note of this,” said Davies.

Universities are likely to be early adopters of NFC-enabled access control. Unlike hotels where there is high turnover of guests staying for a relatively short period of time, universities are more of a closed environment, in that you know how many students there are and who they are. Hence, despite the large population, you can allocate access rights to each student for a term/semester and there will be relatively few changes thereafter, mentioned a source from Ingersoll Rand Security Technologies.

Wireless Locks
Wireless locks are also being deployed in the US residential market and manufacturers are optimistic about the future of wireless locks for homes. Wireless locks offer increased situational awareness and better management ability, noted an access control provider.

The retrofit fit market is offering plenty of opportunities for wireless access control. It is estimated that up to 70% of electronic locking systems now incorporate wireless products, which reduce installation time by up to 50 percent, and system costs by up to 25%. Verticals like healthcare can also benefit greatly from wireless solutions because of the importance of access control to sensitive data and locations cannot be compromised even if budgets are tight.

In line with this trend, Assa Abloy is seeing high double-digit growth for its wireless lock with radio technology. The combination of wireless and radio technology enables the end user to easily integrate security doors into an access control system at a reasonable price. Once integrated, access authorizations are manageable online and in real time.

According to a report by ASD Reports, the global biometrics market is expected to reach $10 billion by 2014.

The government sector is leading the adoption of biometric applications used in national identity, electronic passport, or border control projects. Large enterprises and healthcare facilities have also adopted biometric technology for logical and physical access control applications to better secure their assets. In the near future, it is anticipated that social networking sites will use biometrics for authentication.

Mobile devices are starting to incorporate biometrics for access control as well — Apple's iPhone 5s is an example. Hence, mobile-based biometrics is also forecasted to perform well in the next five years, with both the FBI and UK police force expected to be equipped with mobile-based identity solutions.

Finally, access control cards are also beginning to include biometric and other multifactor authentication information to enhance identity validation.

Currently, fingerprint is the most commonly adopted form of biometrics, but face recognition will most likely become its successor in the years to come. Increased implementations of face recognition technology stem from its enhanced accuracy, as well as its contactless, noninvasive nature when capturing and recognizing an individual.

Logical and Physical Convergence
With the number of devices connected to the Internet surpassing the 5 billion milestone in 2010 and expected to reach 22 billion by 2020, fusing physical and logical access control becomes a necessity if security is to be maintained sufficiently.

With the growing popularity of online banking, logical access control is now an important infrastructure for banks and financial institutions. For instance, in the U.K. alone, online banking losses rose from $37.6 million in 2005 to almost $96.7 million in 2009. Meanwhile, phishing attacks, where customers are led to fake bank websites via an email that appears legitimate rose from 1,700 to 51,000 in the same period. Moreover, these threats could originate from any corner of the world with an internet connection. The recent arrest of eight men in connection with a reported $2 million robbery at a UK bank was allegedly accomplished by compromising both the bank's physical and logical security. Consequently, enterprises should note that rimes are highly organized and evolving rapidly, making it crucial that logical and physical security are prioritized equally.

Regulation and standardization will make convergence a reality. In the current market, unfortunately, proprietary systems are impeding complete integration. Furthermore, the access control industry is not as tightly regulated, in contrast to the intruder and fire industries. However, with the announcement of an access control standard by ONVIF and PSIA, will likely change that.

Clear Skies Ahead
To conclude, 2013 has been a solid year for access control companies and the year ahead promises to be more or less stable. The industry will continue to expand on current marketing strategies, while promoting the uptake of new technology. Furthermore, access control hardware is becoming a commodity. "This is on one side driven by initiatives for open standards (PSIA, IEC, OSDP, SOAA), and on the other side by pressure on prices from the market. Following this development, we can conclude that, in the near future, the difference will be in software. This includes not only server software applications, but also software functionalities on the controller level,” said Arjun Bouter, Sales Director of Nedap Security Management.

2013 Security50 access control(2-1): Standardization hits industry

2013 Top Security50

Suprema to unveil USB fingerprint scanners

Suprema to unveil USB fingerprint scanners

Editor / Provider: Suprema | Updated: 11/13/2013 | Article type: Security 50

Suprema, a leading global provider of biometrics and ID solutions, announces new USB fingerprint scanners and an embedded OEM module, BioMini Slim, BioMini Combo and SFU-S20.

BioMini Slim is specially designed to provide a high level security solution for PC based identity access management solutions. It has a rugged IP65 rated dust and waterproof form factor while maintaining a sleek ergonomic design, and is also equipped with Suprema's latest 500dpi slim optical sensor, which boasts a large platen size for easy and reliable fingerprints capturing as well as provides Suprema's advanced LFD (Live Finger Detection), patent in-progress.

BioMini Slim maintains the highest standards by receiving both FBI-PIV and mobile ID FAP 20 certifications and even enables users to capture fingerprints under harsh environmental conditions as well as direct sunlight up to 100,000 LUX. BioMini Slim also offers a versatile software SDK platform that is ideal for developers to creating their custom applications.

BioMini Combo is a special fingerprint scanner which provides high level dual-authentication security using contact smart card as well as fingerprint technology for desktop PC and network environments. It also contains all the same features as BioMini Slim. The latest OEM fingerprint scanner module, SFU-S20, is ideally designed for various applications such as ATMs, kiosks, mobile-POS and handheld terminals, etc. It too hosts a variety of new features including reliable capturing under direct sunlight as well as LFD technology and has received both the FBI PIV and Mobile ID FAP 20 certifications.

Reliability and performance are two essential elements which will drive the global diversification and expansion of applications based on fingerprint technology.

Suprema hosts Global Partnership Program 2013

Suprema hosts Global Partnership Program 2013

Editor / Provider: Suprema | Updated: 11/6/2013 | Article type: Security 50

Suprema, a leading biometrics company offering core fingerprint technologies for IP access control and time attendance systems, announced that their latest products and technologies as well as its vision will be highlighted at the ‘Suprema Global Partnership Program 2013' event held on November 6-7, at RIVERA Hotel in Seoul.

Suprema will showcase its industry-leading technology and products such as FaceStation, BioStation T2 and BioEntry W will enable partners and customers to develop momentum for higher growth potential and innovation on business.

The company will also suggest the industry's forecast with its new products and solutions in progress for development as well as the latest enhancements added to its various portfolios. Especially, the new platform to be announced in 2014 attracts much attention of industry specialist as it is expected to be a new conceptual state-of-the art next generation technology.

A total of around 50 security and biometrics specialists of Suprema's partners and customers around the globe, including EnterTech Systems Inc and Secure Inc will participate in the event and interact with each other demonstrating solutions and best practice leveraging Suprema technology.

“Suprema's vision comes from ‘Mutual Growth' with our partners and customers. Our mission is to ceaselessly develop and provide world best-in-class technologies to them.” said James Lee, CEO of Suprema “We've almost achieved our goal this year as well and we believe that is due to the collaboration and cooperation of our global partners and customers acting on the corporate vision.”

Morpho joins EU-funded biometric security systems project TABULA RASA

Morpho joins EU-funded biometric security systems project TABULA RASA

Editor / Provider: Morpho (Safran) | Updated: 10/25/2013 | Article type: Security 50

In recent years we've seen face, voice and fingerprint identification software move from Sci-Fi films into real life affordable devices, such as smartphones and tablets. The TABULA RASA consortium, which is supported by EU research and innovation investment, has set out to identify just how well this new software works, in particular against the growing phenomenon of “spoofing ” i.e. using everyday materials such as make-up, photographs and voice recordings to subvert or directly attack biometric systems.

Biometric systems have proven to be one of the most efficient security solutions available today. However, some biometric sensor vulnerabilities still exist, including some which have been well publicized in the International media. The TABULA RASA consortium comprises 12 different organizations across seven countries that have worked together over a period of three years to research as much vulnerability as possible, to develop countermeasures accordingly and ultimately a new breed of safer biometric systems.

In the course of its research, TABULA RASA hosted a “Spoofing Challenge,” which invited researchers from around the world to develop attack plans and to attempt to deceive various biometric systems. Participants showed that there are many different and creative ways to attack the systems. The most innovative attack proposed during this challenge used make-up to spoof a 2D face recognition system and succeeded in being recognized as the victim. Other contestants used well-known attacks such as photographs, masks or fake fingerprints (“gummy fingers”) to successfully spoof the systems.

Dr Sebastien Marcel, Coordinator of the TABULA RASA project, said: “It would have been impossible to conduct such large scale research and to collaborate with so many EU partners without the investment from the European Union. As well as more secure devices and information, the improved software will offer quicker log-ins to IT equipment and faster more accurate border control and passport verification. We believe that many different organizations will be interested in our research including technology companies, post offices, banks and manufacturers of mobile devices or online service providers.”

The EU invested $6.1 million (€4.4 million) in the TABULA RASA project, which was used alongside a $2.2 million (€1.6 million) investment by the Consortium to carry out the extensive research and testing involved.

The TABULA RASA research project has made an extensive list of possible spoofing attacks, evaluated the vulnerability of biometric systems to such attacks, and developed countermeasures that for instance detect signs of “liveness” (e.g. blinking, perspiration) and improve security of biometric systems. TABULA RASA has already transferred five of these countermeasures to companies. This in-depth knowledge about spoofing attacks allows European industries to maintain their leadership by improving conception of future spoofing-proof biometric sensors, thus opening up the huge potential of biometric technology.

The project is expected to create jobs within the European SME sector as the results are integrated into commercialized solutions. For example, KeyLemon, a Swiss based start-up, has integrated a face recognition software countermeasure, developed by TABULA RASA, into a final product. The expertise developed in the TABULA RASA project helped KeyLemon to secure a series investment of $1.5M, creating jobs within the company. Morpho (Safran) is also deeply involved, bringing its invaluable expertise and market vision to the consortium.

Ryan Heath European Commission spokesman responsible for the Digital Agenda and digital technologies said; "Many of us keep personal and confidential information on our smartphones and tablets, so we need to have confidence that we can fully rely on these biometric tools. The European Commission is pleased with TABULA RASA's success so far. No other research group has achieved such advanced results in biometrics to date."

CEM Systems & American Dynamics secure Saudia Aerospace Engineering Industries

CEM Systems & American Dynamics secure Saudia Aerospace Engineering Industries

Editor / Provider: CEM Systems | Updated: 10/11/2013 | Article type: Infrastructure

CEM Systems, part of Tyco Security Products, announces that the CEM AC2000 security management system has been successfully installed at Saudia Aerospace Engineering Industries main base at King Abdulaziz International Airport in Jeddah. SAEI joins leading airports and aviation maintenance facilities around the world where the CEM AC2000 system is providing paramount security.

Saudia Aerospace Engineering Industries is the maintenance arm of Saudi Arabian Airlines, the flag carrier of Saudi Arabia. SAEI maintains the entire fleet of Saudia which includes Boeing B777-200 & -300 & Airbus A320 and A330 families and provides maintenance handling at all in-Kingdom airports and over 27 international stations.

“The powerful CEM AC2000 security management system is providing high levels of security to our main maintenance base in Jeddah” said Mr. Riyadh Bakedo, Director Plant & Equipment Maintenance from Saudia Aerospace Engineering Industries. “CEM's S610 intelligent readers provide access control restrictions to highly secure airside areas such as administration offices and aircraft hangers, while CEM biometric readers enable us to control staff access to our airside warehouse. We are very happy with the AC2000 system, which is set to grow and expand further”.

CEM's S610 intelligent IP card readers come with an LCD display, keypad and on-board database offering intelligence at the door. As such the reader will continue to operate and store transactions offline, ensuring zero system downtime. The S610 readers also feature sophisticated door modes such as Turnstile, Control Post and Validation mode. This enables the CEM S610f readers to critically secure turnstiles to monitor staff attendance into SAEI aircraft hangers and warehouse. The S610f reader also offers increased security by providing three levels of identity checks – ID card authentication, PIN check and fingerprint verification.

As an all-in-one Tyco Security products solution, Saudia Aerospace Engineering Industries (SAEI) also has over 350 American Dynamics Illustra IP cameras installed to secure its maintenance base. The Illustra 400 IP cameras have one of the most powerful sensor-processor combinations available on the market and have been in operation at Saudia Aerospace Engineering Industries (SAEI) for over two years.

VideoEdge Network Video Recorders (NVRs) are also utilised to provide a powerful, high-performance video management solution. VideoEdge records and manages video from the high-definition Illustra cameras and enables multiple video streams for live and recorded video collection.

NXP secures 2B payment and government ID Cards with SmartMX

NXP secures 2B payment and government ID Cards with SmartMX

Editor / Provider: NXP Semiconductors | Updated: 10/4/2013 | Article type: Component

NXP Semiconductors N.V. announced that it has shipped over two billion SmartMX secure microcontroller chips to the growing chip-enabled payment and government identity card markets. The increasing adoption of contactless and dual interface payments cards in the financial sector and the increasing trend to issue electronic government documents means that security chips are being used more than ever to protect personal information and data.

With digital identity theft concerns at an all-time high, SmartMX technology from NXP ensures that personal information kept on banking cards, e-passports or national ID cards is always protected. Built on NXP's IntegralSecurity process, SmartMX products have over 100 advanced features for attack protection and have achieved Common Criteria Evaluation Assurance Level (CC EAL) 6+ certification, one of the world's most trusted and robust security profiles. In the never ending race to offer advanced security protection, NXP continues to innovate and incorporate the latest technology to safeguard information. Future NXP SmartMX secure microcontrollers will feature PUF (Physically Unclonable Function) technology from Intrinsic-ID. PUF safeguards individual chips from data theft by using a unique ‘fingerprint' to protect the encryption key, therefore making the device extremely hard to clone and reverse-engineer.

“The advancements made in digital government and contactless payment cards over the years have been remarkable. For NXP, reaching the ‘two billion shipped' milestone for our SmartMX security chips clearly demonstrates the trust institutions and governments globally place in NXP to provide convenient and secure interactions,” said Ulrich Huewels, vice president and general manager, secure card solutions, NXP Semiconductors. “These organizations offer individuals peace of mind in our increasingly complex, open and connected world. It's imperative that we continue to develop best-in-class, innovative solutions that keep personal data safe.”

Serving banks all over the world, from Shanghai to London and New York to Berlin, NXP's SmartMX secures transactions on over one third of the chip-based payment cards in circulation. Just over three billion chip cards are used today and in the coming years it will increase to over two billion magnetic stripe cards, currently the most widely used type of credit card, will migrate to chip-based or contactless credit cards. This aggressive migration is primarily driven by the implementation of the People's Bank of China (PBOC) IC card standard in China and the roll out of EMV-based banking cards in the United States. In addition to security, the convenience of tap and pay offered by contactless chip cards is driving the increasing adoption of dual-interface cards. Such cards can be used in both contactless applications as well as in contact terminals like ATMs. Contactless payment cards also provide improved efficiencies in the payment process, with transaction times of less than 300ms.

NXP's SmartMX products are also the core component in a wide variety of digital identity schemes and are deployed in close to 100 countries implementing government electronic ID programs. Used in many sovereign electronic documents such as ePassports, citizen cards, national ID cards, driving licenses, social security cards and, health cards, SmartMX-based solutions protect citizens from identity theft and reduce fraud via the products' world class security features. Responding to the increasing pressure for effective online public administration processes and improved efficiencies, many governments consider electronic ID cards as the perfect solution, enabling citizens to securely and conveniently engage as needed. Electronic ID cards have become a prerequisite for an open and connected world where private and public businesses prosper.

First Page< Prev< | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 >Next >Last Page