You are at : Search > Articles Search Results

Articles Search Results

233 Articles and 249 related Products found for fingerprint

Multifactor authentication provides the pieces for peace of mind

Multifactor authentication provides the pieces for peace of mind

Editor / Provider: Tevin Wang, a&s International | Updated: 2/8/2013 | Article type: Tech Corner

According to Report Linker, the multifactor authentication market is expected to grow 17.3 percent from 2012 to 2017 to a market worth US$5.5 million. Something we have indeed removes the problem of forgetting something we know, but now the object(s) must be with the user at the time that he or she wants to be authenticated.

"In the realm of physical security, the failures of companies and governments to protect our private information (personal and financial) are a lesson that what once served as sufficient security (username and password) is no longer acceptable. We have come to accept that card access provides a low level of security," said Adam Shane, Senior Systems Design Architect, Amag Technology (a G4S Technology company). "Cards can be duplicated, spoofed, modified or stolen. There is nothing that validates the authenticity of the card, nothing that binds the card to its owner, and in some cases, nothing to verify the issuer still trusts the owner to have the card."

The driving factor behind multifactor authentication is to increase the security level in an organization and only allow entry for permissible personnel, said John Davies, MD of TDSi. Multifactor authentication is becoming more important because more systems are connected over the Internet and are exposed to huge numbers of people.

Aside from existing compliance and regulatory pushes, the cloud is another driver for deploying multifactor authentication. "Traditional barriers that have been deployed to secure IT systems, such as firewalls, are becoming less relevant due to a growing move toward the cloud, which means an increasing amount of company data no longer resides on company networks," said Julian Lovelock, VP of Product Marketing for Identity Assurance, HID Global (an Assa Abloy company). "Traditionally, enterprises have stored key IT resources behind a firewall on corporate servers, or in a ‘walled garden.' But, with the rapid growth of the remote workforce, the time and effort enterprises have put into reinforcing that ‘wall' have seemingly been wasted, as more data begins to reside outside of the corporate network. All of these trends are leading toward a model in which organizations focus on protecting individual resources with strong authentication, as opposed to simply protecting the wall."

Chris Cardell, CEO of SyferLock Technology, agreed. Megatrends, such as the emergence of cloud computing, server and desktop virtualization, the proliferation of mobile technologies and bring-your-own-device possibilities, the increase in employees requiring remote access, and the increased use of social networking in the work environment, have created new vulnerabilities and risks for companies. "Users expect to be able to access information from virtually anywhere via the Internet and mobile devices such as smartphones and tablets, and that means it is harder than ever for IT and security executives to ensure that all the organization's information assets are protected," Cardell said.

Growth Verticals
Growth verticals for multifactor authentication include hospitals, banks, airports, data centers, large corporations, IT server rooms, universities, research labs, government departments and other organizations working with sensitive materials such as defense. "In some industries such as health care and financial services, the emergence or evolution of regulatory requirements is forcing even more stringent implementation for strong authentication. For instance, in the U.S., health care organizations must be compliant with the health insurance portability and accountability act (HIPAA). Relying solely on usernames and passwords will no longer be sufficient for secure access to data, particularly sensitive information such as patient records," Cardell said.

The US government has also mandated that access to physical and cyber assets in the executive branch requires use of a personal identity verification (PIV) card, Shane said. "This card supporting PKI validation is federated and therefore trusted across all agencies, and supports multifactor authentication (credential, PIN and biometric). Not all systems will be upgraded to support this high-end authentication token as PIV cards can cost the US government about $100 per person and that does not include the regular maintenance overheads. But progress is being made."

Rick Focke, Senior Product Manager at Software House (a Tyco Security Products company) is optimistic about the retrofitting projects and potentials of biometric based solutions. “The US federal government is a large market and one where the need for upgrades and additional solutions are still needed. In this market and in others, as installation volumes rise, costs should begin to decrease.”

The increase in employees, contractors and e-commerce customers requiring secure access, both remote and on premise, to computers, networks and sensitive information are also drivers in the demand for stronger multifactor authentication approaches. For instance, multifactor authentication adoption in banks in the U.S. is not mandated, but more customers in this market are moving to more secure solutions, Shane said. "We see this as a general trend. There are many beneficial reasons to move to strong authentication such as, to reduce financial losses from crime or fraud, improve auditing capabilities (non-repudiation), reduce cyber espionage and terrorism incidents, improve public relations, and the list goes on."

Complex and Costly?
Cost and usability are perhaps the two greatest concerns from enterprises/end user when implementing multifactor authentication solutions. "Adding biometric authentication for identity binding requires not only a biometric capture device at every terminal, but also requires licensing software to perform the biometric comparison," Shane said. "In biometric authentication, there are different ways to handle the process of binding an individual to a card or their credential. In one case, the user's biometric map or template is stored on a card or in a computer database. If the binding process requires users to present their card/credential first, for reading identification numbers (known as a 1:1 match), then costs can be kept minimal as the ID number is used to pull users' biometric data from the protected storage and then the biometric match confirms they are the person they claim to be. Similarly, the presentation of the credentials could release the biometric data directly from the card. However, in other systems, a person may simply provide one biometric identifier (fingerprint, iris or other) and the system will match this against all samples in the database. If the best match exceeds a threshold for acceptance then it is assumedthey are that person. This is called a 1:N match or a search." Compared with a one-to-one match, one-to-many comparisons are expensive.

Multifactor authentication solutions also require the appropriate enrollment or registration software to build the identity database and to manage the identities. "This software can be quite expensive also," Shane added. "We try to help customers understand that there is a continuum of solutions from relatively simple to very complex. Their budget, security concerns, regulatory requirements and consequences are all considered in guiding them to an appropriate solution."

In the case of biometric security, end users may also be worried about purchasing a third-party or bolt-on biometric system that requires two separate devices at the door and two separate software systems being used in parallel. "Another concern is the rate of technology change within biometrics today," said Philip Verner, Regional Sales Director for EMEA, CEM Systems (a Tyco Security Products company). "An emerging biometric technology today can go end-of-line within a considerably short period of time and this can make end users hesitant when choosing a biometric solution. When considering Iris technology, patent or licensing modules used can also be a significant barrier for customers."

Throughput and convenience are still issues for users. For example, a system that requires extra layers of authentication equals an extra delay for individuals trying to enter a facility or an area. "Customers want to avoid time delays or bottlenecks at the door where there is a high volume of staff throughput. Where it may not be convenient to use multifactor authentication all day, we recommend that PIN and/or biometric security be enabled during certain times, for example, at night time when the premises are closed," Verner said.

Usage Considerations
Whichever security model is chosen, the total cost of ownership is a key factor in determining the value of a solution. First of all, end users need to evaluate the cost to use and maintain a typical username and password logon security system. Weak security can result in direct and indirect costs and devastating consequences, due to leaking sensitive information and resources to unauthorized users and intruders. This is not to mention issues resulting from noncompliance to industry regulations.

When evaluating a multifactor solution as an alternative, the hardware, software, system integration, installation, deployment, maintenance and device replacement must all taken into the equation. Besides the direct costs of solution purchasing and software licensing, there can be hidden costs involved. For instance, customers might need to take into account the cost of distributing hardware: tokens, smart cards or biometric readers. Support costs must also be taken into account as there will likely be an increase of support calls after the initial deployment.

These procedures are especially critical for those who do not have a proper risk assessment, and therefore are not clear on what their most important data or assets are or where they resides.

Security only works if the end user follows the policy. Quick and convenient solutions that do not disrupt daily routines are perennial favorites. What is required from any multifactor authentication system is not only enhanced security level but also functionality.

While most corporations purchase systems based on their current needs, scalability is another important factor to consider when evaluating multifactor authentication solutions. Some multifactor authentication systems require significant management when dealing with a high number of users. For instance, tokens can become difficult and expensive to manage due to the fact that they need to be replaced every few years.

Bumpy Yet Rosy
Cost continues to be a challenge, as budgets are tight. "However, the US government is providing funding for HSPD-12 upgrades through the OMB 11-11 memorandum with a stipulation that the money must go to installing multifactor authentication solutions," Focke said.

Current industries that recognize the need for multifactor authentication solutions represent a small market for vendors. "The larger commercial market sometimes is challenged to see the ROI in multifactor authentication when all of the infrastructure costs are considered," Shane said.

The lack of awareness about such solutions requires extra effort on market education. "I think that one significant challenge is the incorrect assumption that the only viable option for multifactor authentication is a one-time password (OTP), and the belief that if the OTP option isn't suitable, there are no other alternatives. The reality is that is not true, and that there are a large number of alternatives," Lovelock said. “"we need to push past that point and educate people as to what those alternatives are, and at the same time highlighting the other key aspects of implementing authentication technologies such as, lower deployment and management costs, the enhanced level of security the technologies provide, and better usability for end users."

Despite these obstacles, the growth potential for the multifactor authentication market is substantial. Biometric readers such as fingerprint verification are gaining traction. "Some specialty applications are also coming to the forefront. For example, the health care market is looking at noncontact devices to help ensure readers remain clean and germ free. This non-contact solution utilizes iris, palm vein or facial recognition level of authentication only," Focke said.

As an expert in physical and logical access integration, HID Global predicts the proliferation of contactless device-based authentication and embedded credentials. "I think we will see technologies that grew up in the consumer space around machine profiling and device forensics being used in the corporate sector, as the consumerization of IT takes a greater foothold. I also believe that an increase in the availability of NFC-enabled devices will open up options for contactless device-based authentication," Lovelock said. "We will see growth in embedded credentials, where endpoint devices like laptops, tablets and phones will be able to securely store, and make credential readily available for use."

Also, software-based authentication solutions are emerging fast. "Because many of today's emerging use cases (e.g., employees and customers requiring secure remote access) are not conducive to legacy hardware-based authentication solutions, we believe that there will be increased demand for flexible, adaptable software-based authentication solutions."

"With increasing concerns about security and with new regulatory requirements, authentication is a growing industry. This growth has resulted in the emergence of a range of authentication solutions, including hard tokens, smart cards, biometrics, SMS text to cell phones, among others, competing in the market place," Cardell said.

Marriott Hotel in the U.K. enhances customer service and staff efficiency with key control

Marriott Hotel in the U.K. enhances customer service and staff efficiency with key control

Editor / Provider: Morse Watchmans | Updated: 2/1/2013 | Article type: Residential & Consumer

Luxurious amenities, ideal location, responsive service and fine dining are just some of the features of a first class hotel. First impressions can change quickly, however, if guests must wait in long lines when reception staff is slowed by additional chores such as dispensing and recording building keys used by maintenance or housekeeping.

At the four-star Birmingham Marriott Hotel in Birmingham, England, hotel management has moved to ensure an exceptional first impression by removing this task from reception staff. Now, authorized maintenance and housekeeping staff access keys from a Morse Watchmans KeyWatcher key control system, located away from the public eye. The system automatically documents all activity so management has an accurate record of who accessed keys and when.

"A lot of paper work and time was needed with the manual system of signing keys in and out," said Steve Hargreaves, Assistant Director of Finance at Birmingham Marriott Hotel. "By installing the KeyWatcher system, reception no longer has to manage this process and they have more time to better serve our guests."

The KeyWatcher cabinet installed at the hotel is designed with a biometric (fingerprint) access interface. Once the biometric information has been verified, the cabinet unlocks and keys can be removed or returned. Each individual key is secured to a SmartKey locking mechanism which readily accommodates both hard keys and plastic key cards. The mechanism features a built-in memory chip; data from the chip is stored every time a key is inserted into a key slot, providing a remotely accessible data trail for every key in the system.

Hargreaves comments that reports generated by the KeyWatcher system are very useful for tracking key usage and in improving overall operational and security procedures. He said, "We utilize various reports to trace missing keys, keep better control of assets and help ensure timely follow-up action if there is an incident."

The automated KeyWatcher management system cannot be manipulated or easily tampered with and provides the hotel with a safe secure method of storing and tracking keys. For example, personnel cannot exchange keys during or at the end of a shift because the key management system will notate that a key was not returned or that it was returned by another user.

"The system not only keeps the keys much safer than our previous manual system, but it also makes staff more responsible for their department keys," adds Hargreaves.

While other key management systems available on the market were reviewed, Hargreaves selected the Morse Watchmans solution based on a variety of considerations including price, performance and ease of use. He notes that the company's reputation for quality and service also was a leading factor.

HID Global and BehavioSec join forces to enhance fraud detection capability

HID Global and BehavioSec join forces to enhance fraud detection capability

Editor / Provider: HID Global | Updated: 1/31/2013 | Article type: Security 50

HID Global, a worldwide supplier in secure identity solutions, announced it is partnering with BehavioSec, a behavioral biometrics company, to combine BehavioSec's Behaviometrics technology with HID Global's 4TRESS Authentication Server. The joint offering brings a new layer of security to HID Global's Fraud Detection System without sacrificing user convenience by employing behavioral “fingerprints” as an additional authentication mechanism.

Users today increasingly spend time identifying themselves to access digital resources, such as logging into company networks or banking online. However, once users log in and cross the first layer of the authentication security perimeter, the only factor that ensures they are the same person that logged in is time-based. As long as there is continuous activity, the application assumes the user is the same person and lets the user remain logged in, presenting a potential security risk.

The integrated 4TRESS Authentication Server and Behaviometrics solution addresses this risk by increasing security at the time of login. If a user's password or OTP token is stolen but the credentials are not entered the way the user would enter them, login would be impossible. Once logged in, user behavior is continuously monitored to ensure that a third party has not intercepted or taken over the session.

"Recent security breaches have driven home the fact that the less layers of authentication your organization employs, the more vulnerable you are to attacks and exploitation," said Hilding Arrehed, director of worldwide professional services and technology partner programs, Identity Assurance, with HID Global. "By combining BehavioSec's groundbreaking technology with our 4TRESS Authentication Server, we can provide added value and security to our customers by increasing the auditability and traceability of activity online, without making it more difficult for the end user." BehavioSec's Behaviometrics solutions can create digital fingerprints of users' ongoing keyboard pressing patterns, including speed, frequency and pressure, when interacting with computer applications and websites. With significant accuracy, the system can detect deviations from a user's normal behavior and whether an attacker takes control of a computer.

By integrating Behaviometrics into the 4TRESS Authentication Server Fraud Detection System, customers can now benefit from:
- Improved user experience by using the behavioral “fingerprint” as an authentication mechanism. If the system is confident that a user is who he/she claims to be based on behavior, device type, location and other user-transparent parameters collected and analyzed by the Fraud Detection System, the user will not need to re-authenticate.
- Increased security by adding transparent behavioral analysis to user interactions with the application or system. This makes the initial authentication more secure and provides ongoing protection after the initial login.
- Strengthened audit capabilities by capturing deviations in user behavior. This information can be useful for forensics studies around internal and external data breaches. It can also help assess whether a session was hijacked or the authenticated user committed the fraud.

"Compliance can be a complicated process for organizations, so we are always looking for simple ways to streamline our solutions," said Olov Renberg, co-founder of BehavioSec. "By combining our Behaviometrics technology with HID Global's 4TRESS offering, we can add a new layer of security in a transparent way to deliver a complete solution for risk-based authentication."

Latin America Viva la Vida

Latin America Viva la Vida

Editor / Provider: By a&s International | Updated: 12/30/2012 | Article type: Hot Topics

Latin America, one of the largest emerging markets, is brimmed with opportunities. a&s explores the key market drivers and verticals on this new land of opportunity for security.

Unlike other regions that are experiencing slowdown, Latin America, both the public and private sectors, is investing in security systems and services to protect people and properties. The video surveillance market is expecting a CAGR of approximately 20 percent over the next five years, according to IMS Research. The main driver for this boom is the continual price reduction of network surveillance equipment. Brazil is the largest contributor to this sector's growth, followed by Mexico, Argentina and Colombia. Chile and Peru also enjoyed consistent growth. As a result, several video surveillance companies are planning to expand their businesses into the region.

Of all the countries in Latin America, Brazil alone is forecasted to make an enormous impact. The host country for the upcoming 2014 FIFA World Cup and 2016 Summer Olympics, Brazil is flourishing with countless opportunities. According to the US Security Industry Association, Brazil's current security market stands at US$592 million and is expected to triple to $1.8 million by 2017.

One project of particular note and budgeted at $31.8 million is the renovated Pituasu Stadium, which became the country's first 100-percent digital stadium (from zero surveillance equipment before). Many bus terminals also opted for IP cameras, strategically installed at points of revenue generation and passenger movement. While Brazil is currently dominated by analog cameras, at approximately 60 percent of the market share in 2011, the market for IP-based systems is expected to surpass that of analog in the coming years.

The number of ATMs is declining due to excessive fraud, according to a report by Frost & Sullivan. To combat theft and fraud, Bank Itautec, Latin America's largest private bank, deployed multispectral fingerprint readers in 12,000 of its ATMs. The bank plans to expand this biometric solution to 33,000 ATMs, to replace the traditional card and PIN.

According to Mexico's 2012 National Survey on Victimization and Perception of Public Security, there are more than 20 million cases of crime annually, most of which are not reported to the police. On a brighter note, the Mexican government is eager to mitigate these threats. There are many other driving forces: close ties to other Latin American countries, free trade with its neighbors, and vibrant government and business activities.

As Mexico follows the U.S. in security deployment, there are always new rules and regulation, meaning demand for new technologies and applications. According to industry sources, it will take a few more years before sales of IP-based systems exceed those of analog systems. As customer needs vary frequently, distributors and resellers need to adapt quickly to become “one-stop shops” for their customers. To support the growing network-based market, Mexican security professionals need to train themselves and their customers, in addition to providing quicker and better service and support.

In response to recent violent crime and prison breaks, the Mexican government announced that it will earmark $2.57 billion for building eight new correctional facilities. One of these penitentiary sites features 1,200 security cameras and biometric readers for access control. According to Fernando Loret de Mola, Sales Director of Sistemas Integrales de Automatización (SIASA), new criminal investigation centers will soon follow suit.

With regards to the coming year, Enrique Pena Nieto, Mexico's President-elect, stated on numerous occasions that he will continue to fight organized crime in Mexico, but with certain changes in strategy compared to his predecessor.

Managing security issues in retail stores is no easy task. As theft and robbery are common in Mexico, retail stores are beginning to use the cloud for video hosting so they can keep track of and access recorded footage in case onsite equipment is destroyed. For instance, Farmacias de Similares opted for Iveda Solutions' cloud video-hosting services for security, operational and sales purposes. Through an online portal, each store has secure and remote access to live and recorded video.

In an effort to cut pollution and congestion, a new line of subway was built in Mexico City. Opened in October 2012, the underground line cost nearly $2 billion and is considered one of the largest national projects. The security systems in place protect an expected 460,000 passengers on a daily basis.

Geovision releases a series of access control products

Geovision releases a series of access control products

Editor / Provider: Geovision | Updated: 12/19/2012 | Article type: Security 50

Geovision security platform is a truly integrated platform that seamlessly brings video surveillance, access control and license plate recognition system under one management platform. The platform operates on IP-enabled platform to meet the demands of today's IP-centric environments.

Geovision has been releasing several new access control products in Q4, offering more selections for installers.

Management Platform
GV-ASManager, company's access control management platform, has released with multi-language version to include English, Portuguese, Spanish, Russian, and Traditional Chinese. When a GV-ASManager is connected to a GV-DSP LPR or a GV-DVR LPR (both are license plate recognition system), GV-ASManager accepts license plate numbers as input, to grant access on vehicles registered to GV-ASManager database. Up to 255 GV-DSP LPR and / or GV-DVR LPR may be connected and managed through a GV-ASManager.

Two new models of controller have been released. GV-AS210 is a four-door controller (one way / two ways ) that supports up to 4 Wiegand readers and 8 RS-485 readers, and GV-AS810 is an eight-door controller (one way / two ways ) that supports up to 8 Wiegand readers and 8 RS-485 readers.

GV-GF1911 and GV-GF1912 are new models of fingerprint reader. They support GV-ASController and GV-ASManager through Wiegand 26, RS-485 and TCP/IP.

GV-DFR1352 is a card reader that is designed to fit at door frame (20.9 x 105.6 x 20.5mm / 0.8 x 4.2 x 0.8 in) for aesthetics of an installation. It supports Wiegand, RS-485 outputs and it is IP66 compliant, good for outdoor use. It also supports third-party access control through Wiegand interface.

Morpho fingerprint scanner from Safran receives FBI certification

Morpho fingerprint scanner from Safran receives FBI certification

Editor / Provider: Morpho | Updated: 12/7/2012 | Article type: Security 50

Morpho (Safran group) announced that MorphoTop Model 100R, a compact high speed livescan fingerprint scanner, has received certification from the FBI. This certification covers both tenprint rolled and identification flat fingerprint capture and meets the Integrated Automated Fingerprint Identification System (IAFIS) Image Quality Standard (IQS) Appendix F specification. MorphoTop is the ideal choice for economic high speed imaging of fingerprints for background checks, civil enrollment, criminal booking or personal identity verification purposes.

Based on proven and reliable biometric technology deployed worldwide for various major government projects such as the biometric passports, civil enrollments and in India's Unique Identification (UID) national project, MorphoTop provides effective and reliable fingerprint capture in less than two seconds.

Managed by the Criminal Justice Information Services, IAFIS IQS Appendix F specifications provide criteria ensuring that fingerprint image quality meets sufficient standards. To be certified, fingerprint scanner quality must meet designated parameters in reproducing the original fingerprint pattern for geometric accuracy, gray-level dynamic range, and signal-to-noise ratio.

W. Virginia State Police opt for Morpho mobile fingerprint ID devices

W. Virginia State Police opt for Morpho mobile fingerprint ID devices

Editor / Provider: Morpho | Updated: 11/28/2012 | Article type: Security 50

West Virginia State Police (WVSP) are successfully using MorphoIDent mobile ID devices supplied by MorphoTrak to make real-time identifications on both the WVSP and the FBI's Repository for Individuals of Special Concern (RISC) fingerprint databases.

The FBI's RISC includes approximately two million records of wanted persons, sex offender registry subjects, and known or suspected terrorists. MorphoIDent is a smartphone-sized mobile fingerprint identification device developed by Morpho (Safran group).

Using MorphoIDent in recent weeks, WVSP has made several identifications on the RISC database and dozens on the State's.

These identification devices help WVSP officers quickly determine if a person detained during a routine traffic stop has outstanding wants or warrants — even if the person doesn't have ID or gives a false name. MorphoIDent quickly captures two of the person's fingerprints and immediately searches them against the state's criminal fingerprint databases and the FBI's RISC database. Within minutes the device vibrates to indicate that search results are available, and whether or not the individual can be safely and confidently cited and released.

Trends to bank on

Trends to bank on

Editor / Provider: By Christina Phillips, a&s International | Updated: 11/27/2012 | Article type: Commercial Markets

As Internet banking continues its global ascension, the demand for conventional bank counter activity is on a downward slope, and in turn reliance on websites and ATMs increases. This major customer behavior change calls for proper infrastructure adaptations, as this represents a big opportunity as well as a challenge for the financial industry.

With growing numbers of self-serve financial transactions, video-based security systems are becoming more than just means to increase security, said Hans Kruft, Key Market Manager for Banking at Geutebruck, as outlined in the first part of this vertical feature.

“Facial recognition is increasingly used by banks for recognizing VIPs as well as criminals,” echoed Aluisio Figueiredo, COO of Intelligent Security Systems. “Integrations are also becoming a must, such as having a building management console where you can control the branches and various systems remotely.”

The following is a quick rundown of three trending technologies for the banking and financial sector.

Biometric technology has advanced to the point that it can be deployed in a cost-effective, scalable, easy-to-use manner, resulting in a number of bank projects in emerging markets like Africa, Southeast Asia, India and Latin America, where finger or vein scans are used for augmenting PIN security at ATMs, or voice recognition for remote telephone or online transactions.

Last month in Australia, ANZ Bank CEO Philip Chronican announced that the bank was exploring ways to introduce biometrics as a replacement for traditional payment identification methods. Over the next five years, the bank will direct US$1.5 billion to reshape the way they do business by investing in new technology. Kathleen Erickson, VP of Business Development, Fulcrum Biometrics pointed out that, "Banks in less developed countries go to villages throughout their countries to find small entrepreneurs that may need capital to expand their small business or get it started. These individuals often do not have transportation and cannot read or write, which can create challenges for authenticating identity and signing documents, but they have a good business and banks see business potential. Banks could benefit from a way to authenticate these individuals for loans. Currently, banks use laptops with a USB signature pad or fingerprint scanner, but now, embedded biometrics in portable and easy-to-use handheld devices like smartphones and tablets can be used."

Among all biometrics, fingerprint-based identification is the oldest and most reliable in numerous applications. This technology is well-suited for banks because in addition to enhancing security and preventing fraud, it provides added convenience for their customers as password is no longer compulsory. There is no need for training — customers simply put their fingers down. “For example, financial institutions in Latin America are embracing fingerprint technology for their ATMs,” said Phil Scarfo, VP of Worldwide Sales and Marketing, Lumidigm. “Biometrics, traditionally employee-centric and confined to the back room, is now being put in front of the customer with confidence.” High reliability is critical at ATMs because their use is not typically supervised.

Iris Scanning
Many millions of people around the globe have had images of their irises taken and stored for enrollment in recognition programs such as national IDs and passport-free border crossings. A major advantage of iris recognition is its extreme resistance to false matches, thanks to its detail-rich images of the iris's intricate structures. There are constantly incidents where culprits duplicate tokens: skimmed ATM cards, and stolen usernames and passwords. With iris-scanning technology, duplication is virtually impossible and thus would eradicate many of the issues facing the industry today. “We are considering implementing iris scans, for identifying our VIPs,” hinted Jerry Feng, Head of Security and Investigative Services for Taiwan, Citibank.

Facial Recognition
Facial recognition is already used by financial institutions in regions such as Europe, South America and Japan. “Facial recognition is currently in use in a small number of institutions, to grant access into high-risk or high-sensitivity areas, or as a VIP or person-of-interest identification system,” said Charles Smith, Product Manager at Omniperception. “Some are still evaluating the use value and effectiveness in the consumer financial sector, but it will certainly become even more integrated into banking in the future.”


Getting High…Def
An HD-SDI based video surveillance system allows branch and security managers to view high-resolution, zero-latency video footage over existing coaxial cable in a closed, secured system, which equates to minimum system downtime and significant savings. On the other hand, with today's banks, IP-based network and storage infrastructure should already be in place, which means the cost is mostly about network cameras and management software.

“It is inevitable that megapixel cameras backed with services over IP will take dominance in the finance sector,” predicted Michael Brown, IT and Computers Director for VideoControlRoom. “Financial institutions are increasingly using integrated technologies that allow for real-time cross-referencing and utilization of data such as alarm/access control logs, video and transactional data via notifications of choice. This helps improve decision making and event response.” Often, system designers and operators err on the side of caution by wanting to know everything, presented in an organized manner.

“We have noticed a move away from scale-out commodity NVR server infrastructure to scale-up consolidated and virtualized NVR servers,” observed Scott Basham, Perimeter and Surveillance Security Systems Program Manager for APAC, Unisys. “The intention is to make significant cost savings by cutting out unnecessary hardware, power and cooling operational expenses.”

Which will come out on top?

In practice, there is no “right” answer or solution, as user environments and requirements can vary from one site to another, from one bank to another. “We have both hybrid DVRs and HD-SDI solutions in operation,” Feng shared. “However, in my opinion, they are both band aid solutions, for the trend is to go IP. To this end, by next year, we'll be 100-percent IP. IP allows us to implement a fully integrated and centralized system, one that facilitates remote visual verification of alarms cost-effectively.”

South African bank opts for biometric ATMs

South African bank opts for biometric ATMs

Editor / Provider: Diebold | Updated: 11/21/2012 | Article type: Commercial Markets

Capitec Bank deployed Diebold ATMs to deliver advanced functionality, enhanced security and convenience to its consumers. The agreement includes Opteva 328 ATMs which feature cash recycling technology, allowing users to perform advanced transactions using notes, coins and checks, as well as perform all standard ATM functions in a single machine.

Diebold's cash recycling ATMs automate note and coin validation, improving transaction flow and security. Migrating transactions from the teller line to the self-service channel makes money management more convenient for the user, while also allowing Capitec's tellers to focus their time on providing value-added services to consumers.

"Our clients will benefit from Diebold's cash recycling ATMs by having the ability to make advanced transactions, such as coin deposits," said Riaan Stassen, CEO, Capitec Bank. "This provides our clients with more control over their money and added convenience since these transactions can be performed at the self-service channel."

In addition, the new cash recycling ATMs will soon be equipped with fingerprint recognition technology using a tiered biometric security approach, which helps mitigate card skimming. Clients will have the choice to perform transactions using either fingerprint verification or their bank card, both transactions requiring dual authentication.

"Capitec Bank has been a valued customer for more than a decade, and we are excited it is the first bank in South Africa to deploy ATMs featuring advanced transaction functionality and fingerprint recognition technology in a single machine," said Dave Wetzel, VP and MD of Diebold EMEA. "Diebold's Opteva ATMs will allow Capitec Bank to improve their branch efficiencies, while offering convenience, security and better outcomes for end users."

North Carolina hospital adopts iris recognition for patient safety, record integrity and fraud prevention

North Carolina hospital adopts iris recognition for patient safety, record integrity and fraud prevention

Editor / Provider: M2SYS Technology | Updated: 11/8/2012 | Article type: Commercial Markets

As part of their concerted focus on patient safety, preventing duplicate medical records and overlays, and eliminating medical identity theft at the point of care, Hugh Chatham Memorial Hospital (HCMH) announced that it has adopted the RightPatient multi-biometric patient identification system with iris recognition as the preferred modality. RightPatient was launched in the Outpatient Admissions and Radiology departments with future plans for expansion to the emergency room and physician practices.

RightPatient is the industry's only multi-modal biometric patient identification system that supports fingerprint, finger vein, palm vein, iris and face recognition. M2SYS Technology, the company that developed RightPatient, brings a decade of diverse biometric technology experience to the healthcare industry. With over 100 million enrolled users in more than 90 countries, M2SYS has applied its comprehensive knowledge of biometrics to RightPatient, resulting in a feature-rich solution that overcomes patient identification challenges in an innovative and practical manner.

Initially, HCMH had invested in a biometric patient identification system that only supported palm vein biometrics, locking the hospital to a single biometric modality and biometric device. Plus, the biometric system relied on “one-to-few” segmented biometric searches, which cannot entirely prevent duplicate medical records or identity fraud. Furthermore, the palm vein scanner required physical contact, causing hygiene concerns within the hospital.

“We have been pleased with our decision to switch from our old system to the RightPatient biometric patient identification system,” said Lee Powe, Director of Information Systems at Hugh Chatham Memorial Hospital. “The system offers a variety of very unique components and the installation process was quick and easy, requiring very little internal resources from our end. Plus, the technology has been well received by patients and staff, is extremely easy to use and truly guards patients against medical identity theft and the creation of duplicate medical records. We really liked the fact that a photo is linked to each patient's record so Admissions staff, nurses and other healthcare professionals throughout the hospital can visually verify a patient's identity at every touch point.”

“For those who are still unaware of biometric patient identification systems, this is the time to educate yourself on how this technology can be leveraged to raise patient safety levels, prevent duplicate medical records, eliminate medical identity theft and lower hospital liability,” commented Mizan Rahman, Founder and CEO of M2SYS Technology. “We are at a critical juncture right now in healthcare where hospitals and medical facilities need to completely understand the technology available for patient identification and how it actually works. I am very pleased that we are able to help HCMH enhance their patient safety initiatives.”

First Page< Prev< | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 >Next >Last Page