Home > Search
Found 56 Results
Writing for SemiconductorEngineering, Ernest Worthman notes that while biometrics offer a plethora of potential security-based tools, there are currently only two in wide-scale deployment: fingerprints and facial scanning. Indeed, according to ABI digital security analyst Dimitrios Pavlakis, fingerprints account for 60% to 70% of all biometric applications. Additional technologies eyed by major industry players include […]
The Smart Chip Provides Simplicity and Reliability The Smart card chip can store large amounts of data securely in both read only and read/write formats giving the user the ability to safely add and remove data from their card as required. The smart card chip is contained within a button or module, which is embedded […]
Writing for Semiconductor Engineering, Ernest Worthman notes that Hollywood films have long portrayed a wide range of futuristic biometric security procedures. In addition, a number of mobile devices now offer optional fingerprint scans instead of a traditional password login. However, current biometric technology will have to further evolve if it is to meet the security […]
Writing for Semiconductor Engineering, Ernest Worthman notes that Hollywood films have long portrayed a wide range of futuristic biometric security procedures. In addition, a number of mobile devices now offer optional fingerprint scans instead of a traditional password login. However, current biometric technology will have to further evolve if it is to meet the security […]
IDG’s Agam Shah recently reported that every Windows 10 device will feature APIs “for developers to work with sensors.” “The company has been incorporating a universal sensor driver set so Windows 10 can exploit a slew of environmental, biometric, proximity and motion sensors on devices,” he explained.
IDG’s Agam Shah recently reported that every Windows 10 device will feature APIs “for developers to work with sensors.” “The company has been incorporating a universal sensor driver set so Windows 10 can exploit a slew of environmental, biometric, proximity and motion sensors on devices,” he explained. As Shah notes, Redmond hopes to usher in an era […]
One of the longest ongoing discussions about EMV in the US is the card verification method (CVM) to authenticate EMV payments: PIN or signature?
Did you know that a September 2015 US Office of Personnel Management (OPM) system breach resulted in 5.6 million leaked fingerprints? “We’ve all seen movies that included a clever way to get someone’s fingerprints, and I never thought much about it,” Jimmy Pike, an analyst Moor Insights & Strategy, wrote in Forbes. “Now a huge […]
The FIDO (Fast IDentity Online) Alliance recently published final 1.0 drafts of two primary specifications: the Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F). While the core 1.0 specifications are final, FIDO is also nearing completion of extensions that will incorporate Near Field Communications (NFC) and Bluetooth into the range of FIDO capabilities. According […]
Big Data is an all-encompassing term used to describe the collection of large and complex data sets. As Kirk Marko of Forbes notes, the rapid advent of the Internet of Things (IoT) means our data supply – both as individuals and businesses – will be shifting into overdrive. “Data collection and connectedness [are being] added to all […]